×

Secret key for wireless communication in cyber-physical automotive systems

  • US 10,129,022 B1
  • Filed: 02/22/2017
  • Issued: 11/13/2018
  • Est. Priority Date: 02/22/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method of generating a key to effectively secure wireless communications between a first communication node and a second communication node, wherein a first cyber-physical system is disposed within the first communication node and a second cyber-physical system is disposed within the second communication node, wherein each cyber-physical system performs an encryption and decryption of said wireless communications, wherein the method comprises:

  • a. sending and receiving a predefined group of probe signals, of predefined size (“

    Gsize

    ), between the first communication node and the second communication node via a wireless channel, wherein the group of probe signals are sent for evaluating randomness of a channel gain of the wireless channel;

    b. collecting a plurality of received signal strength (“

    RSS”

    ) values from the wireless channel;

    c. obtaining a plurality of filtered RSS values by filtering the plurality of RSS values with a high-pass filter defined by an impulse frequency response of the wireless channel, wherein the plurality of filtered RSS values contain information needed to generate the key of required length, Klength;

    d. generating a set of bits, comprising;

    i. calculating an upper threshold, Thup, and a lower threshold, Thlo, based on a mean and a variation of the plurality of filtered RSS values; and

    ii. assigning each filtered RSS value greater than Thup to 1 and assigning each filtered RSS value less than Thlo to 0, wherein each filtered RSS value between Thup and Thlo is discarded;

    e. generating the key having a length L, by collecting the set of bits; and

    f. verifying a length, L, of the key (104), wherein if L is less than Klength, then steps a-f are repeated until L is greater than or equal to Klength,wherein the key is used by the first and second cyber-physical systems to encrypt and decrypt the wireless communications between the first and second communication nodes.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×