In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicle (V2V) communications are of greatest importance to facilitate autonomous driving. The current state-of-the-art for secure data exchange in V2V communications relies on public-key cryptography (PKC) consuming significant computational and energy resources for the encryption/decryption process and large bandwidth for the key distribution. To overcome these limitations, physical-layer security (PLS) has emerged as a lightweight solution by exploiting the physical characteristics of the V2V communication channel to generate symmetric cryptographic keys. Currently, key-generation algorithms are designed via empirical parameter settings, without ...
The physical attributes of the dynamic vehicle-to-vehicle propagation channel can be utilized for th...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon’s moving direc...
Vehicular Ad Hoc Networks (VANETs) has emerged as a unique implementation of Mobile Ad Hoc Networks ...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised ...
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised ...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving direc...
Paper originally delivered at the Science and Information Conference 2018.© Springer Nature Switzerl...
From Cyber Science 2018 conferenceVehicular Ad Hoc Networks (VANETs) has emerged as a unique implem...
The physical attributes of the dynamic vehicle-to-vehicle propagation channel can be utilized for th...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon’s moving direc...
Vehicular Ad Hoc Networks (VANETs) has emerged as a unique implementation of Mobile Ad Hoc Networks ...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
In intelligent transportation systems (ITS), communications between vehicles, i.e. vehicle-to-vehicl...
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic sc...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
We present an algorithm that allows two users to establish a symmetric cryptographic key by incorpor...
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised ...
The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised ...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving direc...
Paper originally delivered at the Science and Information Conference 2018.© Springer Nature Switzerl...
From Cyber Science 2018 conferenceVehicular Ad Hoc Networks (VANETs) has emerged as a unique implem...
The physical attributes of the dynamic vehicle-to-vehicle propagation channel can be utilized for th...
In a vehicular platoon, the lead vehicle that is responsible for managing the platoon’s moving direc...
Vehicular Ad Hoc Networks (VANETs) has emerged as a unique implementation of Mobile Ad Hoc Networks ...