Skip to main content
main-content
Top

Hint

Swipe to navigate through the articles of this issue

Published in: Wireless Personal Communications 2/2022

07-06-2022

An Adaptive Lossly Quantization Technique for Key Extraction Applied in Vehicular Communication

Authors: Ibraheem Abdelazeem, Weibin Zhang, PhD Zhenping Zeng, M. S Abdeldime

Published in: Wireless Personal Communications | Issue 2/2022

Login to get access
share
SHARE

Abstract

Security in vehicular ad hoc network (VANET) is one of the major challenging topics and the secure key interchange between two legitimate vehicles is an important issue. The multi-environment of VANET has been exploited to extract the secret key and employed security services in VANET. However, it offered more excellence randomness owed to fading, noise multi-path, and velocity difference. Some of the factors like Bit-rate, complication and memory requests are reduced by using a process known as quantization. This paper proposes a new quantization method to extract the secret key for vehicular communications that uses a lossy quantizer in combination with information reconciliation and privacy amplification. Our work focuses on the quantization phase for the secret generation procedure. The comprehensive simulations display the propose method increases the zone and number of the quantization levels to utilize the maximum number of measurements to reduce reasonably the wasted measurements.
Literature
1.
go back to reference Rewashed, Z. Y., & Mahmud, S. M. (2011). Communications in vehicular networks. Mobile Ad-Hoc Networks: Applications, Cap, 2, 20. Rewashed, Z. Y., & Mahmud, S. M. (2011). Communications in vehicular networks. Mobile Ad-Hoc Networks: Applications, Cap, 2, 20.
2.
go back to reference Mansour, M., et al. (2018). VANET security and privacy—an overview. International Journal of Network Security and Its Applications, 10, 13–34. CrossRef Mansour, M., et al. (2018). VANET security and privacy—an overview. International Journal of Network Security and Its Applications, 10, 13–34. CrossRef
3.
go back to reference Lai, L., et al. (2013). Key generation from wireless channels. Physical Layer Security in Wireless Communications (pp. 47–92). Citeseer. Lai, L., et al. (2013). Key generation from wireless channels. Physical Layer Security in Wireless Communications (pp. 47–92). Citeseer.
4.
go back to reference Ahmed, W., & Elhadef, M. (2018). Securing Intelligent Vehicular Ad Hoc Networks: A Survey. Springer. CrossRef Ahmed, W., & Elhadef, M. (2018). Securing Intelligent Vehicular Ad Hoc Networks: A Survey. Springer. CrossRef
5.
go back to reference Ibraheem IA et al (2019) Analysis of Possible Security Attacks and Security Challenges Facing Vehicular-Ad Hoc Networks. Transportation 9.10: 11. Ibraheem IA et al (2019) Analysis of Possible Security Attacks and Security Challenges Facing Vehicular-Ad Hoc Networks. Transportation 9.10: 11.
6.
go back to reference Abdelgader, A. M. S., & Wu, L. (2014). A secret key extraction technique applied in vehicular networks. In 2014, IEEE 17th international conference on computational science and engineering. Abdelgader, A. M. S., & Wu, L. (2014). A secret key extraction technique applied in vehicular networks. In 2014, IEEE 17th international conference on computational science and engineering.
7.
go back to reference Chen, L., & Jiang, T. (2018). Key Generation Rate in the Full Duplex Relay Wireless Communication Network. in Communications, Signal Processing, and Systems. Springer Singapore. Chen, L., & Jiang, T. (2018). Key Generation Rate in the Full Duplex Relay Wireless Communication Network. in Communications, Signal Processing, and Systems. Springer Singapore.
8.
go back to reference Premnath, S. N., et al. (2013). Secret key extraction from wireless signal strength in real environments. IEEE Transactions on Mobile Computing, 12(5), 917–930. CrossRef Premnath, S. N., et al. (2013). Secret key extraction from wireless signal strength in real environments. IEEE Transactions on Mobile Computing, 12(5), 917–930. CrossRef
9.
go back to reference Ahmed, W., & Elhadef, M. (2018). Securing Intelligent Vehicular Ad Hoc Networks: A Survey. In Advances in Computer Science and Ubiquitous Computing. Springer Singapore. CrossRef Ahmed, W., & Elhadef, M. (2018). Securing Intelligent Vehicular Ad Hoc Networks: A Survey. In Advances in Computer Science and Ubiquitous Computing. Springer Singapore. CrossRef
10.
go back to reference Hu, J.-Y., et al. (2020). Security proof of the two-way quantum secure direct communication with channel loss and noise. EPL (Europhysics Letters), 129(1), 10004. CrossRef Hu, J.-Y., et al. (2020). Security proof of the two-way quantum secure direct communication with channel loss and noise. EPL (Europhysics Letters), 129(1), 10004. CrossRef
11.
go back to reference Hasrouny, H., et al. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20. CrossRef Hasrouny, H., et al. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20. CrossRef
12.
go back to reference Mukherjee, A., et al. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys and Tutorials, 16(3), 1550–1573. CrossRef Mukherjee, A., et al. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys and Tutorials, 16(3), 1550–1573. CrossRef
13.
go back to reference Bottarelli, M., et al. (2018). Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Computers and Security, 78, 454–476. CrossRef Bottarelli, M., et al. (2018). Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Computers and Security, 78, 454–476. CrossRef
14.
go back to reference Sampath, V., Karthik, S., & Sabitha, R. (2021). Position-based adaptive clustering model (PACM) for efficient data caching in vehicular named data networks (VNDN). Wireless Personal Communications, 117(4), 2955–2971. CrossRef Sampath, V., Karthik, S., & Sabitha, R. (2021). Position-based adaptive clustering model (PACM) for efficient data caching in vehicular named data networks (VNDN). Wireless Personal Communications, 117(4), 2955–2971. CrossRef
15.
go back to reference Zhang, J., Kasera, S. K., & Patwari, N. (2010). Mobility assisted secret key generation using wireless link signatures. In Proceedings of the 29th conference on Information communications, pp. 261-265. San Diego, California, USA: IEEE Press. Zhang, J., Kasera, S. K., & Patwari, N. (2010). Mobility assisted secret key generation using wireless link signatures. In Proceedings of the 29th conference on Information communications, pp. 261-265. San Diego, California, USA: IEEE Press.
16.
go back to reference Badawy, A., et al. (2016). Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Physical Communication, 19, 1–10. CrossRef Badawy, A., et al. (2016). Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Physical Communication, 19, 1–10. CrossRef
17.
go back to reference Mathur, S., et al. (2008). Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pp. 128–139. San Francisco, California, USA: ACM. Mathur, S., et al. (2008). Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pp. 128–139. San Francisco, California, USA: ACM.
18.
go back to reference Zeng, K. (2015). Physical layer key generation in wireless networks: challenges and opportunities. IEEE Communications Magazine, 53(6), 33–39. CrossRef Zeng, K. (2015). Physical layer key generation in wireless networks: challenges and opportunities. IEEE Communications Magazine, 53(6), 33–39. CrossRef
19.
go back to reference Li, X., et al. (2017). Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks. IEEE Access, 5, 5281–5291. CrossRef Li, X., et al. (2017). Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks. IEEE Access, 5, 5281–5291. CrossRef
20.
go back to reference Cunha, F., et al. (2016). Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44, 90–103. CrossRef Cunha, F., et al. (2016). Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44, 90–103. CrossRef
21.
go back to reference Sun, X., et al. (2011). Improved generation efficiency for key extracting from wireless channels. In 2011 IEEE international conference on communications (ICC). Sun, X., et al. (2011). Improved generation efficiency for key extracting from wireless channels. In 2011 IEEE international conference on communications (ICC).
22.
go back to reference Brassard, G., & Salvail, L. (1994). Secret-Key Reconciliation by Public Discussion. Springer. MATHCrossRef Brassard, G., & Salvail, L. (1994). Secret-Key Reconciliation by Public Discussion. Springer. MATHCrossRef
23.
go back to reference Bottarelli, M., et al. (2018). Quantisation feasibility and performance of RSS-based secret key extraction in VANETs. In 2018 International conference on cyber security and protection of digital services (Cyber Security). Bottarelli, M., et al. (2018). Quantisation feasibility and performance of RSS-based secret key extraction in VANETs. In 2018 International conference on cyber security and protection of digital services (Cyber Security).
24.
go back to reference Ever, Y. K. (2019). Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor networks. IEEE Systems Journal, 13(1), 456–467. CrossRef Ever, Y. K. (2019). Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor networks. IEEE Systems Journal, 13(1), 456–467. CrossRef
25.
go back to reference Bennett, C. H., et al. (1992). Experimental quantum cryptography. Journal of Cryptology, 5(1), 3–28. MATHCrossRef Bennett, C. H., et al. (1992). Experimental quantum cryptography. Journal of Cryptology, 5(1), 3–28. MATHCrossRef
27.
go back to reference Ismail, D. K. B., et al. (2019). Optimizing turbo codes for secret key generation in vehicular ad hoc networks. In A. Al-Masri (Ed.), Smart Technologies and Innovation for a Sustainable Future. Springer International Publishing. Ismail, D. K. B., et al. (2019). Optimizing turbo codes for secret key generation in vehicular ad hoc networks. In A. Al-Masri (Ed.), Smart Technologies and Innovation for a Sustainable Future. Springer International Publishing.
28.
go back to reference Badawy, A., et al. (2016). Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Physical Communication, 19, 1–10. CrossRef Badawy, A., et al. (2016). Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Physical Communication, 19, 1–10. CrossRef
29.
go back to reference Moara-Nkwe, K., et al. (2018). A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access, 6, 11374–11387. CrossRef Moara-Nkwe, K., et al. (2018). A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access, 6, 11374–11387. CrossRef
30.
go back to reference Johnson, J. S., et al. (2013). An analysis of error reconciliation protocols used in Quantum Key Distribution systems. The Journal of Defense Modeling and Simulation, 12(3), 217–227. CrossRef Johnson, J. S., et al. (2013). An analysis of error reconciliation protocols used in Quantum Key Distribution systems. The Journal of Defense Modeling and Simulation, 12(3), 217–227. CrossRef
31.
go back to reference Cencioni, P., & Di Pietro, R. (2008). A mechanism to enforce privacy in vehicle-to-infrastructure communication. Computer Communications, 31(12), 2790–2802. CrossRef Cencioni, P., & Di Pietro, R. (2008). A mechanism to enforce privacy in vehicle-to-infrastructure communication. Computer Communications, 31(12), 2790–2802. CrossRef
32.
go back to reference Mailloux, L. O., et al. (2015). Modeling decoy state Quantum Key Distribution systems. The Journal of Defense Modeling and Simulation, 12(4), 489–506. CrossRef Mailloux, L. O., et al. (2015). Modeling decoy state Quantum Key Distribution systems. The Journal of Defense Modeling and Simulation, 12(4), 489–506. CrossRef
33.
go back to reference Jiang, D., & Delgrossi, L. (2008). IEEE 802.11p: Towards an international standard for wireless access in vehicular environments. In VTC Spring 2008—IEEE vehicular technology conference. Jiang, D., & Delgrossi, L. (2008). IEEE 802.11p: Towards an international standard for wireless access in vehicular environments. In VTC Spring 2008—IEEE vehicular technology conference.
34.
go back to reference Kaemarungsi, K., & Krishnamurthy, P. (2012). Analysis of WLAN’s received signal strength indication for indoor location fingerprinting. Pervasive and Mobile Computing, 8(2), 292–316. CrossRef Kaemarungsi, K., & Krishnamurthy, P. (2012). Analysis of WLAN’s received signal strength indication for indoor location fingerprinting. Pervasive and Mobile Computing, 8(2), 292–316. CrossRef
35.
go back to reference Qu, F., et al. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6), 2985–2996. CrossRef Qu, F., et al. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6), 2985–2996. CrossRef
Metadata
Title
An Adaptive Lossly Quantization Technique for Key Extraction Applied in Vehicular Communication
Authors
Ibraheem Abdelazeem
Weibin Zhang
PhD Zhenping Zeng
M. S Abdeldime
Publication date
07-06-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09794-9

Other articles of this Issue 2/2022

Wireless Personal Communications 2/2022 Go to the issue