Internet-Draft | Model and Test Methods for LTE-V2X Physi | April 2024 |
Yang, et al. | Expires 16 October 2024 | [Page] |
There are several key distribution systems based on the physical layer of the LTE Vehicle-to-Everything (V2X) communication system, utilizing the random and high-agreement secret key generation schemes from noisy wideband channels. These systems are used in conjunction with physical layer authentication systems that are also based on physical characteristics. To characterize these systems, this document proposes a reference model and several test methods of main technical parameters of such systems, including average key generation rate as well as the consistency and the randomness of generated key bits.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 3 October 2024.¶
Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
There are several key distribution systems based on the physical layer of the LTE Vehicle-to-Everything (V2X) communication system, utilizing the random and high-agreement secret key generation schemes from noisy wideband channels. These systems are used in conjunction with physical layer authentication systems that are also based on physical characteristics. To characterize these systems, this document proposes a reference model and several test methods of main technical parameters of such systems, including average key generation rate as well as the consistency and the randomness of generated key bits.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
Based on LTE-V2X physical layer channel characteristics, a LTE-V2X physical layer key distribution system is used to generate key streams with high consistency for two communicating parties using LTE-V2X.¶
The sender initiates the key distribution protocol in LTE-V2X physical layer key distribution system. It has duplex communication capability to send and receive signals.¶
The receiver responds to the key distribution protocol in LTE-V2X physical layer key distribution system. It has duplex communication capability to send and receive signals.¶
Negotiation signal is used to transmit additional information for the key distribution protocol in LTE-V2X physical layer key distribution system. It may be sent and received by using a separate physical layer transceiver mechanism or multiplexing LTE-V2X physical layer signal transceiver mechanisms.¶
The reference model of the LTE-V2X physical layer key distribution system is shown in Fig. 1, including devices such as the sender and the receiver.¶
Eight reference points of LTE-V2X physical layer key distribution system are defined in Fig. 1 with the following meanings:¶
Test the average key generation rate of LTE-V2X physical layer key distribution system in the specified scenario. The average key generation rate is defined as the number of bits/generation time of the key generated by the LTE-V2X physical layer key distribution system at the sender or receiver side over a period of time.¶
The test configuration is shown in Fig. 2, and the test software is LTE-V2X physical layer key distribution system management program.¶
Perform the test as follows:¶
1.Record the generated keys by the upper computer for 10 min;¶
2.Calculate the average key generation rate by the upper computer recorded in step 1;¶
3.Repeat the test three times and take the average value to obtain the average key generation rate of the system in the specified scenario.¶
The key files generated by the sender and receiver of LTE-V2X physical layer key distribution system are compared for content consistency.¶
The test configuration is shown in Fig. 2.¶
Perform the test as follows:¶
1.Carry out the test configuration as in Fig. 2, and export both output key files of the sender and receiver at the same time by the upper computer, and make sure the key files are not less than 125KB.¶
2.Use file comparison software to compare the binary file contents of the output key files generated at both ends and record the comparison results.¶
The key file generated by LTE-V2X physical layer key distribution system is tested for randomness in accordance with the requirements of AIS-20/31.¶
The test configuration is shown in Fig. 2.¶
Perform the test as follows:¶
1.Carry out the test configuration as in Fig. 2, and export both output key file of the sender and receiver at the same time by the upper computer, and make sure the key files are not less than 125KB.¶
2.Using the randomness test software that complies with the test cases and evaluation methods required by AIS-20/31, analyze the randomness of the output key files generated at both ends in terms of binary random numbers and record the test results.¶
This section will address only security considerations associated with the test environment of LTE-V2X Physical Layer Key Distribution Systems. It is necessary to ensure that the upper computer as well as the sender and the receiver are in a secure and trusted environment.¶
This document has no IANA actions.¶
The flow of Message Reconciliation-based LTE-V2X Physical Layer Key Distribution System usually includes several blocks such as channel detection, signal synchronisation, channel estimation, feature quantization, information reconciliation and privacy amplification, as shown in Fig. 3.¶
The specific steps of the workflow are as follows:¶
1.Channel Detection: The sender sends an LTE-V2X physical layer signal to the receiver, and the receiver shall be able to detect and receive this signal.¶
2.Signal Synchronization: The known frequency-conducting signal sequence in the received signal is extracted by coarse and fine synchronization. Frequency bias estimation and frequency compensation are generally required since the received signal will have frequency bias deviation due to the channel.¶
3.Channel Estimation: Extract channel characteristics for the frequency compensated received signal.¶
4.Feature Quantization: Discrete continuous channel state information into streams of 0 and 1 bits to obtain the initial key.¶
5.Message Reconciliation: Due to channel and estimation algorithms, there will be inconsistent bits in the initial keys of the two communicating parties. Obtaining the symmetric shared key by removing the inconsistent bits in the interactions of negotiation signals, or using the error correcting capability of channel coding techniques can help achieve encrypted transmission of the message.¶
6.Privacy Amplification: Using the one-way mapping property of the hash function to improve the randomness and security of the shared key.¶
LTE-V2X physical layer key distribution system based on error correcting codes does not seek to achieve identical key generation results at the sender and receiver, but instead it uses error correcting codes and one-time encryption and decryption in conjunction. Error correcting code decoding recovers a small number of error bits, and one-time encryption and decryption would not introduce additional error bits other than the key generation error. The process usually includes several parts such as channel detection, signal synchronization, channel estimation, feature quantization, error correcting coding, synchronous encryption, synchronous decryption, and error correcting decoding, as shown in Fig. 4.¶
The specific steps of the workflow are as follows:¶
1.Channel Detection: The sender sends an LTE-V2X physical layer signal to the receiver, and the receiver shall be able to detect and receive this signal.¶
2.Signal Synchronization: The known frequency-conducting signal sequence in the received signal is extracted by coarse and fine synchronization. Frequency bias estimation and frequency compensation are generally required since the received signal will have frequency bias deviation due to the channel.¶
3.Channel Estimation: Extract channel characteristics for the frequency compensated received signal.¶
4.Feature Quantization: Discrete continuous channel state information into streams of 0 and 1 bits to obtain the one-time key.¶
5.Error Correcting Coding: Error correcting coding of the plaintext bitstream of the sending message.¶
6.Synchronous Encryption: The ciphertext bit stream is obtained by bit wise dissimilarity between the one-time secret key generated by the sender and the bit stream after error correction coding. Add appropriate synchronization information of one-time secret key, modulate and transmit it using the LTE-V2X channel.¶
7.Synchronous Decryption: Receive the signal from LTE-V2X channel and demodulate it, recover synchronization information of one-time secret key, delete synchronization information of key to get the ciphertext message bit stream, and then bitwise dissimilar the corresponding one-time key of the receiver and the ciphertext bit stream to obtain the plaintext bit stream with error correction code.¶
8.Error Correcting Decoding: The plaintext bit stream containing the error correcting code is error correcting decoded to get the received information.¶