{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T06:13:40Z","timestamp":1762409620372,"version":"3.41.0"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T00:00:00Z","timestamp":1573862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2020,4,30]]},"abstract":"<jats:p>In a platoon-based vehicular cyber-physical system (PVCPS), a lead vehicle that is responsible for managing the platoon\u2019s moving directions and velocity periodically disseminates control messages to the vehicles that follow. Securing wireless transmissions of the messages between the vehicles is critical for privacy and confidentiality of the platoon\u2019s driving pattern. However, due to the broadcast nature of radio channels, the transmissions are vulnerable to eavesdropping. In this article, we propose a cooperative secret key agreement (CoopKey) scheme for encrypting\/decrypting the control messages, where the vehicles in PVCPS generate a unified secret key based on the quantized fading channel randomness. Channel quantization intervals are optimized by dynamic programming to minimize the mismatch of keys. A platooning testbed is built with autonomous robotic vehicles, where a TelosB wireless node is used for onboard data processing and multi-hop dissemination. Extensive real-world experiments demonstrate that CoopKey achieves significantly low secret bit mismatch rate in a variety of settings. Moreover, the standard NIST test suite is employed to verify randomness of the generated keys, where the p-values of our CoopKey pass all the randomness tests. We also evaluate CoopKey with an extended platoon size via simulations to investigate the effect of system scalability on performance.<\/jats:p>","DOI":"10.1145\/3365996","type":"journal-article","created":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T13:01:53Z","timestamp":1574082113000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Design and Implementation of Secret Key Agreement for Platoon-based Vehicular Cyber-physical Systems"],"prefix":"10.1145","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0517-2392","authenticated-orcid":false,"given":"Kai","family":"Li","sequence":"first","affiliation":[{"name":"Real-Time and Embedded Computing Systems Research Centre (CISTER), Portugal"}]},{"given":"Wei","family":"Ni","sequence":"additional","affiliation":[{"name":"Data61, Commonwealth Scientific and Industrial Research Organization (CSIRO), Sydney, NSW, Australia"}]},{"given":"Yousef","family":"Emami","sequence":"additional","affiliation":[{"name":"CISTER, Portugal"}]},{"given":"Yiran","family":"Shen","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Portugal"}]},{"given":"Ricardo","family":"Severino","sequence":"additional","affiliation":[{"name":"CISTER, Portugal"}]},{"given":"David","family":"Pereira","sequence":"additional","affiliation":[{"name":"CISTER, Portugal"}]},{"given":"Eduardo","family":"Tovar","sequence":"additional","affiliation":[{"name":"CISTER, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2019,11,16]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2014. ZigBee Specification. ZigBee Alliance. Retrieved from https:\/\/www.zigbee.org\/wp-content\/uploads\/2014\/11\/docs-05-3474-20-0csg-zigbee-specification.pdf.  2014. ZigBee Specification. ZigBee Alliance. Retrieved from https:\/\/www.zigbee.org\/wp-content\/uploads\/2014\/11\/docs-05-3474-20-0csg-zigbee-specification.pdf."},{"key":"e_1_2_1_2_1","unstructured":"2018. ENABLE-S3: European initiative to enable validation for highly automated safe and secure systems. Retrieved from https:\/\/www.enable-s3.eu\/.  2018. ENABLE-S3: European initiative to enable validation for highly automated safe and secure systems. Retrieved from https:\/\/www.enable-s3.eu\/."},{"key":"e_1_2_1_3_1","unstructured":"2018. Wifibot. Retrieved from http:\/\/www.wifibot.com\/page4.php.  2018. Wifibot. Retrieved from http:\/\/www.wifibot.com\/page4.php."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2010.5625054"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.248"},{"volume-title":"Dynamic Programming and Optimal Control","author":"Bertsekas Dimitri P.","key":"e_1_2_1_6_1","unstructured":"Dimitri P. Bertsekas . 2005. Dynamic Programming and Optimal Control . Vol. 1 . Athena Scientific , Belmont, MA . Dimitri P. Bertsekas. 2005. Dynamic Programming and Optimal Control. Vol. 1. Athena Scientific, Belmont, MA."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.114"},{"volume-title":"Introduction to Algorithms","author":"Cormen Thomas H.","key":"e_1_2_1_9_1","unstructured":"Thomas H. Cormen , Charles E. Leiserson , Ronald L. Rivest , and Clifford Stein . 2009. Introduction to Algorithms . The MIT Press . Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2009. Introduction to Algorithms. The MIT Press."},{"volume-title":"Proceedings of the International Symposium on Information Processing in Sensor Networks (IPSN\u201910)","author":"Croft Jessica","key":"e_1_2_1_10_1","unstructured":"Jessica Croft , Neal Patwari , and Sneha K. Kasera . 2010. Robust uncorrelated bit extraction methodologies for wireless sensors . In Proceedings of the International Symposium on Information Processing in Sensor Networks (IPSN\u201910) . ACM, 70--81. Jessica Croft, Neal Patwari, and Sneha K. Kasera. 2010. Robust uncorrelated bit extraction methodologies for wireless sensors. In Proceedings of the International Symposium on Information Processing in Sensor Networks (IPSN\u201910). ACM, 70--81."},{"volume-title":"Space-time Wireless Channels","author":"Durgin Gregory D.","key":"e_1_2_1_11_1","unstructured":"Gregory D. Durgin . 2003. Space-time Wireless Channels . Prentice Hall Professional . Gregory D. Durgin. 2003. Space-time Wireless Channels. Prentice Hall Professional."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2764384"},{"key":"e_1_2_1_13_1","unstructured":"Larry Greenemeier. 2007. Election fix? Switzerland tests quantum cryptography. Sci. Amer. (2007).  Larry Greenemeier. 2007. Election fix? Switzerland tests quantum cryptography. Sci. Amer. (2007)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567033"},{"volume-title":"Proceedings of the ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom\u201909)","author":"Jana Suman","key":"e_1_2_1_15_1","unstructured":"Suman Jana , Sriram Nandha Premnath , Mike Clark , Sneha K. Kasera , Neal Patwari , and Srikanth V. Krishnamurthy . 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments . In Proceedings of the ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom\u201909) . ACM, 321--332. Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K. Kasera, Neal Patwari, and Srikanth V. Krishnamurthy. 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom\u201909). ACM, 321--332."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2013.10.006"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2410831"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904177"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00039"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422933"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.89"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302506.3310406"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201912)","author":"Liu Hongbo","year":"2012","unstructured":"Hongbo Liu , Jie Yang , Yan Wang , and Yingying Chen . 2012 . Collaborative secret key extraction leveraging received signal strength in mobile wireless networks . In Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201912) . IEEE, 927--935. Hongbo Liu, Jie Yang, Yan Wang, and Yingying Chen. 2012. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201912). IEEE, 927--935."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2206385"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.033010.00024"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1687041.1687073"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2018.2815155"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2016.25"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5999759"},{"key":"e_1_2_1_32_1","volume-title":"Hsiao-Chun Wu, Scott C.-H. Huang, and Hsiao-Hwa Chen.","author":"Shiu Yi-Sheng","year":"2011","unstructured":"Yi-Sheng Shiu , Shih Yu Chang , Hsiao-Chun Wu, Scott C.-H. Huang, and Hsiao-Hwa Chen. 2011 . Physical layer security in wireless networks: A tutorial. IEEE Wirel. Commun . 18, 2 (2011). Yi-Sheng Shiu, Shih Yu Chang, Hsiao-Chun Wu, Scott C.-H. Huang, and Hsiao-Hwa Chen. 2011. Physical layer security in wireless networks: A tutorial. IEEE Wirel. Commun. 18, 2 (2011)."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6092-8"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140257"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121010"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2817607"},{"volume-title":"Proceedings of the ACM\/EDAC\/IEEE Design Automation Conference (DAC\u201914)","author":"Wasicek Armin","key":"e_1_2_1_38_1","unstructured":"Armin Wasicek , Patricia Derler , and Edward A. Lee . 2014. Aspect-oriented modeling of attacks in automotive cyber-physical systems . In Proceedings of the ACM\/EDAC\/IEEE Design Automation Conference (DAC\u201914) . IEEE, 1--6. Armin Wasicek, Patricia Derler, and Edward A. Lee. 2014. Aspect-oriented modeling of attacks in automotive cyber-physical systems. In Proceedings of the ACM\/EDAC\/IEEE Design Automation Conference (DAC\u201914). IEEE, 1--6."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2780232"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.144"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2143407"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.262101"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120014"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462231"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365996","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3365996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:07Z","timestamp":1750268947000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365996"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,16]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4,30]]}},"alternative-id":["10.1145\/3365996"],"URL":"https:\/\/doi.org\/10.1145\/3365996","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"type":"print","value":"2378-962X"},{"type":"electronic","value":"2378-9638"}],"subject":[],"published":{"date-parts":[[2019,11,16]]},"assertion":[{"value":"2019-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}