Abstract
We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network. For example, we examine the relationship between vehicle speed and secrecy capacity, the relationship between the response time and secrecy capacity of an autonomous vehicle, and the relationship between transmission power and secrecy capacity. In particular, the autonomous vehicle has set the system modeling on the assumption that the speed of the vehicle is related to the safety distance. We propose new vehicle communication to maintain a certain level of secrecy capacity according to various parameters. As a result, we can expect safer communication security of autonomous vehicles in 5G communications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sun, L., Du, Q.: Secure Data Dissemination for Intelligent Transportation Systems. Secure and Trustworthy Transportation Cyber-Physical Systems, Springer Briefs in Computer Science, pp. 99–140 (2017)
Saki, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks 61, 33–50 (2017)
Camacho, F., Cárdenas, C., Muñoz, D.: Emerging technologies and research challenges for intelligent transportation systems: 5G, HetNets, and SDN. Int. J. Interact. Des. Manu. (2017). Springer
Whyte, W., Weimerskirch, A., Kumar, V., Hehn, T.: A security credential management system for V2V communications. In: 2013 IEEE Vehicular Networking Conference (VNC) (2013)
Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C.P.A., Sun, Z.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), December 2017
Liang, L., Peng, H., Li, G.Y., (Sherman) Shen, X.: Vehicular communications: a physical layer perspective. IEEE Trans. Veh. Technol. (2017)
Han, D., Bai, B., Chen, W.: Secure V2V communications via relays: resource allocation and performance analysis. IEEE Wirel. Commun. Lett. 6(3), June 2017
Eltayeb, M.E., Choi, J., Al-Naffouri, T.Y., Heath Jr., R.W.: Enhancing secrecy with multi-antenna transmission in millimeter wave vehicular communication systems. IEEE Trans. Veh. Technol. (2017)
Mullakkal-Babu, F.A., Wang, M., van Arem, B., Happee, R.: Design and analysis of full range adaptive cruise control with integrated collision avoidance strategy. In: 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC) (2016)
Duan, S., Zhao, J.: A model based on hierarchical safety distance algorithm for ACC control mode switching strategy. In: 2017 2nd International Conference on Image, Vision and Computing (2017)
Wang, G., Zhao, L., Hao, Y., Zhu, J.: Design of active safety warning system for hazardous chemical transportation vehicle. Information Technology and Intelligent Transportation System, Springer, pp. 11-21 (2017)
Zhao, D., Xia, Z., Zhang, Q.: Model-free optimal control based intelligent cruise control with hardware-in-the-loop demonstration. IEEE Comput. Intell. Mag., May 2017
Bloch, M., Barros, J., Rodrigues, M.R.D., McLaughlin, S.W.: Wireless information-theoretic security. IEEE Trans. Inf. Theory 54(6), 2515–2534 (2008)
Zou, Y., Zhu, J., Wang, X., Leung, V.C.M.: Improving physical-layer security in wireless communications using diversity techniques. IEEE Network, January/February 2015
Chen, X., Ng, D.W.K., Gerstacker, W.H., Chen, H.-H.: A survey on multiple-antenna techniques for physical layer security. IEEE Commun. Surv. Tutorials 19(2), Second Quarter (2017)
Wu1, Y., Liu, W., Wang, S., Guo, W., Chu, X: Network coding in Device-to-device (D2D) communications underlaying cellular networks. In: IEEE ICC 2015–Wireless Communication Symposium (2015)
Jameel, F., Haider, M.A.A., Butt, A.A.: Performance analysis of VANETs under Rayleigh, Rician, Nakagami and Weibull Fading. In: 2017 International Conference on Communication, Computing and Digital Systems (C-CODE) (2017)
Inaltekin, H., Chiang, M., Vincent Poor, H., Wicker, S.B.: On unbounded path-loss models: effects of singularity on wireless network performance. IEEE J. Sel. Areas Commun. 27(7), September 2009
Zhang, A., Lin, X.: Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, July/August 2017
Zhang, A., Wang, L., Ye, X., Zhou, L.: Secure content delivery over device-to-device communications underlaying cellular networks. Wirel. Commun. Mob. Comput. 16, 2449–2462 (2016)
Iwata, S., Ohtsuki, T., Kam, P.-T.: A lower bound on secrecy capacity for MIMO wiretap channel aided by a cooperative jammer with channel estimation error. IEEE Access 5, 4636–4645 (2017)
Liang, Y., Vincent Poor, H.: Shamai (Shitz), S.: Secure communication over fading channels. IEEE Trans. Inf. Theory 54(6), 2453–2469 (2008)
Vincent Poora, H., Schaeferb, R.F.: Wireless physical layer security. PNAS 114(1), 19–26 (2017)
Ge, X., Cheng, H., Mao, G., Yang, Y., Tu, S.: Vehicular communications for 5G Cooperative small-cell networks. IEEE Trans. Veh. Technol. 65(10), 13 (2016)
Gong, S., Xing, C., Fei, Z., Kuang, J.: Cooperative beamforming design for physical-layer security of Multi-Hop MIMO communications. Science China Information Sciences (2015)
Xu, D., Ren, P., Du, Q., Sun, L.: Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems. Int. J. Distrib. Sensor Networks (2016)
Amin, T.: Performance Analysis of Secondary Users in Heterogeneous Cognitive Radio Network. Georgia Southern University Digital Commons@Georgia Southern (2016)
Choi, J.: Channel-Aware Randomized Encryption and Channel Estimation Attack. IEEE Access 5 (2017)
Choi, J.: Secure transmissions via compressive sensing in multicarrier systems. IEEE Signal Process. Lett. 23(10), October 2016
Yu, N.Y.: Indistinguishability of compressed encryption with circulant matrices for wireless security. IEEE Sig. Process. Lett. 24(2), February 2017
Barceló-Lladó, J.E., Morell, A., Seco-Granados, G.: Amplify-and-forward compressed sensing as a physical-layer secrecy solution in wireless sensor networks. IEEE Trans. Inf. Forens. Secur. 9(5), May 2014
Athira, V., Sudhish, N., George, D.P.P.: A novel encryption method based on compressive sensing. In: 2013 International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s) (2013)
Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: 2008 46th Annual Allerton Conference on Communication, Control, and Computing (2008)
Dautov, R., Tsouri, G.R.: Establishing secure measurement matrix for compressed sensing using wireless physical layer security. In: 2013 International Conference on Computing, Networking and Communications, Communications and Information Security Symposium (2013)
Chang, S., Li, J., Fu, X., Zhang, L.: Energy harvesting for physical layer security in cooperative networks based on compressed sensing. Entropy 19(420), 2017 (2017)
Guo, J., Song, B., He, Y., Richard, F.: A survey on compressed sensing in vehicular infotainment systems. IEEE Commun. Surv. Tutor. 19(4), Fourth Quarter 2017
Zhang, J., Duong, T.Q., Woods, R., Marshall, A.: Securing wireless communications of the internet of things from the physical layer, an overview. Entropy 19(420), 2017 (2017)
Donoho, D.L.: Compressed sensing. IEEE Trans. Inf. Theory 52(4), April 2006
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ahn, NY., Lee, D., Oh, SJ. (2019). Vehicle Communication Using Secrecy Capacity. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Proceedings of the Future Technologies Conference (FTC) 2018. FTC 2018. Advances in Intelligent Systems and Computing, vol 881. Springer, Cham. https://doi.org/10.1007/978-3-030-02683-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-02683-7_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02682-0
Online ISBN: 978-3-030-02683-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)