2020
DOI: 10.24003/emitter.v8i1.493
|View full text |Cite
|
Sign up to set email alerts
|

Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication

Abstract: One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize the characteristics of wireless channels have been implemented. However, existing schemes still produce a low bit formation rate (BFR) even though they can reach a low bit error rate (BER). Note that V2V communication requires a scheme with high BFR in order to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…In paper (Dewi et al, 2020) (Sudarsono et al, 2019) (Wei et al, 2013) states that the SKG scheme consists of four stages which includes exchanging channel information between users to obtain RSS measurements via the channel probing stage, as well as converting the obtained RSS into binary bit form via the quantization stage, using an error correction scheme, the information reconciliation stage corrects the binary bit sequence obtained in the previous stage, and the privacy amplification stage increases the protection of the hidden key bit sequence to prevent it from being predicted by third parties.…”
Section: Introductionmentioning
confidence: 99%
“…In paper (Dewi et al, 2020) (Sudarsono et al, 2019) (Wei et al, 2013) states that the SKG scheme consists of four stages which includes exchanging channel information between users to obtain RSS measurements via the channel probing stage, as well as converting the obtained RSS into binary bit form via the quantization stage, using an error correction scheme, the information reconciliation stage corrects the binary bit sequence obtained in the previous stage, and the privacy amplification stage increases the protection of the hidden key bit sequence to prevent it from being predicted by third parties.…”
Section: Introductionmentioning
confidence: 99%