2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6567032
|View full text |Cite
|
Sign up to set email alerts
|

Extracting secret key from wireless link dynamics in vehicular environments

Abstract: Abstract-A crucial component of vehicular network security is to establish a secure wireless channel between any two vehicles. In this paper, we propose a scheme to allow two cars to extract a secret key from RSSI (Received Signal Strength Indicator) values in such a way that nearby cars cannot obtain the same secret. Our solution can be executed in noisy, outdoor vehicular environments. We also propose an online parameter learning mechanism to adapt to different channel conditions. We conduct extensive realwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(37 citation statements)
references
References 20 publications
0
37
0
Order By: Relevance
“…Key generation can exploit different properties of wireless channel, including received signal strength (RSS), channel phase, and CSI [22], [23]. RSS has been widely applied for key extraction in the practical implementation as it is readily available [2], [9], [24], [25], [26], [27], [28], [29], [30]. RSS-based key generation is affected by the channel variations between the measurements in TDD systems, which can be alleviated by fractional interpolation filtering [9], [27].…”
Section: Related Workmentioning
confidence: 99%
“…Key generation can exploit different properties of wireless channel, including received signal strength (RSS), channel phase, and CSI [22], [23]. RSS has been widely applied for key extraction in the practical implementation as it is readily available [2], [9], [24], [25], [26], [27], [28], [29], [30]. RSS-based key generation is affected by the channel variations between the measurements in TDD systems, which can be alleviated by fractional interpolation filtering [9], [27].…”
Section: Related Workmentioning
confidence: 99%
“…Non-identical channel measurements introduce key disagreement, while a too high KDR may result in a failure of the entire key generation process. There has been research in compensating the nonsimultaneous measurements using interpolation [15], [16] and suppressing the noise by filtering [11], [21], [22], [31]. However, the cross-correlation of the channel measurements has not yet been modelled theoretically, therefore, the design of the interpolation or filter algorithms are mainly empirical, resulting in a less effective improvement on the correlation.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, there are many approaches to ensure channel reciprocity in wireless systems, such as interpolation and filtering [28]. The interpolation methods emulate the identical channel measurement times at the nodes [29,30] and the filtering methods eliminate the high frequency components in noise [31,32]. Unfortunately, these techniques are not perfect.…”
Section: Next Channel Number Generation Schemementioning
confidence: 99%