Show simple item record

dc.contributor.authorKbaier, Dhouha
dc.contributor.authorKaradimas, Petros
dc.contributor.authorEpiphaniou, Gregory
dc.contributor.authoral-Khateeb, Haider
dc.date.accessioned2019-09-26T14:45:06Z
dc.date.available2019-09-26T14:45:06Z
dc.date.issued2019-01-09
dc.identifier.citationIsmail D.K.B., Karadimas P., Epiphaniou G., Al-Khateeb H. (2019) Optimizing Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks. In: Al-Masri A., Curran K. (eds) Smart Technologies and Innovation for a Sustainable Future. Advances in Science, Technology & Innovation (IEREK Interdisciplinary Series for Sustainable Development). Springer, Cham, pp. 287-293.en
dc.identifier.isbn9783030016586en
dc.identifier.doi10.1007/978-3-030-01659-3_33en
dc.identifier.urihttp://hdl.handle.net/2436/622737
dc.description.abstractWe present an algorithm that allows two users to establish a symmetric cryptographic key by incorporating the most important features of the wireless channel in vehicle-to-vehicle (V2V) communication. Non-reciprocity compensation is combined with turbo codes (TCs) for error reconciliation purposes. For fair comparisons, the indexing technique is applied in conjunction with the non-reciprocity compensation technique. A series of simulations are run to calculate key performance indicators (KPIs). High entropy values are obtained throughout all rounds of simulation during the key extraction process. Furthermore, simulation results indicate a significant improvement in bit mismatch rate (BMR) and key generation rate (KGR) when TCs are used. Increasing the number of iterations in the TC can significantly improve the Bit Error Rate (BER), thus generating more symmetric keys. The key generation rate was reported high ranging from 17 to 19 for the 256-bit symmetric keys per minute with TCs, while it is ranging from 2 to 5 when compared with a sample indexing technique published in the public domain. Finally, simulations proved also improvements for different key lengths as part of the error reconciliation process when TCs are used with an almost regular permutation (ARP) instead of a random permutation.en
dc.formatapplication/PDFen
dc.language.isoenen
dc.publisherSpringer, Chamen
dc.relation.ispartofseriesAdvances in Science, Technology & Innovationen
dc.relation.urlhttps://link.springer.com/chapter/10.1007/978-3-030-01659-3_33#citeasen
dc.subjectAlmost regular permutationen
dc.subjectBit mismatch rateen
dc.subjectEntropyen
dc.subjectError reconciliationen
dc.subjectKey generationen
dc.subjectQuantizationen
dc.subjectScatterers’ mobilityen
dc.subjectThresholdingen
dc.subjectTurbo codesen
dc.subjectVANETen
dc.titleOptimizing turbo codes for secret key generation in vehicular ad hoc networksen
dc.typeConference contributionen
dc.date.updated2019-09-17T14:58:01Z
dc.conference.nameAUE International Research Conference (AUEIRC)
dc.conference.locationDubai, UAE
pubs.finish-date2017-11-16
pubs.start-date2017-11-15
dc.date.accepted2017-09-01
rioxxterms.funderJiscen
rioxxterms.identifier.projectUOW260919DKen
rioxxterms.versionAMen
rioxxterms.licenseref.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/en
rioxxterms.licenseref.startdate2020-01-09en
refterms.dateFCD2019-09-26T14:41:39Z
refterms.versionFCDAM


Files in this item

Thumbnail
Name:
DK-paper - edited.pdf
Size:
371.7Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by-nc-nd/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by-nc-nd/4.0/