2022 IEEE Intelligent Vehicles Symposium (IV) 2022
DOI: 10.1109/iv51971.2022.9827444
|View full text |Cite
|
Sign up to set email alerts
|

Cross-Layer Authentication based on Physical-Layer Signatures for Secure Vehicular Communication

Abstract: In recent years, research has focused on exploiting the inherent physical (PHY) characteristics of wireless channels to discriminate between different spatially separated network terminals, mitigating the significant costs of signature-based techniques. In this paper, the legitimacy of the corresponding terminal is firstly verified at the protocol stack's upper layers, and then the re-authentication process is performed at the PHYlayer. In the latter, a unique PHY-layer signature is created for each transmissi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…This facilitates legitimacy detection, as well as the exchange of authenticated Chebyshev probing sequences used to extract the symmetric shared key k. This key allows for re-authenticating the received messages sent from the same transmitter for the OFDM system of N subcarriers. This study extends our research introduced in [39]. In a two-step process, the identity of the corresponding terminal is re-authenticated using a PHY-layer signature-based identity authentication mechanism (PHY-SIAM), while the integrity of the attached data packet is verified using a PHY-layer feature tracking mechanism (PHY-FTM).…”
Section: Phy-layer Re-authentication Algorithmmentioning
confidence: 64%
“…This facilitates legitimacy detection, as well as the exchange of authenticated Chebyshev probing sequences used to extract the symmetric shared key k. This key allows for re-authenticating the received messages sent from the same transmitter for the OFDM system of N subcarriers. This study extends our research introduced in [39]. In a two-step process, the identity of the corresponding terminal is re-authenticated using a PHY-layer signature-based identity authentication mechanism (PHY-SIAM), while the integrity of the attached data packet is verified using a PHY-layer feature tracking mechanism (PHY-FTM).…”
Section: Phy-layer Re-authentication Algorithmmentioning
confidence: 64%
“…The RIS has been employed in various applications, such as satellite communications [12], physical-layer security [13], and internet-of-things (IoT) networks [14], demonstrating its versatility and the potential for diverse use cases. RISs comprise many passive reflecting units that can be placed at adaptable locations and independently alter the incident signal, therefore improving signal transmission [15]. In recent years, some researchers have applied RISs to the physical-layer security of wireless communications to improve the secrecy data rate under the wiretap channel, a concept referred to as keyless information theory security [16].…”
Section: Introductionmentioning
confidence: 99%
“…A large amount of sensing data can be integrated through the invehicle system and then sent through the 4G/5G wireless communication network. (1)(2)(3)(4)(5) Vehicleto-everything (V2X) is a communication technology between vehicles with different objects that may affect vehicular travel or may be affected by other traveling vehicles. V2X is a vehicular communication system that incorporates other more specific types of communication, such as vehicle-to-vehicle (V2V), vehicle-to-device (V2D), vehicle-to-network (V2N), vehicle-toinfrastructure (V2I), and vehicle-to-pedestrian (V2P).…”
Section: Introductionmentioning
confidence: 99%
“…V2X is a vehicular communication system that incorporates other more specific types of communication, such as vehicle-to-vehicle (V2V), vehicle-to-device (V2D), vehicle-to-network (V2N), vehicle-toinfrastructure (V2I), and vehicle-to-pedestrian (V2P). (1)(2)(3)(4)(5) The sensors used in the V2X technologies need to have the capabilities of sensing objects around corners and beyond any obstructions in a radius of up to several hundred meters. The main functions of V2X communication are to address the two main problems for vehicles traveling on roads: safety and mobility.…”
Section: Introductionmentioning
confidence: 99%