Abstract
Security in vehicular ad hoc network (VANET) is one of the major challenging topics and the secure key interchange between two legitimate vehicles is an important issue. The multi-environment of VANET has been exploited to extract the secret key and employed security services in VANET. However, it offered more excellence randomness owed to fading, noise multi-path, and velocity difference. Some of the factors like Bit-rate, complication and memory requests are reduced by using a process known as quantization. This paper proposes a new quantization method to extract the secret key for vehicular communications that uses a lossy quantizer in combination with information reconciliation and privacy amplification. Our work focuses on the quantization phase for the secret generation procedure. The comprehensive simulations display the propose method increases the zone and number of the quantization levels to utilize the maximum number of measurements to reduce reasonably the wasted measurements.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Availability
Not available.
References
Rewashed, Z. Y., & Mahmud, S. M. (2011). Communications in vehicular networks. Mobile Ad-Hoc Networks: Applications, Cap, 2, 20.
Mansour, M., et al. (2018). VANET security and privacy—an overview. International Journal of Network Security and Its Applications, 10, 13–34.
Lai, L., et al. (2013). Key generation from wireless channels. Physical Layer Security in Wireless Communications (pp. 47–92). Citeseer.
Ahmed, W., & Elhadef, M. (2018). Securing Intelligent Vehicular Ad Hoc Networks: A Survey. Springer.
Ibraheem IA et al (2019) Analysis of Possible Security Attacks and Security Challenges Facing Vehicular-Ad Hoc Networks. Transportation 9.10: 11.
Abdelgader, A. M. S., & Wu, L. (2014). A secret key extraction technique applied in vehicular networks. In 2014, IEEE 17th international conference on computational science and engineering.
Chen, L., & Jiang, T. (2018). Key Generation Rate in the Full Duplex Relay Wireless Communication Network. in Communications, Signal Processing, and Systems. Springer Singapore.
Premnath, S. N., et al. (2013). Secret key extraction from wireless signal strength in real environments. IEEE Transactions on Mobile Computing, 12(5), 917–930.
Ahmed, W., & Elhadef, M. (2018). Securing Intelligent Vehicular Ad Hoc Networks: A Survey. In Advances in Computer Science and Ubiquitous Computing. Springer Singapore.
Hu, J.-Y., et al. (2020). Security proof of the two-way quantum secure direct communication with channel loss and noise. EPL (Europhysics Letters), 129(1), 10004.
Hasrouny, H., et al. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20.
Mukherjee, A., et al. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys and Tutorials, 16(3), 1550–1573.
Bottarelli, M., et al. (2018). Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Computers and Security, 78, 454–476.
Sampath, V., Karthik, S., & Sabitha, R. (2021). Position-based adaptive clustering model (PACM) for efficient data caching in vehicular named data networks (VNDN). Wireless Personal Communications, 117(4), 2955–2971.
Zhang, J., Kasera, S. K., & Patwari, N. (2010). Mobility assisted secret key generation using wireless link signatures. In Proceedings of the 29th conference on Information communications, pp. 261-265. San Diego, California, USA: IEEE Press.
Badawy, A., et al. (2016). Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Physical Communication, 19, 1–10.
Mathur, S., et al. (2008). Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pp. 128–139. San Francisco, California, USA: ACM.
Zeng, K. (2015). Physical layer key generation in wireless networks: challenges and opportunities. IEEE Communications Magazine, 53(6), 33–39.
Li, X., et al. (2017). Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks. IEEE Access, 5, 5281–5291.
Cunha, F., et al. (2016). Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44, 90–103.
Sun, X., et al. (2011). Improved generation efficiency for key extracting from wireless channels. In 2011 IEEE international conference on communications (ICC).
Brassard, G., & Salvail, L. (1994). Secret-Key Reconciliation by Public Discussion. Springer.
Bottarelli, M., et al. (2018). Quantisation feasibility and performance of RSS-based secret key extraction in VANETs. In 2018 International conference on cyber security and protection of digital services (Cyber Security).
Ever, Y. K. (2019). Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor networks. IEEE Systems Journal, 13(1), 456–467.
Bennett, C. H., et al. (1992). Experimental quantum cryptography. Journal of Cryptology, 5(1), 3–28.
Wang, X., et al. (2018). High-speed implementation of length-compatible privacy amplification in continuous-variable quantum key distribution. IEEE Photonics Journal. https://doi.org/10.1109/JPHOT.2018.2824316.
Ismail, D. K. B., et al. (2019). Optimizing turbo codes for secret key generation in vehicular ad hoc networks. In A. Al-Masri (Ed.), Smart Technologies and Innovation for a Sustainable Future. Springer International Publishing.
Badawy, A., et al. (2016). Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Physical Communication, 19, 1–10.
Moara-Nkwe, K., et al. (2018). A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access, 6, 11374–11387.
Johnson, J. S., et al. (2013). An analysis of error reconciliation protocols used in Quantum Key Distribution systems. The Journal of Defense Modeling and Simulation, 12(3), 217–227.
Cencioni, P., & Di Pietro, R. (2008). A mechanism to enforce privacy in vehicle-to-infrastructure communication. Computer Communications, 31(12), 2790–2802.
Mailloux, L. O., et al. (2015). Modeling decoy state Quantum Key Distribution systems. The Journal of Defense Modeling and Simulation, 12(4), 489–506.
Jiang, D., & Delgrossi, L. (2008). IEEE 802.11p: Towards an international standard for wireless access in vehicular environments. In VTC Spring 2008—IEEE vehicular technology conference.
Kaemarungsi, K., & Krishnamurthy, P. (2012). Analysis of WLAN’s received signal strength indication for indoor location fingerprinting. Pervasive and Mobile Computing, 8(2), 292–316.
Qu, F., et al. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6), 2985–2996.
Funding
This research is sponsored in part by National key research and development program: Key projects of international scientific and technological innovation cooperation between governments under Grant 2019YFE0123800, and in part by the National Natural Science Foundation of China under Grant 71971116.
Author information
Authors and Affiliations
Contributions
Conceptualization and methodology, validation, formal analysis I. Abdelazeem , Weibin Zhang. Writing-original draft preparation I. Abdelazeem. Writing-review, Abdeldime M.S. visualization, I. Abdelazeem , Zeng Zhenping. Supervision, and did the formal analysis and reviewed and edited the manuscript, Weibin Zhan. All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Conflicts
The authors declared no potential conflicts of interest with respect to the research, authorship, or publication of this article.
Code availability
Not available.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Abdelazeem, I., Zhang, W., Zeng, Z. et al. An Adaptive Lossly Quantization Technique for Key Extraction Applied in Vehicular Communication. Wireless Pers Commun 126, 1345–1361 (2022). https://doi.org/10.1007/s11277-022-09794-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09794-9