This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Key Agreement Algorithms for Vehicular Communicatio

Creating secure communication channels in vehicular communication networks is an important topic that has not been well studied. A critical question is how to distribute secret keys between the communication partners. Vehicular networks typically include two different types of communication modes: vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) modes. In this paper, we propose two key agreement algorithms for V2V and V2I, respectively. The first algorithm allows two legitimate users (vehicles) to derive a common secret key through an information-theoretic manner. The second algorithm uses the channel diversity property to generate a secret key between a central server and the individual user. Through evaluation, we show that the proposed V2V key agreement algorithm achieves strong information-theoretic security with a secret bit generation rate much faster than previous work. Numerical analysis also shows that the proposed V2I key agreement scheme can prevent attacks from an adversary with high probability, even if it has a large number of eavesdroppers following the target user.

[1]  Neal Koblitz,et al.  An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm , 1998, CRYPTO.

[2]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[3]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[4]  Marco Gruteser,et al.  Improving robustness of key extraction from wireless channels with differential techniques , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[5]  Manpreet Singh,et al.  Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[6]  Jeong Hyun Yi,et al.  Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks , 2005, NETWORKING.

[7]  Owen Rees,et al.  Efficient and timely mutual authentication , 1987, OPSR.

[8]  Seong-Moo Yoo,et al.  Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[9]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[12]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[13]  Jeffrey I. Schiller,et al.  An Authentication Service for Open Network Systems. In , 1998 .

[14]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[15]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[16]  H. Sasaoka,et al.  A Scheme of Private key Agreement Based on Delay Profiles in UWB Systems , 2006, 2006 IEEE Sarnoff Symposium.

[17]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[18]  Aldar C.-F. Chan,et al.  Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[19]  Nitin H. Vaidya,et al.  Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[20]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[21]  Marco Gruteser,et al.  Random channel hopping schemes for key agreement in wireless networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.