Secret Key Agreement for Data Dissemination in Vehicular Platoons

被引:20
作者
Li, Kai [1 ]
Lu, Lingyun [2 ]
Ni, Wei [3 ]
Tovar, Eduardo [1 ]
Guizani, Mohsen [4 ]
机构
[1] Res Ctr Real Lime & Embed Ded Comp Syst, P-4249015 Porto, Portugal
[2] Beijing Jiaotong Univ, Coll Comp Sci, Beijing 100044, Peoples R China
[3] Commonwealth Sci & Ind Res Org, Data61, Cyber Phys Syst, Sydney, NSW 2122, Australia
[4] Qatar Univ, Dept Comp Sci & Engn, Doha 2713, Qatar
关键词
Autonomous vehicles; data communication; vehicular security; optimization; WIRELESS NETWORKS; GENERATION; PROTOCOL;
D O I
10.1109/TVT.2019.2926313
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates messages to the following automated vehicles in a multi-hop vehicular network. However, due to the broadcast nature of wireless channels, this kind of communication is vulnerable to eavesdropping and message modification. Generating secret keys by extracting the shared randomness in a wireless fading channel is a promising way for wireless communication security. We study a security protocol for data dissemination in the platoon, where the vehicles cooperatively generate a shared secret key based on the quantized fading channel randomness. To improve conformity of the generated key, the probability of secret key agreement is formulated, and a novel secret key agreement algorithm is proposed to recursively optimize the channel quantization intervals, maximizing the key agreement probability. Numerical evaluations demonstrate that the key agreement probability achieved by our security protocol given different platoon size, channel quality, and number of quantization intervals. Furthermore, by applying our security protocol, the probability that the encrypted data being cracked by an eavesdropper is less than 5%.
引用
收藏
页码:9060 / 9073
页数:14
相关论文
共 51 条
[1]  
[Anonymous], 2007, DREAM AUTOMATED HIGH
[2]  
[Anonymous], 2018, 2 2 RULE
[3]  
Bai XW, 2018, 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), P331, DOI 10.1109/ICCT.2018.8599884
[4]  
Calvo Lopez A., 2017, THESIS
[5]   Physical-Layer Secret Key Generation With Colluding Untrusted Relays [J].
Chan Dai Truyen Thai ;
Lee, Jemin ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (02) :1517-1530
[6]  
Chan E., 2012, 2012019019 SAE
[7]   SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference [J].
Chen, Dajiang ;
Qin, Zhen ;
Mao, Xufei ;
Yang, Panlong ;
Qin, Zhiguang ;
Wang, Ruijin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (11) :1731-1745
[8]   Routing in Internet of Vehicles: A Review [J].
Cheng, JiuJun ;
Cheng, JunLu ;
Zhou, MengChu ;
Liu, FuQiang ;
Gao, ShangCe ;
Liu, Cong .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (05) :2339-2352
[9]   A Comparative Survey of VANET Clustering Techniques [J].
Cooper, Craig ;
Franklin, Daniel ;
Ros, Montserrat ;
Safaei, Farzad ;
Abolhasan, Mehran .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01) :657-681
[10]   Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks [J].
Epiphaniou, Gregory ;
Karadimas, Petros ;
Ben Ismail, Dhouha Kbaier ;
Al-Khateeb, Haider ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :2496-2505