Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications

被引:24
作者
Bottarelli, Mirko [1 ]
Karadimas, Petros [2 ]
Epiphaniou, Gregory [1 ]
Ismail, Dhouha Kbaier Ben [3 ]
Maple, Carsten [1 ]
机构
[1] Univ Warwick, Warwick Mfg Grp WMG, Secure Cyber Syst Res Grp SCSRG, Coventry CV4 7AL, W Midlands, England
[2] Univ Glasgow, James Watt Sch Engn, Glasgow G12 8QQ, Lanark, Scotland
[3] Open Univ, Sch Comp & Commun, Milton Keynes MK7 6AA, Bucks, England
基金
英国工程与自然科学研究理事会;
关键词
Quantization (signal); Entropy; Measurement; Cryptography; Wireless communication; Turbo codes; Hardware; Cryptographic key generation; physical layer security; quantisation; vehicular communications; CHALLENGES;
D O I
10.1109/TVT.2021.3056638
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicle (V2V) communications are of greatest importance to facilitate autonomous driving. The current state-of-the-art for secure data exchange in V2V communications relies on public-key cryptography (PKC) consuming significant computational and energy resources for the encryption/decryption process and large bandwidth for the key distribution. To overcome these limitations, physical-layer security (PLS) has emerged as a lightweight solution by exploiting the physical characteristics of the V2V communication channel to generate symmetric cryptographic keys. Currently, key-generation algorithms are designed via empirical parameter settings, without resulting in optimum key-generation performance. In this paper, we devise a key-generation algorithm for PLS in V2V communications by introducing a novel channel response quantisation method that results in optimum performance via analytical parameter settings. Contrary to the current state-of-the-art, the channel responses incorporate all V2V channel attributes that contribute to temporal variability, such as three dimensional (3D) scattering and scatterers' mobility. An extra functionality, namely, Perturbe-Observe (PO), is further incorporated that enables the algorithm to adapt to the inherent non-reciprocity of the V2V channel responses at the legitimate entities. Optimum performance is evidenced via maximisation of the key bit generation rate (BGR) and key entropy (H) and minimisation of the key bit mismatch rate (BMR). A new metric is further introduced, the so-called secret-bit generation rate (SBGR), as the ratio of the number of bits which are successfully used to compose keys to the total amount of channel samples. SBGR unifies BGR and BMR and is thus maximised by the proposed algorithmic process.
引用
收藏
页码:2310 / 2321
页数:12
相关论文
共 51 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
Ali Syed Taha, 2012, P 5 ACM C SEC PRIV W, P39
[3]   Robust Key Generation from Signal Envelopes in Wireless Networks [J].
Azimi-Sadjadi, Babak ;
Kiayias, Aggelos ;
Mercado, Alejandra ;
Yener, Bulent .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :401-+
[4]  
Baksi S., 2017, IEEE WIRELESS COMMUN, P1
[5]  
Bassham L.E., 2010, SP 800 22 REV 1A STA
[6]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[7]   Physical characteristics of wireless communication channels for secret key establishment: A survey of the research [J].
Bottarelli, Mirko ;
Epiphaniou, Gregory ;
Ben Ismail, Dhouha Kbaier ;
Karadimas, Petros ;
Al-Khateeb, Haider .
COMPUTERS & SECURITY, 2018, 78 :454-476
[8]  
Botticelli M, 2018, IEEE I C CONS ELECT
[9]  
Brassard G., 1994, PROC EUROCRYPT, V765, P410
[10]  
Cover T. M., 2005, Elements of Information Theory