Exploiting the Randomness Inherent of the Channel for Secret Key Sharing in Vehicular Communications

Vehicular Ad Hoc networks (VANETs) have been employed in supporting several applications related to safety and comfort. VANET applications have strict security requirements, as they have direct impact on people comfort and safety. Although many ordinary networks security systems can be applied to provide security services in VANET, the key establishment between legitimate vehicles is the common challenge among all of these systems. This paper proposes a secret key establishment technique for vehicular communications exploiting the special properties and randomness inherent of the wireless channel. Our comprehensive simulations show that the proposed key extraction technique suits VANETs rather than other communication systems, owing to the multi environments operation of VANET which causes more randomness due to fading, noise multipath and velocity variation. The proposed approach can be tuned to extract low or high rate secret key with high entropy rate and less information exchange between legitimate vehicles. The extracted secret key can be employed to support providing security services in VANET.

[1]  Hisato Iwai,et al.  Reliability-Based Sliced Error Correction in Secret Key Agreement from Fading Channel , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[2]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[3]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[4]  Qiwu Wu,et al.  A hierarchical security architecture of VANET , 2013 .

[5]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[6]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[7]  Lenan Wu,et al.  Joint optimisation of secret key capacity and sparse channel estimation based on pilot power allocation , 2015 .

[8]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[9]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[10]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[11]  Alex Reznik,et al.  Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.

[12]  Leonid A. Levin,et al.  Pseudo-random generation from one-way functions , 1989, STOC '89.

[13]  Havish Koorapaty,et al.  Secure information transmission for mobile radio , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[14]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[15]  Wu Lenan,et al.  The Physical Layer of the IEEE 802.11p WAVE Communication Standard: The Specifications and Challenges , 2014 .

[16]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[17]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[18]  Ming Jiang,et al.  Improved Generation Efficiency for Key Extracting from Wireless Channels , 2011, 2011 IEEE International Conference on Communications (ICC).

[19]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[20]  Alex Reznik,et al.  On the Secrecy Capabilities of ITU Channels , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[21]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[22]  Azzedine Boukerche,et al.  A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET , 2012, IEEE Transactions on Vehicular Technology.

[23]  Fibirova Jana,et al.  Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .

[24]  K. Kaemarungsi,et al.  Distribution of WLAN received signal strength indication for indoor location determination , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[25]  Azzedine Boukerche,et al.  DRIVE: An efficient and robust data dissemination protocol for highway and urban vehicular ad hoc networks , 2014, Comput. Networks.

[26]  Christof Paar,et al.  Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation , 2014 .

[27]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[28]  Sushmita Ruj,et al.  A social network approach to trust management in VANETs , 2012, Peer-to-Peer Networking and Applications.

[29]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.