2018
DOI: 10.1109/jiot.2017.2764384
|View full text |Cite
|
Sign up to set email alerts
|

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks

Abstract: Abstract-The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised for the generation of highly random and symmetric cryptographic keys. However, in physical-layer key agreement, non-reciprocity due to inherent channel noise and hardware impairments can propagate bit disagreements which have to be addressed prior to the symmetric key generation which is inherently important in social IoT networks. This work parametrically models temporal variability attributes such as … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 58 publications
(91 reference statements)
0
20
0
Order By: Relevance
“…(2) when the cluster has alert_1 and alert_2 and the other alerts "alert_3 and alert_4 " are missed; (3) when the 510 cluster has alert_1 and alert_3 and the other alerts "alert_2 and alert_4 " are missed; (4) when the cluster has alert_2 and alert_3 and the other alerts "alert_1 and alert_4 " are missed; (5) when the cluster has alert_1 and the other alerts "alert_2, alert_3, and alert_4 " are missed; (6) when the cluster has alert_2 and the other alerts "alert_1, alert_3, and alert_4 " are missed; 515 (7) and when the cluster has alert_3 and the other alerts "alert_1, alert_2, and alert_4 " are missed.…”
Section: Implementation Of the Alerts Clustering (Ac) Modulementioning
confidence: 99%
See 1 more Smart Citation
“…(2) when the cluster has alert_1 and alert_2 and the other alerts "alert_3 and alert_4 " are missed; (3) when the 510 cluster has alert_1 and alert_3 and the other alerts "alert_2 and alert_4 " are missed; (4) when the cluster has alert_2 and alert_3 and the other alerts "alert_1 and alert_4 " are missed; (5) when the cluster has alert_1 and the other alerts "alert_2, alert_3, and alert_4 " are missed; (6) when the cluster has alert_2 and the other alerts "alert_1, alert_3, and alert_4 " are missed; 515 (7) and when the cluster has alert_3 and the other alerts "alert_1, alert_2, and alert_4 " are missed.…”
Section: Implementation Of the Alerts Clustering (Ac) Modulementioning
confidence: 99%
“…This trend is currently being driven by cyber warfare and the emergence of the Internet of Things [1][2][3]. The annual cost of cyber attacks was $3 trillion in 2015 and it is expected to increase to more than $6 trillion per annum by 5 2021 [4]. This high cost has brought much interest in research and investment towards developing new cyber attacks defence methods and techniques [5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…A channel gain complement method is developed to reduce the non-reciprocity of RSS in the key generation. In [31], the vehicle-to-vehicle communication characteristics, e.g., multipath propagation and surrounding scatterers' mobility, are incorporated in the key generation process. The non-reciprocity compensation method in [27] is used by the transmitter to generate the secret key according to designated RSS, while Turbo codes are used for channel information reconciliation of multiple links.…”
Section: Link-based Secret Key Generationmentioning
confidence: 99%
“…A modified version of Mathur et al lossy scheme is proposed in [17] where m consecutive excursions need not be on the same side (either below the lower threshold or above higher threshold). Despite being more influenced by sharp magnitude changes, resulting bit-streams are the direct concatenation of whole quantised excursions instead of considering only the exchanged indices, as in the inspiring protocol.…”
Section: B Quantisation Schemesmentioning
confidence: 99%
“…None of the previous schemes considers the presence and the possible interactions among vehicles and intermediate objects. Work in [17] incorporates three-dimensional scattering and scatterers' mobility to obtain a more realistic system model and corresponding simulation [18]. The application of a non-reciprocity compensation technique in conjunction with an information reconciliation phase based on turbo codes, record a significant improvement in both key generation rate and bit mismatch rate (defined in Section 3).…”
Section: Introductionmentioning
confidence: 99%