Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

An Adaptive Lossly Quantization Technique for Key Extraction Applied in Vehicular Communication

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security in vehicular ad hoc network (VANET) is one of the major challenging topics and the secure key interchange between two legitimate vehicles is an important issue. The multi-environment of VANET has been exploited to extract the secret key and employed security services in VANET. However, it offered more excellence randomness owed to fading, noise multi-path, and velocity difference. Some of the factors like Bit-rate, complication and memory requests are reduced by using a process known as quantization. This paper proposes a new quantization method to extract the secret key for vehicular communications that uses a lossy quantizer in combination with information reconciliation and privacy amplification. Our work focuses on the quantization phase for the secret generation procedure. The comprehensive simulations display the propose method increases the zone and number of the quantization levels to utilize the maximum number of measurements to reduce reasonably the wasted measurements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Availability

Not available.

References

  1. Rewashed, Z. Y., & Mahmud, S. M. (2011). Communications in vehicular networks. Mobile Ad-Hoc Networks: Applications, Cap, 2, 20.

    Google Scholar 

  2. Mansour, M., et al. (2018). VANET security and privacy—an overview. International Journal of Network Security and Its Applications, 10, 13–34.

    Article  Google Scholar 

  3. Lai, L., et al. (2013). Key generation from wireless channels. Physical Layer Security in Wireless Communications (pp. 47–92). Citeseer.

    Google Scholar 

  4. Ahmed, W., & Elhadef, M. (2018). Securing Intelligent Vehicular Ad Hoc Networks: A Survey. Springer.

    Book  Google Scholar 

  5. Ibraheem IA et al (2019) Analysis of Possible Security Attacks and Security Challenges Facing Vehicular-Ad Hoc Networks. Transportation 9.10: 11.

  6. Abdelgader, A. M. S., & Wu, L. (2014). A secret key extraction technique applied in vehicular networks. In 2014, IEEE 17th international conference on computational science and engineering.

  7. Chen, L., & Jiang, T. (2018). Key Generation Rate in the Full Duplex Relay Wireless Communication Network. in Communications, Signal Processing, and Systems. Springer Singapore.

    Google Scholar 

  8. Premnath, S. N., et al. (2013). Secret key extraction from wireless signal strength in real environments. IEEE Transactions on Mobile Computing, 12(5), 917–930.

    Article  Google Scholar 

  9. Ahmed, W., & Elhadef, M. (2018). Securing Intelligent Vehicular Ad Hoc Networks: A Survey. In Advances in Computer Science and Ubiquitous Computing. Springer Singapore.

    Book  Google Scholar 

  10. Hu, J.-Y., et al. (2020). Security proof of the two-way quantum secure direct communication with channel loss and noise. EPL (Europhysics Letters), 129(1), 10004.

    Article  Google Scholar 

  11. Hasrouny, H., et al. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20.

    Article  Google Scholar 

  12. Mukherjee, A., et al. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys and Tutorials, 16(3), 1550–1573.

    Article  Google Scholar 

  13. Bottarelli, M., et al. (2018). Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Computers and Security, 78, 454–476.

    Article  Google Scholar 

  14. Sampath, V., Karthik, S., & Sabitha, R. (2021). Position-based adaptive clustering model (PACM) for efficient data caching in vehicular named data networks (VNDN). Wireless Personal Communications, 117(4), 2955–2971.

    Article  Google Scholar 

  15. Zhang, J., Kasera, S. K., & Patwari, N. (2010). Mobility assisted secret key generation using wireless link signatures. In Proceedings of the 29th conference on Information communications, pp. 261-265. San Diego, California, USA: IEEE Press.

  16. Badawy, A., et al. (2016). Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Physical Communication, 19, 1–10.

    Article  Google Scholar 

  17. Mathur, S., et al. (2008). Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pp. 128–139. San Francisco, California, USA: ACM.

  18. Zeng, K. (2015). Physical layer key generation in wireless networks: challenges and opportunities. IEEE Communications Magazine, 53(6), 33–39.

    Article  Google Scholar 

  19. Li, X., et al. (2017). Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks. IEEE Access, 5, 5281–5291.

    Article  Google Scholar 

  20. Cunha, F., et al. (2016). Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44, 90–103.

    Article  Google Scholar 

  21. Sun, X., et al. (2011). Improved generation efficiency for key extracting from wireless channels. In 2011 IEEE international conference on communications (ICC).

  22. Brassard, G., & Salvail, L. (1994). Secret-Key Reconciliation by Public Discussion. Springer.

    Book  MATH  Google Scholar 

  23. Bottarelli, M., et al. (2018). Quantisation feasibility and performance of RSS-based secret key extraction in VANETs. In 2018 International conference on cyber security and protection of digital services (Cyber Security).

  24. Ever, Y. K. (2019). Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor networks. IEEE Systems Journal, 13(1), 456–467.

    Article  Google Scholar 

  25. Bennett, C. H., et al. (1992). Experimental quantum cryptography. Journal of Cryptology, 5(1), 3–28.

    Article  MATH  Google Scholar 

  26. Wang, X., et al. (2018). High-speed implementation of length-compatible privacy amplification in continuous-variable quantum key distribution. IEEE Photonics Journal. https://doi.org/10.1109/JPHOT.2018.2824316.

    Article  Google Scholar 

  27. Ismail, D. K. B., et al. (2019). Optimizing turbo codes for secret key generation in vehicular ad hoc networks. In A. Al-Masri (Ed.), Smart Technologies and Innovation for a Sustainable Future. Springer International Publishing.

    Google Scholar 

  28. Badawy, A., et al. (2016). Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Physical Communication, 19, 1–10.

    Article  Google Scholar 

  29. Moara-Nkwe, K., et al. (2018). A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access, 6, 11374–11387.

    Article  Google Scholar 

  30. Johnson, J. S., et al. (2013). An analysis of error reconciliation protocols used in Quantum Key Distribution systems. The Journal of Defense Modeling and Simulation, 12(3), 217–227.

    Article  Google Scholar 

  31. Cencioni, P., & Di Pietro, R. (2008). A mechanism to enforce privacy in vehicle-to-infrastructure communication. Computer Communications, 31(12), 2790–2802.

    Article  Google Scholar 

  32. Mailloux, L. O., et al. (2015). Modeling decoy state Quantum Key Distribution systems. The Journal of Defense Modeling and Simulation, 12(4), 489–506.

    Article  Google Scholar 

  33. Jiang, D., & Delgrossi, L. (2008). IEEE 802.11p: Towards an international standard for wireless access in vehicular environments. In VTC Spring 2008—IEEE vehicular technology conference.

  34. Kaemarungsi, K., & Krishnamurthy, P. (2012). Analysis of WLAN’s received signal strength indication for indoor location fingerprinting. Pervasive and Mobile Computing, 8(2), 292–316.

    Article  Google Scholar 

  35. Qu, F., et al. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6), 2985–2996.

    Article  Google Scholar 

Download references

Funding

This research is sponsored in part by National key research and development program: Key projects of international scientific and technological innovation cooperation between governments under Grant 2019YFE0123800, and in part by the National Natural Science Foundation of China under Grant 71971116.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization and methodology, validation, formal analysis I. Abdelazeem , Weibin Zhang. Writing-original draft preparation I. Abdelazeem. Writing-review, Abdeldime M.S. visualization, I. Abdelazeem , Zeng Zhenping. Supervision, and did the formal analysis and reviewed and edited the manuscript, Weibin Zhan. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Weibin Zhang.

Ethics declarations

Conflicts

The authors declared no potential conflicts of interest with respect to the research, authorship, or publication of this article.

Code availability

Not available.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abdelazeem, I., Zhang, W., Zeng, Z. et al. An Adaptive Lossly Quantization Technique for Key Extraction Applied in Vehicular Communication. Wireless Pers Commun 126, 1345–1361 (2022). https://doi.org/10.1007/s11277-022-09794-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09794-9

Keywords

Navigation