In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates messages to the following automated vehicles in a multi-hop vehicular network. However, due to the broadcast nature of wireless channels, vehicle-to-vehicle (V2V) communications are vulnerable to eavesdropping and message modification. Generating secret keys by extracting the shared randomness in a wireless fading channel is a promising way for V2V communication security. We study a security scheme for platoon-based V2V communications, where the platooning vehicles generate a shared secret key based on the quantized fading channel randomness. To improve conformity of the generated key, the probabil...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
Physical layer security (PLS) can be adopted for efficient key sharing in secured wireless systems. ...
Paper originally delivered at the Science and Information Conference 2018.© Springer Nature Switzerl...
© 2019 IEEE. In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's...
In a platoon-based vehicular cyber-physical system (PVCPS), a lead vehicle that is responsible for m...
In a platoon-based vehicular cyber-physical system (PVCPS), a lead vehicle that is responsible for m...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
Recent advances in inter-vehicle wireless communications allow for automated and coordinated vehicle...
Privacy preservation is critical for control information dissemination in Platoon-based Vehicular Cy...
Vehicular Ad Hoc Networks (VANETs) has emerged as a unique implementation of Mobile Ad Hoc Networks ...
Platooning is an emerging Intelligent Transportation Systems (ITS) application that can have a huge ...
Securing a wireless channel between any two vehicles is a crucial component of vehicular networks se...
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
Physical layer security (PLS) can be adopted for efficient key sharing in secured wireless systems. ...
Paper originally delivered at the Science and Information Conference 2018.© Springer Nature Switzerl...
© 2019 IEEE. In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's...
In a platoon-based vehicular cyber-physical system (PVCPS), a lead vehicle that is responsible for m...
In a platoon-based vehicular cyber-physical system (PVCPS), a lead vehicle that is responsible for m...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
Recent advances in inter-vehicle wireless communications allow for automated and coordinated vehicle...
Privacy preservation is critical for control information dissemination in Platoon-based Vehicular Cy...
Vehicular Ad Hoc Networks (VANETs) has emerged as a unique implementation of Mobile Ad Hoc Networks ...
Platooning is an emerging Intelligent Transportation Systems (ITS) application that can have a huge ...
Securing a wireless channel between any two vehicles is a crucial component of vehicular networks se...
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
Physical layer security (PLS) can be adopted for efficient key sharing in secured wireless systems. ...
Paper originally delivered at the Science and Information Conference 2018.© Springer Nature Switzerl...