An Adaptive Lossly Quantization Technique for Key Extraction Applied in Vehicular Communication

نویسندگان

چکیده

Security in vehicular ad hoc network (VANET) is one of the major challenging topics and secure key interchange between two legitimate vehicles an important issue. The multi-environment VANET has been exploited to extract secret employed security services VANET. However, it offered more excellence randomness owed fading, noise multi-path, velocity difference. Some factors like Bit-rate, complication memory requests are reduced by using a process known as quantization. This paper proposes new quantization method for communications that uses lossy quantizer combination with information reconciliation privacy amplification. Our work focuses on phase generation procedure. comprehensive simulations display propose increases zone number levels utilize maximum measurements reduce reasonably wasted measurements.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Quantization Schemes for Channel-based Key Extraction

The use of reciprocal and random properties of wireless channels for the generation of secret keys is a highly attractive option for many applications that operate in a mobile environment. In recent years, several practice-oriented protocols have been proposed, but unfortunately without a sufficient and consistent security analysis and without a fair comparison between each other. This can be a...

متن کامل

On KLJN-based secure key distribution in vehicular communication networks

In a former paper [Fluct. Noise Lett., 13 (2014) 1450020] we introduced a vehicular communication system with unconditionally secure key exchange based on the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution scheme. In this paper, we address the secure KLJN key donation to vehicles. This KLJN key donation solution is performed lane-by-lane by using roadside key provider equipment embedded in...

متن کامل

An Adaptive Pseudorandom Stego-crypto Technique for Data Communication

To provide security in data communication networks various forms of cryptographic and steganographic algorithms have been proposed. Though both of these techniques serve the same purpose i.e. to secure data but have some drawbacks. Using cryptography might raise some suspicion whereas in steganography the distortion in cover can attract an adversary. The combinations of the two as proposed by v...

متن کامل

An Efficient Broadcast Technique for Vehicular Networks

Vehicular networks are a promising application of mobile ad hoc networks. In this paper, we introduce an efficient broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks with occlusions such as skyscrapers. In this environment, the road network is fragmented into cells such that nodes in a cell can communicate with any node within a two cell distance. Each mobile ...

متن کامل

development and implementation of an optimized control strategy for induction machine in an electric vehicle

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Personal Communications

سال: 2022

ISSN: ['1572-834X', '0929-6212']

DOI: https://doi.org/10.1007/s11277-022-09794-9