Abstract
In a platoon-based vehicular cyber-physical system (PVCPS), a lead vehicle that is responsible for managing the platoon’s moving directions and velocity periodically disseminates control messages to the vehicles that follow. Securing wireless transmissions of the messages between the vehicles is critical for privacy and confidentiality of the platoon’s driving pattern. However, due to the broadcast nature of radio channels, the transmissions are vulnerable to eavesdropping. In this article, we propose a cooperative secret key agreement (CoopKey) scheme for encrypting/decrypting the control messages, where the vehicles in PVCPS generate a unified secret key based on the quantized fading channel randomness. Channel quantization intervals are optimized by dynamic programming to minimize the mismatch of keys. A platooning testbed is built with autonomous robotic vehicles, where a TelosB wireless node is used for onboard data processing and multi-hop dissemination. Extensive real-world experiments demonstrate that CoopKey achieves significantly low secret bit mismatch rate in a variety of settings. Moreover, the standard NIST test suite is employed to verify randomness of the generated keys, where the p-values of our CoopKey pass all the randomness tests. We also evaluate CoopKey with an extended platoon size via simulations to investigate the effect of system scalability on performance.
References
- 2014. ZigBee Specification. ZigBee Alliance. Retrieved from https://www.zigbee.org/wp-content/uploads/2014/11/docs-05-3474-20-0csg-zigbee-specification.pdf.Google Scholar
- 2018. ENABLE-S3: European initiative to enable validation for highly automated safe and secure systems. Retrieved from https://www.enable-s3.eu/.Google Scholar
- 2018. Wifibot. Retrieved from http://www.wifibot.com/page4.php.Google Scholar
- Assad Al Alam, Ather Gattami, and Karl Henrik Johansson. 2010. An experimental study on the fuel reduction potential of heavy duty vehicle platooning. In Proceedings of the International IEEE Conference on Intelligent Transportation Systems (ITSC’10). IEEE, 306--311.Google Scholar
- Hisham Al-Assam and Sabah Jassim. 2012. Robust biometric based key agreement and remote mutual authentication. In Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 59--65.Google Scholar
- Dimitri P. Bertsekas. 2005. Dynamic Programming and Optimal Control. Vol. 1. Athena Scientific, Belmont, MA.Google Scholar
- Eric Chan. 2012. Overview of the SARTRE Platooning Project: Technology Leadership Brief. Technical Report. SAE Technical Paper.Google Scholar
- Chan Chen and Michael A. Jensen. 2011. Secret key establishment using temporally and spatially correlated wireless channel coefficients. IEEE Trans. Mob. Comput. 10, 2 (2011), 205--215.Google Scholar
- Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2009. Introduction to Algorithms. The MIT Press.Google Scholar
- Jessica Croft, Neal Patwari, and Sneha K. Kasera. 2010. Robust uncorrelated bit extraction methodologies for wireless sensors. In Proceedings of the International Symposium on Information Processing in Sensor Networks (IPSN’10). ACM, 70--81.Google Scholar
- Gregory D. Durgin. 2003. Space-time Wireless Channels. Prentice Hall Professional.Google Scholar
- Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider Al-Khateeb, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2018. Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks. IEEE Inter. Things J. 5, 4 (2018), 2496--2505.Google Scholar
- Larry Greenemeier. 2007. Election fix? Switzerland tests quantum cryptography. Sci. Amer. (2007).Google Scholar
- Pengfei Huang and Xudong Wang. 2013. Fast secret key generation in static wireless networks: A virtual channel approach. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). IEEE, 2292--2300.Google Scholar
- Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K. Kasera, Neal Patwari, and Srikanth V. Krishnamurthy. 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’09). ACM, 321--332.Google Scholar
- Dongyao Jia, Kejie Lu, and Jianping Wang. 2014. On the network connectivity of platoon-based vehicular cyber-physical systems. Transport. Res. Part C: Emerg. Technol. 40 (2014), 215--230.Google Scholar
- Dongyao Jia, Kejie Lu, Jianping Wang, Xiang Zhang, and Xuemin Shen. 2016. A survey on platoon-based vehicular cyber-physical systems. IEEE Commun. Surv. Tutor. 18, 1 (2016), 263--284.Google Scholar
- Qi Jiang, Xiaohan Huang, Ning Zhang, Kuan Zhang, Xindi Ma, and Jianfeng Ma. 2019. Shake to communicate: Secure handshake acceleration-based pairing mechanism for wrist worn devices. IEEE Inter. Things J. 6, 3 (2019), 5618--5630.Google Scholar
- Kai Li, Harrison Kurunathan, Ricardo Severino, and Eduardo Tovar. 2018. Cooperative key generation for data dissemination in cyber-physical systems. In Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems. IEEE Press, 331--332.Google Scholar
- Kai Li, Wei Ni, Eduardo Tovar, and Mohsen Guizani. 2018. LCD: Low latency command dissemination for a platoon of vehicles. In Proceedings of the IEEE International Conference on Communications (ICC’18). Retrieved from: arXiv preprint arXiv:1801.06153.Google Scholar
- Xu Li, Chunming Qiao, Xuegang Yu, Aditya Wagh, Raghu Sudhaakar, and Sateesh Addepalli. 2012. Toward effective service scheduling for human drivers in vehicular cyber-physical systems. IEEE Trans. Parallel Distrib. Syst. 23, 9 (2012), 1775--1789.Google Scholar
- Qi Lin, Weitao Xu, Jun Liu, Abdelwahed Khamis, Wen Hu, Mahbub Hassan, and Aruna Seneviratne. 2019. H2B: Heartbeat-based secret key generation using piezo vibration sensors. In Proceedings of the 18th International Conference on Information Processing in Sensor Networks (IPSN’19). ACM, 265--276.Google Scholar
Digital Library
- Hongbo Liu, Yang Wang, Jie Yang, and Yingying Chen. 2013. Fast and practical secret key extraction by exploiting channel response. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’13). IEEE, 3048--3056.Google Scholar
- Hongbo Liu, Jie Yang, Yan Wang, and Yingying Chen. 2012. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’12). IEEE, 927--935.Google Scholar
- Yanpei Liu, Stark C. Draper, and Akbar M. Sayeed. 2012. Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans. Inform. Forens. Secur. 7, 5 (2012), 1484--1497.Google Scholar
- Yasser L. Morgan. 2010. Notes on DSRC 8 WAVE standards suite: Its architecture, design, and characteristics. IEEE Commun. Surv. Tutor. 12, 4 (2010), 504--518.Google Scholar
- Neal Patwari, Jessica Croft, Suman Jana, and Sneha Kumar Kasera. 2010. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mob. Comput. 9, 1 (2010), 17.Google Scholar
- Sandeep Pirbhulal, Heye Zhang, Wanqing Wu, Subhas Chandra Mukhopadhyay, and Yuan-Ting Zhang. 2018. Heartbeats based biometric random binary sequences generation to secure wireless body sensor networks. IEEE Trans. Biomed. Eng. 65, 12 (2018), 2751--2759.Google Scholar
- Paul Pop, Detlef Scholle, Hans Hansson, Gunnar Widforss, and Malin Rosqvist. 2016. The SafeCOP ECSEL project: Safe cooperating cyber-physical systems using wireless communication. In Proceedings of the Euromicro Conference on Digital System Design (DSD’16). IEEE, 532--538.Google Scholar
- Kui Ren, Hai Su, and Qian Wang. 2011. Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel. Commun. 18, 4 (2011).Google Scholar
- Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, and Elaine Barker. 2001. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report. National Institute of Standards and Technology.Google Scholar
- Yi-Sheng Shiu, Shih Yu Chang, Hsiao-Chun Wu, Scott C.-H. Huang, and Hsiao-Hwa Chen. 2011. Physical layer security in wireless networks: A tutorial. IEEE Wirel. Commun. 18, 2 (2011).Google Scholar
- Narmadha Thangamani and Meenakshi Murugappan. 2019. A lightweight cryptography technique with random pattern generation. Wirel. Person. Commun. 104, 4 (2019), 1409--1432.Google Scholar
- Jiang Wan, Anthony Lopez, and Mohammad Abdullah Al Faruque. 2018. Physical layer key generation: Securing wireless communication in automotive cyber-physical systems. ACM Trans. Cyber-Phys. Syst. 3, 2 (2018), 13.Google Scholar
- Qian Wang, Hai Su, Kui Ren, and Kwangjo Kim. 2011. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’11). IEEE, 1422--1430.Google Scholar
- Qian Wang, Kaihe Xu, and Kui Ren. 2012. Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE J. Select. Areas Commun. 30, 9 (2012), 1666--1674.Google Scholar
- Muhammad Waqas, Manzoor Ahmed, Yong Li, Depeng Jin, and Sheng Chen. 2018. Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays. IEEE Trans. Wirel. Commun. 17, 6 (2018), 3918--3930.Google Scholar
- Armin Wasicek, Patricia Derler, and Edward A. Lee. 2014. Aspect-oriented modeling of attacks in automotive cyber-physical systems. In Proceedings of the ACM/EDAC/IEEE Design Automation Conference (DAC’14). IEEE, 1--6.Google Scholar
- Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, and Minho Jo. 2017. Design of secure user authenticated key management protocol for generic IoT networks. IEEE Inter. Things J. 5, 1 (2017), 269--282.Google Scholar
- Yunchuan Wei, Kai Zeng, and Prasant Mohapatra. 2013. Adaptive wireless channel probing for shared key generation based on PID controller. IEEE Trans. Mob. Comput. 12, 9 (2013), 1842--1852.Google Scholar
- Lingyun Xiao and Feng Gao. 2011. Practical string stability of platoon of adaptive cruise control vehicles. IEEE Trans. Intell. Transport. Syst. 12, 4 (2011), 1184--1194.Google Scholar
- Chunxuan Ye, Alex Reznik, and Yogendra Shah. 2006. Extracting secrecy from jointly Gaussian random variables. In Proceedings of the IEEE International Symposium on Information Theory (ISIT’06). IEEE, 2593--2597.Google Scholar
- Kai Zeng. 2015. Physical layer key generation in wireless networks: Challenges and opportunities. IEEE Commun. Mag. 53, 6 (2015), 33--39.Google Scholar
- Kai Zeng, Daniel Wu, An (Jack) Chan, and Prasant Mohapatra. 2010. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’10). IEEE, 1837--1845.Google Scholar
- Junxing Zhang, Sneha K. Kasera, and Neal Patwari. 2010. Mobility assisted secret key generation using wireless link signatures. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’10). IEEE, 1--5.Google Scholar
Index Terms
Design and Implementation of Secret Key Agreement for Platoon-based Vehicular Cyber-physical Systems





Comments