Secret Key Agreement for Data Dissemination in Vehicular Platoons

In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates messages to the following automated vehicles in a multi-hop vehicular network. However, due to the broadcast nature of wireless channels, this kind of communication is vulnerable to eavesdropping and message modification. Generating secret keys by extracting the shared randomness in a wireless fading channel is a promising way for wireless communication security. We study a security protocol for data dissemination in the platoon, where the vehicles cooperatively generate a shared secret key based on the quantized fading channel randomness. To improve conformity of the generated key, the probability of secret key agreement is formulated, and a novel secret key agreement algorithm is proposed to recursively optimize the channel quantization intervals, maximizing the key agreement probability. Numerical evaluations demonstrate that the key agreement probability achieved by our security protocol given different platoon size, channel quality, and number of quantization intervals. Furthermore, by applying our security protocol, the probability that the encrypted data being cracked by an eavesdropper is less than 5%.

[1]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[2]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[3]  Hans A. Hansson,et al.  The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication , 2016, 2016 Euromicro Conference on Digital System Design (DSD).

[4]  Xudong Wang,et al.  Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.

[5]  Xiang Zhang,et al.  A Survey on Platoon-Based Vehicular Cyber-Physical Systems , 2016, IEEE Communications Surveys & Tutorials.

[6]  Montserrat Ros,et al.  A Comparative Survey of VANET Clustering Techniques , 2017, IEEE Communications Surveys & Tutorials.

[7]  Eduardo Tovar,et al.  PELE: Power efficient legitimate eavesdropping via jamming in UAV communications , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[8]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[9]  Danya Yao,et al.  A Survey of Traffic Control With Vehicular Communications , 2014, IEEE Transactions on Intelligent Transportation Systems.

[10]  Eduardo Tovar,et al.  Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels , 2019, Sensors.

[11]  Jie Xu,et al.  Proactive Eavesdropping via Jamming over HARQ-Based Communications , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[12]  Eduardo Tovar,et al.  LCD: Low Latency Command Dissemination for a Platoon of Vehicles , 2018, 2018 IEEE International Conference on Communications (ICC).

[13]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[14]  Kin K. Leung,et al.  Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization , 2016, IEEE Transactions on Information Forensics and Security.

[15]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[16]  Falko Dressler,et al.  Let's talk in groups: A distributed bursting scheme for cluster-based vehicular applications , 2017, Veh. Commun..

[17]  Xin Wang,et al.  Energy-Efficient Cooperative Relaying for Unmanned Aerial Vehicles , 2016, IEEE Transactions on Mobile Computing.

[18]  Sanjay Jha,et al.  Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting , 2016, IEEE Transactions on Mobile Computing.

[19]  Robert A Ferlis The Dream of the Automated Highway , 2007 .

[20]  E. Chan Overview of the SARTRE Platooning Project: Technology Leadership Brief , 2012 .

[21]  Rong Jin,et al.  Practical Secret Key Agreement for Full-Duplex Near Field Communications , 2014, IEEE Transactions on Mobile Computing.

[22]  Prasant Mohapatra,et al.  Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.

[23]  Gregory D. Durgin,et al.  Space-Time Wireless Channels , 2002 .

[24]  Eduardo Tovar,et al.  Poster Abstract: Privacy-preserving Control Message Dissemination for PVCPS , 2019, 2019 18th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[25]  Anthony Bahadir Lopez,et al.  Physical Layer Key Generation for Wireless Communication Security in Automotive Cyber-Physical Systems , 2017 .

[26]  Stark C. Draper,et al.  Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.

[27]  Rong Jin,et al.  Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks , 2017, IEEE Transactions on Vehicular Technology.

[28]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[29]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[30]  Ning Zhang,et al.  Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design , 2014, IEEE Transactions on Information Forensics and Security.

[31]  MengChu Zhou,et al.  Routing in Internet of Vehicles: A Review , 2015, IEEE Transactions on Intelligent Transportation Systems.

[32]  Mohsen Guizani,et al.  Performance Evaluation of IEEE 802.15.4 Nonbeacon-Enabled Mode for Internet of Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[33]  Panlong Yang,et al.  SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.

[34]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[35]  Gregory Epiphaniou,et al.  Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks , 2018, IEEE Internet of Things Journal.

[36]  Eduardo Tovar,et al.  Energy Efficient Legitimate Wireless Surveillance of UAV Communications , 2019, IEEE Transactions on Vehicular Technology.

[37]  Eduardo Tovar,et al.  Cooperative Key Generation for Data Dissemination in Cyber-Physical Systems , 2018, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).

[38]  Guihai Chen,et al.  Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios , 2017, IEEE Transactions on Mobile Computing.

[39]  Hsiao-Hwa Chen,et al.  Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.

[40]  Chau Yuen,et al.  Cooperative relative positioning of mobile users by fusing IMU inertial and UWB ranging information , 2017, 2017 IEEE International Conference on Robotics and Automation (ICRA).

[41]  Song Guo,et al.  Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications , 2014, IEEE Transactions on Parallel and Distributed Systems.

[42]  Mohsen Guizani,et al.  Mapping-Varied Spatial Modulation for Physical Layer Security: Transmission Strategy and Secrecy Rate , 2018, IEEE Journal on Selected Areas in Communications.

[43]  Jinho Choi,et al.  Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack , 2015, IEEE Transactions on Wireless Communications.

[44]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[45]  Ronald Raulefs,et al.  Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications , 2017, IEEE Communications Surveys & Tutorials.

[46]  Tan Cheon Kheong,et al.  Autonomous Vehicles, Next Stop: Singapore , 2014 .

[47]  Tony Q. S. Quek,et al.  Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.

[48]  Yasser L. Morgan,et al.  Notes on DSRC & WAVE Standards Suite: Its Architecture, Design, and Characteristics , 2010, IEEE Communications Surveys & Tutorials.

[49]  Shi-Jinn Horng,et al.  Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs , 2017, IEEE Transactions on Vehicular Technology.