Modern cars are mostly computerized and equipped with passive keyless entry and start(PKES) system. PKES is based on Radio Frequency Identification(RFID) technology for authentication of the authorized drivers. RFID t...Modern cars are mostly computerized and equipped with passive keyless entry and start(PKES) system. PKES is based on Radio Frequency Identification(RFID) technology for authentication of the authorized drivers. RFID technology has replaced the conventional ways of identification and authorization in order to facilitate users while introducing new security challenges. In this article, we focused on verifying the presence of authorized key in the physical proximity of car by employing multiple antennas. Application of multiple antennas to the currently developed cryptographic algorithms opens a new approach for researchers to improve security of RFID based systems. We propose an advanced security system for PKES using multiple antennas wherein an authorized key passes through multiple vicinities to allow driver to access and start the car. Furthermore, we modified a light-weight cryptographic protocol named as HB(Hopper and Blum) protocol to integrate it with the proposed design based on multiple antennas. Simulation results show improvement in security functionality while keeping in view the efficiency constraints.展开更多
Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidan...Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidance.However,security is constrained as a result of the energy and performance limitations of modem wireless systems.Accordingly,the need for efficient secret key generation and management mechanism for secured communication among computationally weak wireless devices has motivated the introduction of new authentication protocols.Recently,there has been a great interest in physical layer based secret key generation schemes by utilizing channel reciprocity.Consequently,it is observed that the sequence generated by two communicating parties contain mismatched bits which need to be reconciled by exchanging information over a public channel.This can be an immense security threat as it may let an adversary attain and recover segments of the key in known channel conditions.We proposed Hopper-Blum based physical layer(HB-PL)authentication scheme in which an enhanced physical layer key generation method integrates the Hopper-Blum(HB)authentication protocol.The information collected from the shared channel is used as secret keys for the HB protocol and the mismatched bits are used as the induced noise for learning parity with noise(LPN)problem.The proposed scheme aims to provide a way out for bit reconciliation process without leakage of information over a public channel.Moreover,HB protocol is computationally efficient and simple which helps to reduce the number of exchange messages during the authentication process.We have performed several experiments which show that our proposed design can generate secret keys with improved security strength and high performance in comparison to the current authentication techniques.Our scheme requires less than 55 exchange messages to achieve more than 95%of correct authentication.展开更多
基金supported by the National Key Research and Development Program(No.2016YFB0800602)National Natural Science Foundation of China(NSFC)(No.61502048)Shandong provincial Key Research and Development Program of China(2018CXGC0701,2018GGX106005)
文摘Modern cars are mostly computerized and equipped with passive keyless entry and start(PKES) system. PKES is based on Radio Frequency Identification(RFID) technology for authentication of the authorized drivers. RFID technology has replaced the conventional ways of identification and authorization in order to facilitate users while introducing new security challenges. In this article, we focused on verifying the presence of authorized key in the physical proximity of car by employing multiple antennas. Application of multiple antennas to the currently developed cryptographic algorithms opens a new approach for researchers to improve security of RFID based systems. We propose an advanced security system for PKES using multiple antennas wherein an authorized key passes through multiple vicinities to allow driver to access and start the car. Furthermore, we modified a light-weight cryptographic protocol named as HB(Hopper and Blum) protocol to integrate it with the proposed design based on multiple antennas. Simulation results show improvement in security functionality while keeping in view the efficiency constraints.
基金supported by the Shandong Provincial Key Research and Development Program of China(2018CXGC0701)the National Natural Science Foundation of China(NSFC)(Grant No.61972050)the foundation of State Key Laboratory of Network and Switching Technology,Beijing University of Posts and Telecommunications(SKLNST-2018-1-11)。
文摘Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidance.However,security is constrained as a result of the energy and performance limitations of modem wireless systems.Accordingly,the need for efficient secret key generation and management mechanism for secured communication among computationally weak wireless devices has motivated the introduction of new authentication protocols.Recently,there has been a great interest in physical layer based secret key generation schemes by utilizing channel reciprocity.Consequently,it is observed that the sequence generated by two communicating parties contain mismatched bits which need to be reconciled by exchanging information over a public channel.This can be an immense security threat as it may let an adversary attain and recover segments of the key in known channel conditions.We proposed Hopper-Blum based physical layer(HB-PL)authentication scheme in which an enhanced physical layer key generation method integrates the Hopper-Blum(HB)authentication protocol.The information collected from the shared channel is used as secret keys for the HB protocol and the mismatched bits are used as the induced noise for learning parity with noise(LPN)problem.The proposed scheme aims to provide a way out for bit reconciliation process without leakage of information over a public channel.Moreover,HB protocol is computationally efficient and simple which helps to reduce the number of exchange messages during the authentication process.We have performed several experiments which show that our proposed design can generate secret keys with improved security strength and high performance in comparison to the current authentication techniques.Our scheme requires less than 55 exchange messages to achieve more than 95%of correct authentication.