Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security

Modern automotive Cyber-Physical Systems (CPSs) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance. Regrettably, this new trend results in new security vulnerabilities that can put the safety and privacy of the automotive CPS and passengers at great risk. In addition, automotive wireless communication security is constrained by strict energy and performance limitations of Electronic Controller Units (ECUs) and sensor nodes. As a result, the key generation and management for secure automotive CPS wireless communication is an open research challenge. This paper aims to help solve these security challenges by presenting a practical key generation technique based on the reciprocity and high spatial and temporal variation properties of the automotive wireless communication channel. To validate the practicality and effectiveness of our approach, we have conducted separate real- world experiments with automobiles and with RC cars. Lastly, we demonstrate through simulations that we can generate keys with high security strength (keys with 67% min-entropy) with up to 10X improvement in performance and 20X reduction in code size overhead in comparison to the state- of-the-art security techniques.

[1]  Pascal Lorenz,et al.  Wireless communication technologies for ITS applications [Topics in Automotive Networking] , 2010, IEEE Communications Magazine.

[2]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[3]  Marco Gruteser,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Key Agreement Algorithms for Vehicular Communicatio , 2022 .

[4]  Daniel E. Holcomb,et al.  Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.

[5]  Ludovic Apvrille,et al.  Car2X Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2X Applications Using In-Vehicle Symmetric Cryptography , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).

[6]  Arquimedes Canedo,et al.  Functional Model-Based Design Methodology for Automotive Cyber-Physical Systems , 2017, IEEE Systems Journal.

[7]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[8]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[9]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[10]  Elaine B. Barker,et al.  Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .

[11]  Elaine B. Barker,et al.  SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .

[12]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[13]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[14]  Sneha Kumar Kasera,et al.  Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration , 2014, TOSN.

[15]  Nader Moayeri,et al.  Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[16]  Aggelos Kiayias,et al.  On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.

[17]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[18]  William E. Burr,et al.  Recommendation for Key Management, Part 1: General , 2005 .

[19]  Christian Weií,et al.  V2X communication in Europe - From research projects towards standardization and field testing of vehicle communication technology , 2011 .

[20]  Ahmad Al-Daraiseh,et al.  Toward Secure Vehicular Ad-hoc Networks: A Survey , 2012 .

[21]  Torsten Schütze,et al.  Automotive Security : Cryptography for Car 2 X Communication , 2011 .

[22]  Mohamed-Slim Alouini,et al.  Digital Communication over Fading Channels: Simon/Digital Communications 2e , 2004 .

[23]  Mike Lukuc,et al.  Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application , 2014 .

[24]  Matthew Green,et al.  Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.

[25]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[26]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[27]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[28]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[29]  Alberto L. Sangiovanni-Vincentelli,et al.  An efficient wire routing and wire sizing algorithm for weight minimization of automotive systems , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).

[30]  S. Devadas,et al.  PUF-Based Random Number Generation , 2004 .

[31]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[32]  Miodrag Potkonjak,et al.  Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[33]  William E. Burr,et al.  Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .

[34]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[35]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[36]  Eike Kiltz,et al.  Secure Hybrid Encryption from Weakened Key Encapsulation , 2007, CRYPTO.

[37]  T. ElBatt,et al.  Potential for Intra-Vehicle Wireless Automotive Sensor Networks , 2006, 2006 IEEE Sarnoff Symposium.

[38]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[39]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[40]  van den,et al.  Entropy analysis of physical unclonable functions , 2012 .