Cooperative Secret Key Generation for Platoon-Based Vehicular Communications

In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates messages to the following automated vehicles in a multi-hop vehicular network. However, due to the broadcast nature of wireless channels, vehicle-to-vehicle (V2V) communications are vulnerable to eavesdropping and message modification. Generating secret keys by extracting the shared randomness in a wireless fading channel is a promising way for V2V communication security. We study a security scheme for platoon-based V2V communications, where the platooning vehicles generate a shared secret key based on the quantized fading channel randomness. To improve conformity of the generated key, the probability of secret key agreement is formulated, and a novel secret key agreement algorithm is proposed to recursively optimize the channel quantization intervals, maximizing the key agreement probability. Numerical evaluations demonstrate that the key agreement probability achieved by our security protocol given different platoon size, channel quality, and number of quantization intervals. Furthermore, by applying our security protocol, it is shown that the probability that the encrypted data being cracked by an eavesdropper is less than 5%.

[1]  Eduardo Tovar,et al.  Energy Efficient Legitimate Wireless Surveillance of UAV Communications , 2019, IEEE Transactions on Vehicular Technology.

[2]  Hans A. Hansson,et al.  The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication , 2016, 2016 Euromicro Conference on Digital System Design (DSD).

[3]  Xudong Wang,et al.  Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.

[4]  Rong Jin,et al.  Practical Secret Key Agreement for Full-Duplex Near Field Communications , 2014, IEEE Transactions on Mobile Computing.

[5]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[6]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[7]  Kin K. Leung,et al.  Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization , 2016, IEEE Transactions on Information Forensics and Security.

[8]  E. Chan Overview of the SARTRE Platooning Project: Technology Leadership Brief , 2012 .

[9]  Xiang Zhang,et al.  A Survey on Platoon-Based Vehicular Cyber-Physical Systems , 2016, IEEE Communications Surveys & Tutorials.

[10]  Eduardo Tovar,et al.  PELE: Power efficient legitimate eavesdropping via jamming in UAV communications , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[11]  Eduardo Tovar,et al.  LCD: Low Latency Command Dissemination for a Platoon of Vehicles , 2018, 2018 IEEE International Conference on Communications (ICC).

[12]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[13]  Mohsen Guizani,et al.  Performance Evaluation of IEEE 802.15.4 Nonbeacon-Enabled Mode for Internet of Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[14]  Mohsen Guizani,et al.  Mapping-Varied Spatial Modulation for Physical Layer Security: Transmission Strategy and Secrecy Rate , 2018, IEEE Journal on Selected Areas in Communications.

[15]  Jinho Choi,et al.  Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack , 2015, IEEE Transactions on Wireless Communications.