MAPI: Key Generation Scheme for Security in V2V Communication Environment based RSS
T. Limbasiya and D. Das, “Secure Message Transmission Algorithm for Vehicle to Vehicle (V2V) Communication,” IEEE Reg. 10 Annu. Int. Conf. Proceedings/TENCON, pp. 2507-2512, 2017.
K. Orkun and V. Erol, “Network Security Issues and Solutions on Vehicular Communication Systems,” Preprints, 2017.
H. Xu, M. Zeng, W. Hu, and J. Wang, “Authentication-Based Vehicle-to-Vehicle Secure Communication for VANETs,” Journal of Hindawi Mobile Information Systems, vol. 19, pp. 1–9, 2019.
F. Arena, G. Pau, “An Overview of Vehicular Communications,” Future Internet, vol. 11, pp 1-12, 2019.
M. B. Mansour, C. Salama, H. K. Mohamed, and S. A. Hammad, “VANET Security and Privacy – An Overview,” Int. J. of Netw. Secur. Its Appl., vol. 10, no. 2, pp. 13-34, 2018.
W. Stallings, “Cryptography and Network Security: Principles and
Practice,” 6th ed. Englewood Cliffs, NJ, USA: Prentice-Hall, 2013.
J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, “Key Generation from Wireless Channels: A Review,” IEEE Access, vol. 4, pp. 614-626, 2016.
R. Mishra, A. Singh, and R. Kumar, “VANET Security: Issues, Challenges and Solutions,” Int. Conf. Elec. Electron. Optim. Tech. ICEEOT, pp. 1050–1055, 2016.
K. Moara-Nkwe, Q. Shi, G. M. Lee, and M. H. Eiza, “A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks,” IEEE Access, vol. 6, pp. 11374–11387, 2018.
L. Sun, Q. Du, “A. Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions,” Entropy, pp. 1-21, 2018.
M. Yuliana, Wirawan, and Suwandi, “An Efficient Key Generation for the Internet of Things Based Synchronized Quantization,” Sensors, vol. 19, pp. 1–25, 2019.
D. Kreiser et al., “On Wireless Channel Parameters for Key Generation in Industrial Environments,” IEEE Access, vol. 6, pp. 79010-79025, 2018.
M. Yuliana, Wirawan, and Suwadi. “Performance Evaluation of the Key Extraction Schemes in Wireless Indoor Environment,” Proc. – Int. Conf. Signals Syst. ICSigSys 2017, pp. 138–144, 2017.
L. Cheng, L. Zhou, B.C. Seet, W. Li, D. Ma, and J. Wei, “Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase,” Journal of Hindawi Mobile Information Systems, vol. 2017, pp. 1–13, 2017.
Y.E.H. Shehadeh and D. Hogrefe, “A Survey on Secret Key Generation Mechanisms on The Physical Layer in Wireless Networks,” Security and Communication Networks, vol. 8, pp. 332-341, 2015.
M. Yuliana, Wirawan, and Suwandi, “A Simple Secret Key Generation by Using a Combination of Pre-Processing Method with a Multilevel Quantization”, Entropy, vol 21, no.2, pp. 1-25, 2019.
M. Yuliana, Wirawan, and Suwadi, “Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment,” Int. J. Commun. Networks Inf. Secur., vol. 9, no. 3, pp. 474-483, 2017.
A. Sudarsono, M. Yuliana, and P. Kristalina, “A Reciprocity Approach for Shared Secret Key Generation Extracted from Received Signal Strength in The Wireless Networks,” 2018 Int. Electron. Symp. Eng. Technol. Appl. IES-ETA 2018 – Proc., pp. 170-175, 2019.
I. T. Dewi, A. Sudarsono, P. Kristalina, M. Yuliana, “Reciprocity Enhancement in V2V Key Generation System by using HPK Method,” IES 2019 – Int. Electron. Symp. Role Techno-Intelligence Creat. An Open Energy Syst. Towar. Energy Democr. Proc., pp. 6-13, 2019.
M. Yuliana, Wirawan, and Suwadi, “Performance Analysis of Loss Multilevel Quantization on the Secret Key Generation Scheme in Indoor Wireless Environment,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 9, no. 1, pp. 100-108, 2019.
A. Sudarsono, M. Yuliana, P. Kristalina, and A. R. Barakbah, “An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication,” Proc. – 2018 6th Int. Symp. Comput. Networking, CANDAR 2018, pp. 57-65, 2018.
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development