Reciprocity Enhancement in V2V Key Generation System by using HPK Method

Vehicle to vehicle (V2V) communication is a current technological innovation that allows two vehicles to communicate with each other through ad-hoc networks. However, security issues in ad-hoc networks are very high, allowing attacks to take control of vehicles or stealing confidential messages by irresponsible third parties. Therefore, a high security system is needed in ad-hoc networks. The implementation of secret key generation by utilizing Received Signal Strength (RSS) between two vehicles can overcome this problem by generating random key bits. We use HPK (Hybrid Polynomial Regression and Kalman Filter) method to improve RSS correlation and Modified Multi-Bit (MMB) quantization combined with Level Crossing algorithm. Testing is conducted by comparing the performance between HPK method that proposed with another method to increase the reciprocity. The test results show that the HPK method and the combination of proposed quantization can increase the KGR value with a low KDR value. In addition, the secret key bits generated can meet the NIST statistical test.

[1]  Ali Ridho Barakbah,et al.  An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication , 2018, 2018 Sixth International Symposium on Computing and Networking (CANDAR).

[2]  Wirawan Wirawan,et al.  Performance Analysis of Loss Multilevel Quantization on the Secret Key Generation Scheme in Indoor Wireless Environment , 2019 .

[3]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[4]  Hans D. Schotten,et al.  Enhancing Channel Reciprocity for Effective Key Management in Wireless Ad-Hoc Networks , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).

[5]  Derek Young,et al.  The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz. , 2010 .

[6]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[7]  Dieter Hogrefe,et al.  A survey on secret key generation mechanisms on the physical layer in wireless networks , 2015, Secur. Commun. Networks.

[8]  Wirawan,et al.  Performance evaluation of the key extraction schemes in wireless indoor environment , 2017, 2017 International Conference on Signals and Systems (ICSigSys).

[9]  Amang Sudarsono,et al.  A Reciprocity Approach for Shared Secret Key Generation Extracted from Received Signal Strength in The Wireless Networks , 2018, 2018 International Electronics Symposium on Engineering Technology and Applications (IES-ETA).

[10]  Wirawan,et al.  Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment , 2017, Int. J. Commun. Networks Inf. Secur..

[11]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[12]  Debasis Das,et al.  Secure message transmission algorithm for Vehicle to Vehicle (V2V) communication , 2016, 2016 IEEE Region 10 Conference (TENCON).

[13]  Li Zhou,et al.  Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase , 2017, Mob. Inf. Syst..

[14]  Prasant Mohapatra,et al.  Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.

[15]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..