Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication
Abstract
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize the characteristics of wireless channels have been implemented. However, existing schemes still produce a low bit formation rate (BFR) even though they can reach a low bit error rate (BER). Note that V2V communication requires a scheme with high BFR in order to fulfill its main goal of improving road safety. In this research, we propose a higher rate secret key formation (HRKF) scheme using received signal strength (RSS) as a source of random information. The focus of this research is to produce keys with high BFR without compromising BER. To reduce bit mismatch, we propose a polynomial regression method that can increase channel reciprocity. We also propose a fixed threshold quantization (FTQ) method to maintain the number of bits so that the BFR increases. The test results show that the HRKF scheme can increase BFR from 40% up to 100% compared to existing research schemes. To ensure the key cannot be guessed by the attacker, the HRKF scheme succeeds in producing a key that meets the randomness of the NIST test.
Downloads
References
M.S. Sheikh, J. Liang, and W. Wang, A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs), Sensors, vol. 19, pp. 1-40, 2019. DOI: https://doi.org/10.3390/s19163589
H.P.D. Nguyen and R. Zoltan, The Current Security Challenges of Vehicle Communication in the Future Transportation System, International Symposium on Intelligent Systems and Informatics, pp. 161-165, 2018. DOI: https://doi.org/10.1109/SISY.2018.8524773
R. Al-Mutiri, M. Al-Rodhaan, and Y. Tian, Improving Vehicular Authentication in VANET using Cryptography, International Journal of Communication Networks and Information Security (IJCNIS), vol. 10, no. 1, pp. 248-255, 2018.
M.S. Sheikh and J. Liang, A Comprehensive Survey on VANET Security Services in Traffic Management System, Hindawi Wireless Communication and Mobile Computing, vol. 2019, pp. 1-23, 2019.
M.B Mansour, C. Salama, H.K. Mohamed, and S.A. Hammad, VANET Security and Privacy – An Overview, International Journal of Network Security & Its Applications (IJNSA), vol. 10, no. 2, pp. 13-34, 2018. DOI: https://doi.org/10.5121/ijnsa.2018.10202
A. Ambekar, M. Hassan, and H.D. Schotten, Improving Channel Reciprocity for Effective Key Management Systems, Conference Proceeding International Symposium Signal Systems Electronic, pp. 1-4, 2012. DOI: https://doi.org/10.1109/ISSSE.2012.6374318
R. Lin, L. Xu, H. Fang, and C. Huang, Efficient Physical Layer Key Generation Technique in Wireless Communications, EURASIP Journal on Wireless Communications and Networking, pp. 1-15, 2020. DOI: https://doi.org/10.1186/s13638-019-1634-7
J. Zhang, T.Q. Duong, A. Marshall, and R. Woods, Key Generation from Wireless Channels: A Review, IEEE Access, vol. 4, pp. 614-626, 2016. DOI: https://doi.org/10.1109/ACCESS.2016.2604618
A. Sudarsono, M. Yuliana, and P. Kristalina, A Reciprocity Approach for Shared Secret Key Generation Extracted from Received Signal Strength in the Wireless Networks, International Electronics Symposium Engineering Technology and Applications (IES-ETA), pp. 170-175, 2018. DOI: https://doi.org/10.1109/ELECSYM.2018.8615568
O.A. Topal, G.K. Kurt, and B. Ozbek, Key Error Rates in Physical Layer Key Generation: Theoritical Analysis and Measurement-Based Verification, IEEE Wireless Communications Letters, vol. 6, no. 6, pp. 766-769, 2017. DOI: https://doi.org/10.1109/LWC.2017.2740290
H. Fang, X. Wang, and L. Hanzo, Learning-Aided Physical Layer Authentication as an Intelligent Process, IEEE Transactions on Communications, vol. 67, no. 3, pp. 2260-2273, 2019.
L. Cheng, L. Zhou, B. Seet, D. Ma, and J. Wei, Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase, Hindawi Mobile Information Systems, vol. 2017, pp. 1-13, 2017.
K. Moara-Nkwe, Q. Shi, G.M. Lee, and M.H. Eiza, A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensors Networks, IEEE Access, vol. 4, pp. 1-15, 2016.
M. Yuliana, Wirawan, and Suwadi, An Efficient Key Generation for the Internet of Things Based Synchronized Quantization, Sensors, vol. 19, pp. 1-25, 2019. DOI: https://doi.org/10.3390/s19122674
D. Kreiser et al, On Wireless Channel Parameters for Key Generation in Industrial Environments, IEEE Access, vol. 5, pp. 79010-79025, 2017.
X. Zhu, F. Xu, E. Novak, and C.C. Tan, Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios, IEEE Transactions on Mobile Computing, pp. 1-14, 2017.
M. Yuliana, Wirawan, and Suwadi, Performance Evaluation of the Key Extraction Schemes in Wireless Indoor Environment, International Conference on Signals and Systems (ICSigSys), pp. 138-144, 2017. DOI: https://doi.org/10.1109/ICSIGSYS.2017.7967029
A. Sudarsono, M. Yuliana, P. Kristalina, and A.R. Barakbah, An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication, Sixth International Symposium on Computing and Networking (CANDAR), pp. 57-65, 2018. DOI: https://doi.org/10.1109/CANDAR.2018.00015
Y.E.H. Shehaded and D. Hogrefe, A Survey on Secret Key Generation Mechanisms on the Physical Layer in Wireless Networks, Security and Communication Networks, vol 8, pp. 332-341, 2015. DOI: https://doi.org/10.1002/sec.973
X. Li, J. Liu, Q. Yao, and J. Ma, Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks, IEEE Access, vol. 5, pp. 5281-5291, 2017.
M. Yuliana, Wirawan, and Suwadi, Performance Analysis of Loss Multilevel Quantization on the Secret Key Generation Scheme in Indoor Wireless Environment, International Journal on Advanced Science Engineering Information Technology, vol. 9, no. 1, pp. 100-108, 2019. DOI: https://doi.org/10.18517/ijaseit.9.1.7583
I.T. Dewi, A. Sudarsono, P. Kristalina, and M. Yuliana, Reciprocity Enhancemenr in V2V Key Generation System by using HPK Method, International Electronic Symposium (IES), pp. 6-13, 2019. DOI: https://doi.org/10.1109/ELECSYM.2019.8901616
M. Yuliana, Wirawan, and Suwadi, Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment, International Journal of Communication Networks and Information Security (IJCNIS), vol. 9, no. 3, pp. 474-483, 2017.
D.N. Purnamasari, A. Sudarsono, and P. Kristalina, Medical Image Encryption Using Modified Identity Based Encryption, EMITTER International Journal of Engineering Technology, vol. 7, no. 2, pp. 524-536, 2019. DOI: https://doi.org/10.24003/emitter.v7i2.405
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, Wireless Secret Key Generation Exploiting Reactance-Domain Scalar Response of Multipath Fading Channels, IEEE Transactions on Antennas and Propagation, vol 53, no. 11, pp. 3776-3784, 2005.
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel, Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 128-139, 2008. DOI: https://doi.org/10.1145/1409944.1409960
S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, and S.V. Krishnamurthy, On the Effectiveness os Secret Key Extraction from Wireless Signal Strength in Real Environments, Proceedings of the 15th ACM International Conference on Mobile Computing and Networking, pp. 321-332, 2009. DOI: https://doi.org/10.1145/1614320.1614356
A. Ambekar and H.D. Schotten, Enhancing Channel Reciprocity for Effective Key Management in Wireless Ad-hoc Networks, Conference Vehicular Technology (VTC Spring), 2014. DOI: https://doi.org/10.1109/VTCSpring.2014.7022913
Copyright (c) 2020 EMITTER International Journal of Engineering Technology
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The copyright to this article is transferred to Politeknik Elektronika Negeri Surabaya(PENS) if and when the article is accepted for publication. The undersigned hereby transfers any and all rights in and to the paper including without limitation all copyrights to PENS. The undersigned hereby represents and warrants that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required. The undersigned represents that he/she has the power and authority to make and execute this assignment. The copyright transfer form can be downloaded here .
The corresponding author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s) where applicable. After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted.
Retained Rights/Terms and Conditions
- Authors retain all proprietary rights in any process, procedure, or article of manufacture described in the Work.
- Authors may reproduce or authorize others to reproduce the work or derivative works for the author’s personal use or company use, provided that the source and the copyright notice of Politeknik Elektronika Negeri Surabaya (PENS) publisher are indicated.
- Authors are allowed to use and reuse their articles under the same CC-BY-NC-SA license as third parties.
- Third-parties are allowed to share and adapt the publication work for all non-commercial purposes and if they remix, transform, or build upon the material, they must distribute under the same license as the original.
Plagiarism Check
To avoid plagiarism activities, the manuscript will be checked twice by the Editorial Board of the EMITTER International Journal of Engineering Technology (EMITTER Journal) using iThenticate Plagiarism Checker and the CrossCheck plagiarism screening service. The similarity score of a manuscript has should be less than 25%. The manuscript that plagiarizes another author’s work or author's own will be rejected by EMITTER Journal.
Authors are expected to comply with EMITTER Journal's plagiarism rules by downloading and signing the plagiarism declaration form here and resubmitting the form, along with the copyright transfer form via online submission.