Reconciliation-free physical layer key generation for VANETs using triplet networks

Ahmedalmansour Abuobieda , Weibin Zhang , Ibraheem Abdelazeem , Abdeldime Mohamedsalih , Mohamed Abdalwohab

Urban Lifeline ›› 2026, Vol. 4 ›› Issue (1) : 4

PDF
Urban Lifeline ›› 2026, Vol. 4 ›› Issue (1) :4 DOI: 10.1007/s44285-025-00059-y
Research
research-article

Reconciliation-free physical layer key generation for VANETs using triplet networks

Author information +
History +
PDF

Abstract

Vehicular Ad Hoc Networks (VANETs) are critical for transportation safety and efficiency but face serious security challenges due to limitations of traditional cryptography and emerging cyber threats. This paper proposes a novel reconciliation-free Physical Layer Key Generation (PKG) framework based on dynamic Received Signal Strength (RSS) measurements and Triplet Networks (TN). Unlike conventional PKG schemes, the proposed approach eliminates reconciliation overhead while maintaining high entropy and strong resistance to eavesdropping. Realistic RSS is generated by integrating SUMO-based vehicular mobility with NS-3 network simulations, capturing spatiotemporal channel dynamics. The TN architecture extracts reciprocal channel features through hierarchical convolutional layers and optimized embedding spaces for secure key extraction. Experimental results show near-zero bit error rates between legitimate vehicles, high key entropy (0.69 bits/bit), and complete failure of eavesdroppers to reconstruct keys. Among 3,200 generated keys, 74.1% achieved perfect agreement without reconciliation, while eavesdroppers achieved 0% success. The proposed framework demonstrates a scalable, and robust security solution for VANET communications.

Keywords

Triplet networks / VANETs / Physical layer security / Key generation / Reconciliation

Cite this article

Download citation ▾
Ahmedalmansour Abuobieda, Weibin Zhang, Ibraheem Abdelazeem, Abdeldime Mohamedsalih, Mohamed Abdalwohab. Reconciliation-free physical layer key generation for VANETs using triplet networks. Urban Lifeline, 2026, 4(1): 4 DOI:10.1007/s44285-025-00059-y

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Hua J, Li L, Ning P, Schwebel DC, He J, Rao Z, Cheng P, Li R, Fu Y, Li Jet al.. Road traffic death coding quality in the who mortality database. Bulletin of the World Health Organization, 2023, 101(10): 637

[2]

Tariq U, Ahanger TA. Enhancing intelligent transport systems through decentralized security frameworks in vehicle-to-everything networks. World Electr Veh J, 2025, 16124

[3]

Dutta A, Samaniego Campoverde LM, Tropea M, De Rango F. A comprehensive review of recent developments in vanet for traffic, safety & remote monitoring applications. J Netw Syst Manage, 2024, 32473

[4]

Khan S, Luo F, Zhang Z, Rahim MA, Ahmad M, Wu K. Survey on issues and recent advances in vehicular public-key infrastructure (vpki). IEEE Commun Surv Tutor, 2022, 2431574-1601

[5]

Ali I, Lawrence T, Li F. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in vanets. J Syst Architect, 2020, 103: 101692

[6]

Gitonga CK. The impact of quantum computing on cryptographic systems: Urgency of quantum-resistant algorithms and practical applications in cryptography. Eur J Inf Technol Comput Sci, 2025, 5(1): 1-10

[7]

Xiao Q, Zhao J, Feng S, Li G, Hu A. Securing nextg networks with physical-layer key generation: A survey. Secur Saf, 2024, 3(2023): 021

[8]

Gao N, Han Y, Li N, Jin S, Matthaiou M (2024) When physical layer key generation meets ris: opportunities, challenges, and road ahead. IEEE Wireless Communications, vol 31, pp 355–361

[9]

Li G, Zhang Z, Yu Y, Hu A. A hybrid information reconciliation method for physical layer key generation. Entropy, 2019, 217688

[10]

Ma Y, Zhou G, Wang S. Wifi sensing with channel state information: A survey. ACM Comput Surv (CSUR), 2019, 5231-36

[11]

Xu W, Zhang J, Huang S, Luo C, Li W. Key generation for internet of things: A contemporary survey. ACM Comput Surv (CSUR), 2021, 54(1): 1-37

[12]

Shehadeh YEH, Hogrefe D. A survey on secret key generation mechanisms on the physical layer in wireless networks. Secur Commun Netw, 2015, 8(2): 332-341

[13]

Abdelazeem I, Zhang W, Zeng Z, Abdeldime M. An adaptive lossly quantization technique for key extraction applied in vehicular communication. Wirel Pers Commun, 2022, 126(2): 1345-1361

[14]

Wang Z, Liu Y, Wang J, Li Z, Li Z, Yang X, Qi F, Jia H. A reliable physical layer key generation scheme based on rss and lstm network in vanet. IEEE Internet Things J, 2023, 11(1): 692-707

[15]

Abdelazeem I, Zhang W, Mohamedsalih A, Abdalwohab M, Abuobida A. A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength. Veh Commun, 2024, 49: 100809

[16]

Walther P, Strufe T (2020) Blind twins: Siamese networks for non-interactive information reconciliation. In: 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, Piscataway, NJ, USA, pp 1–7

[17]

Wagner A, Franzoso D, Koepsell S (2024) Attack on machine learning based physical layer key generation scheme. In: Mobilkommunikation; 28. ITG-Fachtagung. VDE Verlag GmbH, Berlin, German, pp 172–177

[18]

Diffie W, Hellman ME (2022) New directions in cryptography. In: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman. ACM, New York, pp 365–390

[19]

Hasan MK, Weichen Z, Safie N, Ahmed FRA, Ghazal TM (2024) A survey on key agreement and authentication protocol for internet of things application. IEEE Access, vol 12, pp 61642–61666

[20]

Chaudhary D, Soni T, Vasudev KL, Saleem K. A modified lightweight authenticated key agreement protocol for internet of drones. Internet Things, 2023, 21: 100669

[21]

Krishnasrija R, Mandal AK, Cortesi A. A lightweight mutual and transitive authentication mechanism for iot network. Ad Hoc Netw, 2023, 138: 103003

[22]

Borgohain P, Choudhury H. A lightweight d2d authentication protocol for relay coverage scenario in 5g mobile network. Comput Netw, 2023, 225: 109679

[23]

Amanlou S, Hasan MK, Bakar KAA. Lightweight and secure authentication scheme for iot network based on publish-subscribe fog computing model. Comput Netw, 2021, 199: 108465

[24]

Abdussami M, Amin R, Vollala S. Provably secured lightweight authenticated key agreement protocol for modern health industry. Ad Hoc Netw, 2023, 141: 103094

[25]

Jiang Q, Zeadally S, Ma J, He D. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access, 2017, 5: 3376-3392

[26]

Verma P, Gupta DS. A pairing-free data authentication and aggregation mechanism for intelligent healthcare system. Comput Commun, 2023, 198: 282-296

[27]

Trivedi C, Rao UP. Secrecy aware key management scheme for internet of healthcare things. J Supercomput, 2023, 79(11): 12492-12522

[28]

Nyangaresi VO. Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks. Ad Hoc Netw, 2023, 142: 103117

[29]

Xu H, Hsu C, Harn L, Cui J, Zhao Z, Zhang Z. Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for industrial internet of things. IEEE Trans Serv Comput, 2023, 16(4): 3000-3013

[30]

Lien CW, Vhaduri S. Challenges and opportunities of biometric user authentication in the age of iot: A survey. ACM Comput Surv, 2023, 56(1): 1-37

[31]

Savitha M, Senthilkumar M. A unique secure multimodal biometrics-based user anonymous authenticated key management protocol (smuaakap) based on block chain mechanism for generic hiotns. Theoret Comput Sci, 2023, 941: 77-90

[32]

Dehmollaian E, Etzlinger B, Springer A (2024) A lightweight cir-based physical layer key generation scheme for uwb. In: 2024 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, Piscataway, NJ, USA, pp 1–6

[33]

Taha H, Alsusa E. Secret key exchange using private random precoding in mimo fdd and tdd systems. IEEE Trans Veh Technol, 2016, 66(6): 4823-4833

[34]

Lu X, Lei J, Shi Y, Li W (2022) Applying intelligent reflective surface to channel phase probing in wireless secret key generation [Preprint]. Research Square. https://doi.org/10.21203/rs.3.rs-1468291/v1

[35]

Brassard G, Salvail L (1993) Secret-key reconciliation by public discussion. In: Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Berlin, Heidelberg, Germany, pp 410–423

[36]

Cheng J, Jiang XQ, Bai E, Wu Y, Hai H, Pan F, Peng Y (2021) Rate adaptive reconciliation based on reed-solomon codes. In: 2021 6th International Conference on Communication, Image and Signal Processing (CCISP). IEEE, Piscataway, NJ, USA, pp 245–249

[37]

Yang K, Du W. A low-density parity-check coding scheme for lora networking. ACM Trans Sens Netw, 2024, 20(4): 1-29

[38]

Buttler WT, Lamoreaux SK, Torgerson JR, Nickel G, Donahue C, Peterson CG. Fast, efficient error reconciliation for quantum cryptography. Phys Rev A, 2003, 67(5): 052303

[39]

Abdelgader AM, Shu F (2017) Exploiting the physical layer security for providing a simple user privacy security system for vehicular networks. In: 2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE). IEEE, Piscataway, NJ, USA, pp 1–6

[40]

Tian K, Xin G, Zhang J, Li L (2023) High efficient secret key reconciliation scheme based on cascade algorithm. In: 2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE). IEEE, Piscataway, NJ, USA, pp 377–381

[41]

Khader A, Xiao L, Yang J. A model-guided deep convolutional sparse coding network for hyperspectral and multispectral image fusion. Int J Remote Sens, 2022, 4362268-2295

[42]

Walther P, Knauer R, Strufe T (2021) Ultra-wideband channel state information and localization for physical layer security [Dataset]. IEEE DataPort. https://doi.org/10.21227/0wej-bc28

Funding

National Natural Science Foundation of China(71971116)

RIGHTS & PERMISSIONS

The Author(s)

PDF

2

Accesses

0

Citation

Detail

Sections
Recommended

/