A Noise-Shaped Signaling Method for Vehicle-to-Everything Security

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 124
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorPark, Dongryulko
dc.contributor.authorAhn, Jangyongko
dc.contributor.authorChoe, Chungjaeko
dc.contributor.authorWoo, Seonghoko
dc.contributor.authorAhn, Seungyoungko
dc.contributor.authorChoi, Junsungko
dc.date.accessioned2021-07-22T00:50:07Z-
dc.date.available2021-07-22T00:50:07Z-
dc.date.created2021-07-21-
dc.date.created2021-07-21-
dc.date.issued2021-05-
dc.identifier.citationIEEE ACCESS, v.9, pp.75385 - 75397-
dc.identifier.issn2169-3536-
dc.identifier.urihttp://hdl.handle.net/10203/286808-
dc.description.abstractThis paper presents a method to improve the Vehicle-to-Everything (V2X) security. With the recent rapid development of communication technology and traffic applications, V2X is recently commercialized and has been growing as a fundamental system for future applications. Because of the high mobility of the vehicles, V2X requires a low latency and high-reliability. However, previous security methods demand a large computational burden and generate high latency owing to complex operations and long additional data bits for ensuing security. To resolve such constraints, an advanced security method ensuring lower latency and higher reliability is required. We propose a noise-shaped signaling method that provides high-level security with low latency for reliable V2X communication. The proposed method encrypts original data symbols to noise-like symbols by applying a noise envelope that consists of Chaotic Random Magnitude Sequence (CRMS) and Chaotic Random Phase Sequences (CRPS). Our method simplifies the sequence sharing process between a sender and an intended receiver by adapting the characteristics of a chaotic dynamic system. Moreover, the proposed method does not demand additional data bits and generate delay because the method only uses simple multiplication and division procedure for data encryption in the physical layer. We analyze our method in depth using extensive simulations and various viewpoints such as error rate, probability of modulation identification. From the simulations, we demonstrate that a malicious adversary cannot comprehend the transmitted symbols and always has the maximum error rate under various network environments and conditions. We also demonstrate how the adversary cannot infer the modulation scheme from the symbols applying the proposed method. After these analyses, we confirm that the noise-shaped signaling method is high-level of secure method with a low latency for V2X communication.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleA Noise-Shaped Signaling Method for Vehicle-to-Everything Security-
dc.typeArticle-
dc.identifier.wosid000673615400001-
dc.identifier.scopusid2-s2.0-85107072020-
dc.type.rimsART-
dc.citation.volume9-
dc.citation.beginningpage75385-
dc.citation.endingpage75397-
dc.citation.publicationnameIEEE ACCESS-
dc.identifier.doi10.1109/access.2021.3082616-
dc.contributor.localauthorAhn, Seungyoung-
dc.contributor.nonIdAuthorChoe, Chungjae-
dc.contributor.nonIdAuthorChoi, Junsung-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorVehicle-to-everything-
dc.subject.keywordAuthorModulation-
dc.subject.keywordAuthorProtocols-
dc.subject.keywordAuthorPhysical layer-
dc.subject.keywordAuthorChaotic communication-
dc.subject.keywordAuthorError analysis-
dc.subject.keywordAuthorCryptography-
dc.subject.keywordAuthordedicated short range communication (DSRC)-
dc.subject.keywordAuthorvehicular ad-hoc network (VANET)-
dc.subject.keywordAuthorvehicle-to-everything (V2X)-
dc.subject.keywordPlusPHYSICAL-LAYER SECURITY-
dc.subject.keywordPlusINTELLIGENT TRANSPORT-SYSTEMS-
dc.subject.keywordPlusSEQUENCE SPREAD-SPECTRUM-
dc.subject.keywordPlusWIRELESS COMMUNICATION-
dc.subject.keywordPlusBLIND ESTIMATION-
dc.subject.keywordPlusAUTHENTICATION-
dc.subject.keywordPlusBROADCAST-
dc.subject.keywordPlusNETWORKS-
dc.subject.keywordPlusPRIVACY-
Appears in Collection
GT-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0