MAPI: Key Generation Scheme for Security in V2V Communication Environment based RSS

Inka Trisna Dewi, Amang Sudarsono, Prima Kristalina, Mike Yuliana


Vehicular ad-hoc network is an exciting study that aims to improve driver safety in driving. Vehicle-to-vehicle (V2V) is communications between vehicles that occurs on a VANET using wireless channels. This channel allows vehicles to share personal or safety information with other vehicles. Vehicle communication is potentially vulnerable to adversaries' security attacks that can harm the driver and other legitimate users. Therefore, it requires a high-security system. This research proposes a new scheme, namely the MAPI (Mike-Amang-Prima-Inka), as a modified secret key generation scheme obtained from received signal strength (RSS) values. Our research focuses on obtaining a symmetric key that has a high key formation speed (KFS) with a low-key discrepancy level (KDL), while still thinking about the randomness and ensure safety from passive attackers. In the pre-processing, we use a combination of Kalman Filter and Polynomial Regression by modifying the parameters to produce the best performance. We also modified the grey code in the Modified Multibit (MMB) Quantization method to reduce the quantization bit mismatch. Our approach to the MAPI scheme can assign symmetric keys with better performance than existing schemes, increasing KFS and decreasing KDL up to 100%. Moreover, the scheme can generate a symmetric key that deals with NIST's statistical tests.


vehicle-to-vehicle; secret key generation scheme; modified pre-processing method; modified quantization method.

Full Text:



T. Limbasiya and D. Das, “Secure Message Transmission Algorithm for Vehicle to Vehicle (V2V) Communication,” IEEE Reg. 10 Annu. Int. Conf. Proceedings/TENCON, pp. 2507-2512, 2017.

K. Orkun and V. Erol, “Network Security Issues and Solutions on Vehicular Communication Systems,” Preprints, 2017.

H. Xu, M. Zeng, W. Hu, and J. Wang, “Authentication-Based Vehicle-to-Vehicle Secure Communication for VANETs,” Journal of Hindawi Mobile Information Systems, vol. 19, pp. 1–9, 2019.

F. Arena, G. Pau, “An Overview of Vehicular Communications,” Future Internet, vol. 11, pp 1-12, 2019.

M. B. Mansour, C. Salama, H. K. Mohamed, and S. A. Hammad, “VANET Security and Privacy – An Overview,” Int. J. of Netw. Secur. Its Appl., vol. 10, no. 2, pp. 13-34, 2018.

W. Stallings, “Cryptography and Network Security: Principles and

Practice,” 6th ed. Englewood Cliffs, NJ, USA: Prentice-Hall, 2013.

J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, “Key Generation from Wireless Channels: A Review,” IEEE Access, vol. 4, pp. 614-626, 2016.

R. Mishra, A. Singh, and R. Kumar, “VANET Security: Issues, Challenges and Solutions,” Int. Conf. Elec. Electron. Optim. Tech. ICEEOT, pp. 1050–1055, 2016.

K. Moara-Nkwe, Q. Shi, G. M. Lee, and M. H. Eiza, “A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks,” IEEE Access, vol. 6, pp. 11374–11387, 2018.

L. Sun, Q. Du, “A. Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions,” Entropy, pp. 1-21, 2018.

M. Yuliana, Wirawan, and Suwandi, “An Efficient Key Generation for the Internet of Things Based Synchronized Quantization,” Sensors, vol. 19, pp. 1–25, 2019.

D. Kreiser et al., “On Wireless Channel Parameters for Key Generation in Industrial Environments,” IEEE Access, vol. 6, pp. 79010-79025, 2018.

M. Yuliana, Wirawan, and Suwadi. “Performance Evaluation of the Key Extraction Schemes in Wireless Indoor Environment,” Proc. – Int. Conf. Signals Syst. ICSigSys 2017, pp. 138–144, 2017.

L. Cheng, L. Zhou, B.C. Seet, W. Li, D. Ma, and J. Wei, “Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase,” Journal of Hindawi Mobile Information Systems, vol. 2017, pp. 1–13, 2017.

Y.E.H. Shehadeh and D. Hogrefe, “A Survey on Secret Key Generation Mechanisms on The Physical Layer in Wireless Networks,” Security and Communication Networks, vol. 8, pp. 332-341, 2015.

M. Yuliana, Wirawan, and Suwandi, “A Simple Secret Key Generation by Using a Combination of Pre-Processing Method with a Multilevel Quantization”, Entropy, vol 21, no.2, pp. 1-25, 2019.

M. Yuliana, Wirawan, and Suwadi, “Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment,” Int. J. Commun. Networks Inf. Secur., vol. 9, no. 3, pp. 474-483, 2017.

A. Sudarsono, M. Yuliana, and P. Kristalina, “A Reciprocity Approach for Shared Secret Key Generation Extracted from Received Signal Strength in The Wireless Networks,” 2018 Int. Electron. Symp. Eng. Technol. Appl. IES-ETA 2018 – Proc., pp. 170-175, 2019.

I. T. Dewi, A. Sudarsono, P. Kristalina, M. Yuliana, “Reciprocity Enhancement in V2V Key Generation System by using HPK Method,” IES 2019 – Int. Electron. Symp. Role Techno-Intelligence Creat. An Open Energy Syst. Towar. Energy Democr. Proc., pp. 6-13, 2019.

M. Yuliana, Wirawan, and Suwadi, “Performance Analysis of Loss Multilevel Quantization on the Secret Key Generation Scheme in Indoor Wireless Environment,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 9, no. 1, pp. 100-108, 2019.

A. Sudarsono, M. Yuliana, P. Kristalina, and A. R. Barakbah, “An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication,” Proc. – 2018 6th Int. Symp. Comput. Networking, CANDAR 2018, pp. 57-65, 2018.



  • There are currently no refbacks.

Published by INSIGHT - Indonesian Society for Knowledge and Human Development