2014
DOI: 10.1142/s021947751550008x
|View full text |Cite
|
Sign up to set email alerts
|

On KLJN-based Secure Key Distribution in Vehicular Communication Networks

Abstract: In a former paper [Fluct. Noise Lett., 13 (2014) 1450020] we introduced a vehicular communication system with unconditionally secure key exchange based on the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution scheme. In this paper, we address the secure KLJN key donation to vehicles. This KLJN key donation solution is performed lane-by-lane by using roadside key provider equipment embedded in the pavement. A method to compute the lifetime of the KLJN key is also given. This key lifetime depends on the car d… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 33 publications
(86 reference statements)
0
7
0
Order By: Relevance
“…This section presents the simulations and numerical results for the optimization problems formulated in Eqs. (15) and (18). We will compare these results to those obtained in [38], where similar optimization techniques were applied to the ideal, symmetric KLJN secure key exchanger when implementing the noise voltage measurement mode only.…”
Section: Simulations and Numerical Resultsmentioning
confidence: 87%
See 1 more Smart Citation
“…This section presents the simulations and numerical results for the optimization problems formulated in Eqs. (15) and (18). We will compare these results to those obtained in [38], where similar optimization techniques were applied to the ideal, symmetric KLJN secure key exchanger when implementing the noise voltage measurement mode only.…”
Section: Simulations and Numerical Resultsmentioning
confidence: 87%
“…The simplicity and performance of the KLJN secure key exchanger have been con¯rmed through its experimental demonstration [4], whose results have motivated proposals for modi¯cations to the system to improve its speed, coverage and safety [9][10][11][12]. Furthermore, a large number of potential applications have been suggested through the years, including secure key distribution in Smart Grids [13], security in vehicular communications [14,15] and computers [16]; as well as protection in components of hardware, processors and mass storage devices, among others [17].…”
Section: Introductionmentioning
confidence: 99%
“…The star network could be utilized in many situations including vehicle information networks [48,49] and inside equipment with components spread around a central processing unit such as a computer. Table 4 compares the fully connected network with N − 1 key exchangers per host denoted by FCN N −1 , the fully connected network with 1 key exchanger per host denoted by FCN 1 , the linear chain network protocol with 2 key exchangers per hosts is denoted by LCH, and the star network protocol with 1 communicator per host denoted by STAR.…”
Section: Symbolmentioning
confidence: 99%
“…are available [1]. Unconditional security is essential in intelligent vehicle systems [2,3]; for power and sensor networks of strategical importance [4,5]; for ultra-strong PUF hardware keys [6]; and in secure computer, instrument and video game systems [7].…”
Section: Introductionmentioning
confidence: 99%
“…Current injection attack against the ideal KLJN system[2]. the channel currents/voltages at Alice's and Bob's ends respectively.…”
mentioning
confidence: 99%