Abstract:One solution to ensure secrecy in the Internet of Things (IoT) is cryptography. However, classical cryptographic systems require high computational complexity that is not appropriate for IoT devices with restricted computing resources, energy, and memory. Physical layer security that utilizes channel characteristics is an often used solution because it is simpler and more efficient than classical cryptographic systems. In this paper, we propose a signal strength exchange (SSE) system as an efficient key genera… Show more
“…The authors of [23,24] first give the experimental results of the scheme based on the received signal strength to generate the key. In 2019, Mike's work [25] in sensors seem to avoid error-correcting, but it is not flexible and abandons some of the measurement results. In Jiang's work [12], it achieves a real outdoor environment experiment and uses the Bluetooth to communicate and collect the RSSI signal.…”
Section: Related Workmentioning
confidence: 99%
“…However, they do not propose a real application. The most commonly used channel characteristics include RSSI [12,[23][24][25][26], and some works mentioned in [27] used channel state information (CSI) [28][29][30][31][32][33], including channel impulse response (CIR) and channel frequency response (CFR).…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, we need an algorithm to reduce the correlation. For these reasons, we adopt the level-crossing algorithm [25]. It reduces the correlation between RSSI signals.…”
In recent years, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication brings more and more attention from industry (e.g., Google and Uber) and government (e.g., United States Department of Transportation). These Vehicle-to-Everything (V2X) technologies are widely adopted in future autonomous vehicles. However, security issues have not been fully addressed in V2V and V2I systems, especially in key distribution and key management. The physical layer key generation, which exploits wireless channel reciprocity and randomness to generate secure keys, provides a feasible solution for secure V2V/V2I communication. It is lightweight, flexible, and dynamic. In this paper, the physical layer key generation is brought to the V2I and V2V scenarios. A LoRa-based physical key generation scheme is designed for securing V2V/V2I communications. The communication is based on Long Range (LoRa) protocol, which is able to measure Received Signal Strength Indicator (RSSI) in long-distance as consensus information to generate secure keys. The multi-bit quantization algorithm, with an improved Cascade key agreement protocol, generates secure binary bit keys. The proposed schemes improved the key generation rate, as well as to avoid information leakage during transmission. The proposed physical layer key generation scheme was implemented in a V2V/V2I network system prototype. The extensive experiments in V2I and V2V environments evaluate the efficiency of the proposed key generation scheme. The experiments in real outdoor environments have been conducted. Its key generation rate could exceed 10 bit/s on our V2V/V2I network system prototype and achieve 20 bit/s in some of our experiments. For binary key sequences, all of them pass the suite of statistical tests from National Institute of Standards and Technology (NIST).
“…The authors of [23,24] first give the experimental results of the scheme based on the received signal strength to generate the key. In 2019, Mike's work [25] in sensors seem to avoid error-correcting, but it is not flexible and abandons some of the measurement results. In Jiang's work [12], it achieves a real outdoor environment experiment and uses the Bluetooth to communicate and collect the RSSI signal.…”
Section: Related Workmentioning
confidence: 99%
“…However, they do not propose a real application. The most commonly used channel characteristics include RSSI [12,[23][24][25][26], and some works mentioned in [27] used channel state information (CSI) [28][29][30][31][32][33], including channel impulse response (CIR) and channel frequency response (CFR).…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, we need an algorithm to reduce the correlation. For these reasons, we adopt the level-crossing algorithm [25]. It reduces the correlation between RSSI signals.…”
In recent years, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication brings more and more attention from industry (e.g., Google and Uber) and government (e.g., United States Department of Transportation). These Vehicle-to-Everything (V2X) technologies are widely adopted in future autonomous vehicles. However, security issues have not been fully addressed in V2V and V2I systems, especially in key distribution and key management. The physical layer key generation, which exploits wireless channel reciprocity and randomness to generate secure keys, provides a feasible solution for secure V2V/V2I communication. It is lightweight, flexible, and dynamic. In this paper, the physical layer key generation is brought to the V2I and V2V scenarios. A LoRa-based physical key generation scheme is designed for securing V2V/V2I communications. The communication is based on Long Range (LoRa) protocol, which is able to measure Received Signal Strength Indicator (RSSI) in long-distance as consensus information to generate secure keys. The multi-bit quantization algorithm, with an improved Cascade key agreement protocol, generates secure binary bit keys. The proposed schemes improved the key generation rate, as well as to avoid information leakage during transmission. The proposed physical layer key generation scheme was implemented in a V2V/V2I network system prototype. The extensive experiments in V2I and V2V environments evaluate the efficiency of the proposed key generation scheme. The experiments in real outdoor environments have been conducted. Its key generation rate could exceed 10 bit/s on our V2V/V2I network system prototype and achieve 20 bit/s in some of our experiments. For binary key sequences, all of them pass the suite of statistical tests from National Institute of Standards and Technology (NIST).
“…The last paper proposes a signal strength exchange (SSE) system as an efficient key generation system and a synchronized quantization method as a part of the SSE system that synchronizes data blocks in the quantization phase [7]. The performance analysis at the IoT devices equipped with IEEE 802.11 radio demonstrates that the SSE system is more efficient in terms of computing time and communication overhead than existing systems.…”
Section: Submissions Review Process Summary Of Contributionsmentioning
This Special Issue is focused on breakthrough developments in the field of Wireless Systems and Networks in the IoT. The selected contributions report current scientific progress in a wide range of topics covering clock error compensation in sensor networks, backscatter communication networks, Radio-Frequency Identification (RFID)-based inventory management, resource allocation in Long-Term Evolution (LTE)/LTE-A, (Long Range Wide-Area Network (LoRaWAN) modeling and key generation for the IoT.
“…The SKG used the characteristics of wireless channels that are unpredictable and random [9], 10]. The fundamental of channel reciprocity is used to show the similarity of channel characteristics of the sender and receiver if the measurement is in the coherence time [11]. There are several parameters for obtaining information from a wireless network channel: received signal strength (RSS) [12], [13], channel status information (CSI) [14], and channel impulse response (CIR) [15].…”
Vehicular ad-hoc network is an exciting study that aims to improve driver safety in driving. Vehicle-to-vehicle (V2V) is communications between vehicles that occurs on a VANET using wireless channels. This channel allows vehicles to share personal or safety information with other vehicles. Vehicle communication is potentially vulnerable to adversaries' security attacks that can harm the driver and other legitimate users. Therefore, it requires a high-security system. This research proposes a new scheme, namely the MAPI (Mike-Amang-Prima-Inka), as a modified secret key generation scheme obtained from received signal strength (RSS) values. Our research focuses on obtaining a symmetric key that has a high key formation speed (KFS) with a low-key discrepancy level (KDL), while still thinking about the randomness and ensure safety from passive attackers. In the pre-processing, we use a combination of Kalman Filter and Polynomial Regression by modifying the parameters to produce the best performance. We also modified the grey code in the Modified Multibit (MMB) Quantization method to reduce the quantization bit mismatch. Our approach to the MAPI scheme can assign symmetric keys with better performance than existing schemes, increasing KFS and decreasing KDL up to 100%. Moreover, the scheme can generate a symmetric key that deals with NIST's statistical tests.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.