Abstract
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorporating the most important features of the wireless channel in vehicle-to-vehicle (V2V) communication. The proposed model includes surrounding scatterers’ mobility by considering other vehicles; it also includes three-dimensional (3D) multipath propagation. These temporal variability attributes are incorporated into the key generation process where non-reciprocity compensation is combined with turbo codes (TCs). For fair comparisons, the indexing technique is applied in conjunction with the non-reciprocity compensation technique. A series of simulations are run to calculate key performance indicators (KPIs). The entropy values were high throughout all rounds of simulation and estimated around 0.94 to 0.99 bits per sample. Furthermore, simulation results reveal a decrease in bit mismatch rate (BMR) and an increase key generation rate (KGR) when TCs are used. The estimated BMR is nearly the same for different key lengths, and it is estimated to only 0.02 with TCs, compared to 0.22 obtained with the indexing technique. Finally, the key generation rate was also reported high ranging from 35 to 39 for the 128-bit symmetric keys per minute with TCs, while it is ranging from 3 to 7 when compared with a sample indexing technique published in the public domain.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs - TheeSTREAM Finalists, ser. Lecture Notes in Computer Science, vol. 4986. Springer (2008)
Jha, N.K., Raghunathan, A., Potlapally, N.R., Ravi, S.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mobile Comput. 5, 128–143 (2006)
Mukherjee, Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of Physical layer security in multiuser wireless networks: a survey, CoRR, vol. abs/1011.3754 (2010)
Shehadeh, Y.E.H., Hogrefe, D.: A survey on secret key generation mechanisms on the physical layer in wireless networks. Sec. Commun. Netw. 8(2), 332–341 (2015)
Wang, T., Liu, Y., Vasilakos, A.V.: Survey on channel reciprocity based key establishment techniques for wireless systems. Wirel. Netw. 21(6), 1835–1846 (2015)
Qu, F., Wu, Z., Wang, F.Y., Cho, W.: A security and privacy review of vanets. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)
Karadimas, P., Matolak, D.W.: Generic stochastic modeling of vehicle-to-vehicle wireless channels. Veh. Commun. 1(4), 153–167 (2014)
Liu, H., Wang, Y., Yang, J., Chen, Y.: Fast and practical secret key extraction by exploiting channel response. In: INFOCOM, pp. 3048–3056. IEEE (2013)
Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Secret key extraction from level crossings over unauthenticated wireless channels, pp. 201–230. Springer, New York (2010)
Hirschausen, P., Davis, L., Haley, D., Lever, K.: Identify key design parameters for Monte Carlo simulation of Doppler Spread channels. In: Communications Theory Workshop (AusCTW), Sydney (2014)
Hoecher, P.: A statistical discrete-time model for the WSSUS multipath channel. IEEE Trans. Veh. Technol. 41(4), 461–468 (1992)
Berrou, C., Glavieux, A., Thitimajshima, P.: Near Shannon limit error-correcting coding and decoding: Turbo-codes. In: Proceedings of ICC 1993, Geneva, Switzerland, vol. 2, pp. 1064–1070, May 1993
Nguyen, K., Assche, G.V., Cerf, N.J.: Side-information coding with turbo codes and its application to quantum key distribution, CoRR, vol. cs.IT/0406001 (2004)
Benletaief, N., Rezig, H., Bouallegue, A.: Toward efficient quantum key distribution reconciliation. J. Quantum Inf. Sci. 4(02), 117 (2014)
Yeo, E., Anantharam, V.: Iterative decoder architectures. IEEE Commun. Mag. 41(8), 132–140 (2003)
Epiphaniou, G., Karadimas, P., Kbaier Ben Ismail, D., Al-Khateeb, H., Dehghantanha, A., Choo, K.K.R.: Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular Ad Hoc social IoT networks. IEEE Internet Things J. 5(4), 2496–2505 (2018)
Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS 2007, pp. 401–410. ACM, New York (2007)
Acknowledgment
This work was partially funded by the Defense Science and Technology Laboratory (DSTL), under contract CDE 41130. The authors would also like to thank Mr George Samartzidis for his initial contribution in the algorithm development.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ben Ismail, D.K., Karadimas, P., Epiphaniou, G., Al-Khateeb, H.M. (2019). Error Reconciliation with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2018. Advances in Intelligent Systems and Computing, vol 857. Springer, Cham. https://doi.org/10.1007/978-3-030-01177-2_51
Download citation
DOI: https://doi.org/10.1007/978-3-030-01177-2_51
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01176-5
Online ISBN: 978-3-030-01177-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)