The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised for the generation of highly random and symmetric cryptographic keys. However, in a physical-layer key agreement scheme, non-reciprocity due to inherent channel noise and hardware impairments can propagate bit disagreements. This has to be addressed prior to the symmetric key generation which is inherently important in social Internet of Things (IoT) networks, including in adversarial settings (e.g. battlefields). In this paper, we parametrically incorporate temporal variability attributes, such as three-dimensional (3D) scattering and scatterers’ mobility. Accordingly, this is the first work to incorporate such features into the key generati...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
From Cyber Science 2018 conferenceVehicular Ad Hoc Networks (VANETs) has emerged as a unique implem...
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised ...
The physical attributes of the dynamic vehicle-to-vehicle propagation channel can be utilized for th...
The physical attributes of the dynamic vehicle-to-vehicle propagation channel can be utilized for th...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
Paper originally delivered at the Science and Information Conference 2018.© Springer Nature Switzerl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
From Cyber Science 2018 conferenceVehicular Ad Hoc Networks (VANETs) has emerged as a unique implem...
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised ...
The physical attributes of the dynamic vehicle-to-vehicle propagation channel can be utilized for th...
The physical attributes of the dynamic vehicle-to-vehicle propagation channel can be utilized for th...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
Paper originally delivered at the Science and Information Conference 2018.© Springer Nature Switzerl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
From Cyber Science 2018 conferenceVehicular Ad Hoc Networks (VANETs) has emerged as a unique implem...