Securing a wireless channel between any two vehicles is a crucial component of vehicular networks security. This can be done by using a secret key to encrypt the messages. We propose a scheme to allow two cars to extract a shared secret from RSSI (Received Signal Strength Indicator) values in such a way that nearby cars cannot obtain the same key. The key is information-theoretically secure, i.e., it is secure against an adversary with unlimited computing power. Although there are existing solutions of key extraction in the indoor or low-speed environments, the unique channel conditions make them inapplicable to vehicular environments. Our scheme effectively and efficiently handles the high noise and mismatch features of the measured sample...
Paper originally delivered at the Science and Information Conference 2018.© Springer Nature Switzerl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
Securing a wireless channel between any two vehicles is a crucial component of vehicular networks se...
Abstract—A crucial component of vehicular network security is to establish a secure wireless channel...
From Cyber Science 2018 conferenceVehicular Ad Hoc Networks (VANETs) has emerged as a unique implem...
Modern automotive Cyber-Physical Systems (CPS) are increasingly adopting a variety of wireless comm...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
Vehicular Ad Hoc Networks (VANETs) has emerged as a unique implementation of Mobile Ad Hoc Networks ...
© 2019 IEEE. In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving direc...
The communication in vehicular ad hoc networks (VANETs) is commonly divided in two scenarios, namely...
Secure wireless communications typically rely on secret keys, which are difficult to establish in an...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
Paper originally delivered at the Science and Information Conference 2018.© Springer Nature Switzerl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
Securing a wireless channel between any two vehicles is a crucial component of vehicular networks se...
Abstract—A crucial component of vehicular network security is to establish a secure wireless channel...
From Cyber Science 2018 conferenceVehicular Ad Hoc Networks (VANETs) has emerged as a unique implem...
Modern automotive Cyber-Physical Systems (CPS) are increasingly adopting a variety of wireless comm...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
Vehicular Ad Hoc Networks (VANETs) has emerged as a unique implementation of Mobile Ad Hoc Networks ...
© 2019 IEEE. In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving direc...
The communication in vehicular ad hoc networks (VANETs) is commonly divided in two scenarios, namely...
Secure wireless communications typically rely on secret keys, which are difficult to establish in an...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
Paper originally delivered at the Science and Information Conference 2018.© Springer Nature Switzerl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...