research-article

Design and Implementation of Secret Key Agreement for Platoon-based Vehicular Cyber-physical Systems

Abstract

In a platoon-based vehicular cyber-physical system (PVCPS), a lead vehicle that is responsible for managing the platoon’s moving directions and velocity periodically disseminates control messages to the vehicles that follow. Securing wireless transmissions of the messages between the vehicles is critical for privacy and confidentiality of the platoon’s driving pattern. However, due to the broadcast nature of radio channels, the transmissions are vulnerable to eavesdropping. In this article, we propose a cooperative secret key agreement (CoopKey) scheme for encrypting/decrypting the control messages, where the vehicles in PVCPS generate a unified secret key based on the quantized fading channel randomness. Channel quantization intervals are optimized by dynamic programming to minimize the mismatch of keys. A platooning testbed is built with autonomous robotic vehicles, where a TelosB wireless node is used for onboard data processing and multi-hop dissemination. Extensive real-world experiments demonstrate that CoopKey achieves significantly low secret bit mismatch rate in a variety of settings. Moreover, the standard NIST test suite is employed to verify randomness of the generated keys, where the p-values of our CoopKey pass all the randomness tests. We also evaluate CoopKey with an extended platoon size via simulations to investigate the effect of system scalability on performance.

References

  1. 2014. ZigBee Specification. ZigBee Alliance. Retrieved from https://www.zigbee.org/wp-content/uploads/2014/11/docs-05-3474-20-0csg-zigbee-specification.pdf.Google ScholarGoogle Scholar
  2. 2018. ENABLE-S3: European initiative to enable validation for highly automated safe and secure systems. Retrieved from https://www.enable-s3.eu/.Google ScholarGoogle Scholar
  3. 2018. Wifibot. Retrieved from http://www.wifibot.com/page4.php.Google ScholarGoogle Scholar
  4. Assad Al Alam, Ather Gattami, and Karl Henrik Johansson. 2010. An experimental study on the fuel reduction potential of heavy duty vehicle platooning. In Proceedings of the International IEEE Conference on Intelligent Transportation Systems (ITSC’10). IEEE, 306--311.Google ScholarGoogle Scholar
  5. Hisham Al-Assam and Sabah Jassim. 2012. Robust biometric based key agreement and remote mutual authentication. In Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 59--65.Google ScholarGoogle Scholar
  6. Dimitri P. Bertsekas. 2005. Dynamic Programming and Optimal Control. Vol. 1. Athena Scientific, Belmont, MA.Google ScholarGoogle Scholar
  7. Eric Chan. 2012. Overview of the SARTRE Platooning Project: Technology Leadership Brief. Technical Report. SAE Technical Paper.Google ScholarGoogle Scholar
  8. Chan Chen and Michael A. Jensen. 2011. Secret key establishment using temporally and spatially correlated wireless channel coefficients. IEEE Trans. Mob. Comput. 10, 2 (2011), 205--215.Google ScholarGoogle Scholar
  9. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2009. Introduction to Algorithms. The MIT Press.Google ScholarGoogle Scholar
  10. Jessica Croft, Neal Patwari, and Sneha K. Kasera. 2010. Robust uncorrelated bit extraction methodologies for wireless sensors. In Proceedings of the International Symposium on Information Processing in Sensor Networks (IPSN’10). ACM, 70--81.Google ScholarGoogle Scholar
  11. Gregory D. Durgin. 2003. Space-time Wireless Channels. Prentice Hall Professional.Google ScholarGoogle Scholar
  12. Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider Al-Khateeb, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2018. Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks. IEEE Inter. Things J. 5, 4 (2018), 2496--2505.Google ScholarGoogle Scholar
  13. Larry Greenemeier. 2007. Election fix? Switzerland tests quantum cryptography. Sci. Amer. (2007).Google ScholarGoogle Scholar
  14. Pengfei Huang and Xudong Wang. 2013. Fast secret key generation in static wireless networks: A virtual channel approach. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). IEEE, 2292--2300.Google ScholarGoogle Scholar
  15. Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K. Kasera, Neal Patwari, and Srikanth V. Krishnamurthy. 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’09). ACM, 321--332.Google ScholarGoogle Scholar
  16. Dongyao Jia, Kejie Lu, and Jianping Wang. 2014. On the network connectivity of platoon-based vehicular cyber-physical systems. Transport. Res. Part C: Emerg. Technol. 40 (2014), 215--230.Google ScholarGoogle Scholar
  17. Dongyao Jia, Kejie Lu, Jianping Wang, Xiang Zhang, and Xuemin Shen. 2016. A survey on platoon-based vehicular cyber-physical systems. IEEE Commun. Surv. Tutor. 18, 1 (2016), 263--284.Google ScholarGoogle Scholar
  18. Qi Jiang, Xiaohan Huang, Ning Zhang, Kuan Zhang, Xindi Ma, and Jianfeng Ma. 2019. Shake to communicate: Secure handshake acceleration-based pairing mechanism for wrist worn devices. IEEE Inter. Things J. 6, 3 (2019), 5618--5630.Google ScholarGoogle Scholar
  19. Kai Li, Harrison Kurunathan, Ricardo Severino, and Eduardo Tovar. 2018. Cooperative key generation for data dissemination in cyber-physical systems. In Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems. IEEE Press, 331--332.Google ScholarGoogle Scholar
  20. Kai Li, Wei Ni, Eduardo Tovar, and Mohsen Guizani. 2018. LCD: Low latency command dissemination for a platoon of vehicles. In Proceedings of the IEEE International Conference on Communications (ICC’18). Retrieved from: arXiv preprint arXiv:1801.06153.Google ScholarGoogle Scholar
  21. Xu Li, Chunming Qiao, Xuegang Yu, Aditya Wagh, Raghu Sudhaakar, and Sateesh Addepalli. 2012. Toward effective service scheduling for human drivers in vehicular cyber-physical systems. IEEE Trans. Parallel Distrib. Syst. 23, 9 (2012), 1775--1789.Google ScholarGoogle Scholar
  22. Qi Lin, Weitao Xu, Jun Liu, Abdelwahed Khamis, Wen Hu, Mahbub Hassan, and Aruna Seneviratne. 2019. H2B: Heartbeat-based secret key generation using piezo vibration sensors. In Proceedings of the 18th International Conference on Information Processing in Sensor Networks (IPSN’19). ACM, 265--276.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hongbo Liu, Yang Wang, Jie Yang, and Yingying Chen. 2013. Fast and practical secret key extraction by exploiting channel response. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’13). IEEE, 3048--3056.Google ScholarGoogle Scholar
  24. Hongbo Liu, Jie Yang, Yan Wang, and Yingying Chen. 2012. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’12). IEEE, 927--935.Google ScholarGoogle Scholar
  25. Yanpei Liu, Stark C. Draper, and Akbar M. Sayeed. 2012. Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans. Inform. Forens. Secur. 7, 5 (2012), 1484--1497.Google ScholarGoogle Scholar
  26. Yasser L. Morgan. 2010. Notes on DSRC 8 WAVE standards suite: Its architecture, design, and characteristics. IEEE Commun. Surv. Tutor. 12, 4 (2010), 504--518.Google ScholarGoogle Scholar
  27. Neal Patwari, Jessica Croft, Suman Jana, and Sneha Kumar Kasera. 2010. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mob. Comput. 9, 1 (2010), 17.Google ScholarGoogle Scholar
  28. Sandeep Pirbhulal, Heye Zhang, Wanqing Wu, Subhas Chandra Mukhopadhyay, and Yuan-Ting Zhang. 2018. Heartbeats based biometric random binary sequences generation to secure wireless body sensor networks. IEEE Trans. Biomed. Eng. 65, 12 (2018), 2751--2759.Google ScholarGoogle Scholar
  29. Paul Pop, Detlef Scholle, Hans Hansson, Gunnar Widforss, and Malin Rosqvist. 2016. The SafeCOP ECSEL project: Safe cooperating cyber-physical systems using wireless communication. In Proceedings of the Euromicro Conference on Digital System Design (DSD’16). IEEE, 532--538.Google ScholarGoogle Scholar
  30. Kui Ren, Hai Su, and Qian Wang. 2011. Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel. Commun. 18, 4 (2011).Google ScholarGoogle Scholar
  31. Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, and Elaine Barker. 2001. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report. National Institute of Standards and Technology.Google ScholarGoogle Scholar
  32. Yi-Sheng Shiu, Shih Yu Chang, Hsiao-Chun Wu, Scott C.-H. Huang, and Hsiao-Hwa Chen. 2011. Physical layer security in wireless networks: A tutorial. IEEE Wirel. Commun. 18, 2 (2011).Google ScholarGoogle Scholar
  33. Narmadha Thangamani and Meenakshi Murugappan. 2019. A lightweight cryptography technique with random pattern generation. Wirel. Person. Commun. 104, 4 (2019), 1409--1432.Google ScholarGoogle Scholar
  34. Jiang Wan, Anthony Lopez, and Mohammad Abdullah Al Faruque. 2018. Physical layer key generation: Securing wireless communication in automotive cyber-physical systems. ACM Trans. Cyber-Phys. Syst. 3, 2 (2018), 13.Google ScholarGoogle Scholar
  35. Qian Wang, Hai Su, Kui Ren, and Kwangjo Kim. 2011. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’11). IEEE, 1422--1430.Google ScholarGoogle Scholar
  36. Qian Wang, Kaihe Xu, and Kui Ren. 2012. Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE J. Select. Areas Commun. 30, 9 (2012), 1666--1674.Google ScholarGoogle Scholar
  37. Muhammad Waqas, Manzoor Ahmed, Yong Li, Depeng Jin, and Sheng Chen. 2018. Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays. IEEE Trans. Wirel. Commun. 17, 6 (2018), 3918--3930.Google ScholarGoogle Scholar
  38. Armin Wasicek, Patricia Derler, and Edward A. Lee. 2014. Aspect-oriented modeling of attacks in automotive cyber-physical systems. In Proceedings of the ACM/EDAC/IEEE Design Automation Conference (DAC’14). IEEE, 1--6.Google ScholarGoogle Scholar
  39. Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, and Minho Jo. 2017. Design of secure user authenticated key management protocol for generic IoT networks. IEEE Inter. Things J. 5, 1 (2017), 269--282.Google ScholarGoogle Scholar
  40. Yunchuan Wei, Kai Zeng, and Prasant Mohapatra. 2013. Adaptive wireless channel probing for shared key generation based on PID controller. IEEE Trans. Mob. Comput. 12, 9 (2013), 1842--1852.Google ScholarGoogle Scholar
  41. Lingyun Xiao and Feng Gao. 2011. Practical string stability of platoon of adaptive cruise control vehicles. IEEE Trans. Intell. Transport. Syst. 12, 4 (2011), 1184--1194.Google ScholarGoogle Scholar
  42. Chunxuan Ye, Alex Reznik, and Yogendra Shah. 2006. Extracting secrecy from jointly Gaussian random variables. In Proceedings of the IEEE International Symposium on Information Theory (ISIT’06). IEEE, 2593--2597.Google ScholarGoogle Scholar
  43. Kai Zeng. 2015. Physical layer key generation in wireless networks: Challenges and opportunities. IEEE Commun. Mag. 53, 6 (2015), 33--39.Google ScholarGoogle Scholar
  44. Kai Zeng, Daniel Wu, An (Jack) Chan, and Prasant Mohapatra. 2010. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’10). IEEE, 1837--1845.Google ScholarGoogle Scholar
  45. Junxing Zhang, Sneha K. Kasera, and Neal Patwari. 2010. Mobility assisted secret key generation using wireless link signatures. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’10). IEEE, 1--5.Google ScholarGoogle Scholar

Index Terms

  1. Design and Implementation of Secret Key Agreement for Platoon-based Vehicular Cyber-physical Systems

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!