One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize the characteristics of wireless channels have been implemented. However, existing schemes still produce a low bit formation rate (BFR) even though they can reach a low bit error rate (BER). Note that V2V communication requires a scheme with high BFR in order to fulfill its main goal of improving road safety. In this research, we propose a higher rate secret key formation (HRKF) scheme using received signal strength (RSS) as a source of random information. The focus of this research is to pro...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
Vehicular ad-hoc network is an exciting study that aims to improve driver safety in driving. Vehicle...
As an alternative and appealing approach to providing information security in wireless communication...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving direc...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon’s moving direc...
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised ...
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised ...
Physical layer security (PLS) can be adopted for efficient key sharing in secured wireless systems. ...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
From Cyber Science 2018 conferenceVehicular Ad Hoc Networks (VANETs) has emerged as a unique implem...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
The broadcast nature of wireless communications imposes the risk of information leakage to adversari...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
Vehicular ad-hoc network is an exciting study that aims to improve driver safety in driving. Vehicle...
As an alternative and appealing approach to providing information security in wireless communication...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving direc...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon’s moving direc...
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised ...
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised ...
Physical layer security (PLS) can be adopted for efficient key sharing in secured wireless systems. ...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
From Cyber Science 2018 conferenceVehicular Ad Hoc Networks (VANETs) has emerged as a unique implem...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
The broadcast nature of wireless communications imposes the risk of information leakage to adversari...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
Vehicular ad-hoc network is an exciting study that aims to improve driver safety in driving. Vehicle...
As an alternative and appealing approach to providing information security in wireless communication...