An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication

Security in the vehicular ad-hoc networks currently has become a very important issue that has to be considered along with many applications related to vehicular networks deployment. This challenge grows up because the engagement of embedded systems be the main equipment in vehicles' on-board units (OBUs). OBU may communicate with each other or vehicle-to-vehicle and interact with equipments installed on the road side units (RSUs). This fact formalizes a new trend of threats and attacks in the vehicular networks to fully exploit and control transportation systems. Therefore, a security system in this network should be necessarily implemented. In this paper, we propose an implementation of shared key generation extracted from received signal strength (RSS) in the wireless communication between two authorized vehicles incorporated with symmetric cryptosystem to realize a security system which able to keep the confidentiality and integrity of the exchange information. We adopted several algorithms to enhance the correlation of RSS values between these two vehicles, increase key generation rate (KGR), and reduce key disagreement rate (KDR). The secrecy of the key is also ensured to pass the National Institute of Standard and Technology (NIST) statistical test suite.

[1]  Hans D. Schotten,et al.  Enhancing Channel Reciprocity for Effective Key Management in Wireless Ad-Hoc Networks , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).

[2]  Rakesh Kumar,et al.  VANET security: Issues, challenges and solutions , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[3]  Mohammad Abdullah Al Faruque,et al.  Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[4]  Pascal Lorenz,et al.  Wireless communication technologies for ITS applications [Topics in Automotive Networking] , 2010, IEEE Communications Magazine.

[5]  Marco Gruteser,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Key Agreement Algorithms for Vehicular Communicatio , 2022 .

[6]  Christian T. Zenger Physical-layer security for the internet of things , 2017 .

[7]  Sneha Kumar Kasera,et al.  Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration , 2014, TOSN.

[8]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[9]  Greg Welch,et al.  Welch & Bishop , An Introduction to the Kalman Filter 2 1 The Discrete Kalman Filter In 1960 , 1994 .

[10]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[11]  Mohamed Azab,et al.  Survey on Security Issues in Vehicular Ad Hoc Networks , 2015 .

[12]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[13]  Jie Yang,et al.  Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.

[14]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[15]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .