<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE rfc [
<!ENTITY nbsp "&#160;">
<!ENTITY zwsp "&#8203;">
<!ENTITY nbhy "&#8209;">
<!ENTITY wj "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<rfc category="info" consensus="true" docName="draft-yu-keydistribution-00"
     ipr="trust200902" sortRefs="true" submissionType="IETF" symRefs="true"
     tocInclude="true" version="3" xmlns:xi="http://www.w3.org/2001/XInclude">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->

  <front>
    <title>Model and Test Methods for LTE-V2X Physical Layer Key Distribution
    System</title>

    <seriesInfo name="Internet-Draft" value="draft-yu-keydistribution-00"/>

    <author fullname="Jiabao Yu">
      <organization>Purple Mountain Laboratories, China</organization>

      <address>
        <email>yujiabao@pmlabs.com.cn</email>
      </address>
    </author>

    <author fullname="Aiqun Hu">
      <organization>Purple Mountain Laboratories, China</organization>
    </author>

    <date month="September" year="2023"/>

    <keyword>LTE-V2X</keyword>

    <keyword>key distribution system</keyword>

    <abstract>
      <?line 33?>

      <t>There are several key distribution systems based on the physical
      layer of the LTE Vehicle-to-Everything (V2X) communication system,
      utilizing the random and high-agreement secret key generation schemes
      from noisy wideband channels. To characterize these systems, this
      document proposes a reference model and several test methods of main
      technical parameters of such systems, including average key generation
      rate as well as the consistency and the randomness of generated key
      bits. </t>
    </abstract>
  </front>

  <middle>
    <?line 38?>

    <section anchor="introduction">
      <name>Introduction</name>

      <t>There are several key distribution systems based on the physical
      layer of the LTE Vehicle-to-Everything (V2X) communication system,
      utilizing the random and high-agreement secret key generation schemes
      from noisy wideband channels. To characterize these systems, this
      document proposes a reference model and several test methods of main
      technical parameters of such systems, including average key generation
      rate as well as the consistency and the randomness of generated key
      bits. </t>
    </section>

    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>

      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
      "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
      NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
      "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
      "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are
      to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref
      target="RFC8174"/> when, and only when, they appear in all capitals, as
      shown here.</t>

      <?line -18?>
    </section>

    <section anchor="terms-and-definitions">
      <name>Terms and Definitions</name>

      <section anchor="lte-v2x-physical-layer-key-distribution-system">
        <name>LTE-V2X physical layer key distribution system</name>

        <t>Based on LTE-V2X physical layer channel characteristics, a LTE-V2X
        physical layer key distribution system is used to generatekey streams
        with high consistency for two communicating parties using LTE-V2X.</t>
      </section>

      <section anchor="sender">
        <name>Sender</name>

        <t>The sender initiates the key distribution protocol in LTE-V2X
        physical layer key distribution system. It has duplex communication
        capability to send and receive signals.</t>
      </section>

      <section anchor="receiver">
        <name>Receiver</name>

        <t>The receiver responds to the key distribution protocol in LTE-V2X
        physical layer key distribution system. It has duplex communication
        capability to send and receive signals.</t>
      </section>

      <section anchor="negotiation-signal">
        <name>Negotiation signal</name>

        <t>Negotiation signal is used to transmit additional information for
        the key distribution protocol in LTE-V2X physical layer key
        distribution system. It may be sent and received by using a separate
        physical layer transceiver mechanism or multiplexing LTE-V2X physical
        layer signal transceiver mechanisms.</t>
      </section>
    </section>

    <section anchor="network-topology-of-can-bus-hardware-fingerprint-authentication-device">
      <name>Network Topology of LTE-V2X Physical Layer Key Distribution
      System</name>

      <t>The reference model of the LTE-V2X physical layer key distribution
      system is shown in Fig. 1, including devices such as the sender and the
      receiver.</t>

      <figure>
        <name>The model and reference points of the LTE-V2X physical layer key
        distribution system</name>

        <artset>
          <artwork type="ascii-art" xml:space="preserve">
	   
         +-----------------------------------------------+
         |                                               |
         |    +-----------+   +-------+   +-----------+  |
         |    |LTE-V2X PHY|   |LTE-V2X|   |LTE-V2X PHY|  | Sn
         |    |   Modem   +---+ Upper +---+ Management+--+----
         |    |   Module  |   |Control|   |  Program  |  |
         |    +-----+-----+   +-------+   +-----+-----+  |
         |          |                           |        |
         |  +-------+-------+             +-----+-----+  |
         |  |  LTE-V2X PHY  |             |Channel Key|  | Sk
         |  |Synchronisation+-------------+ Extraction+--+----
         |  |     Module    |             |   Module  |  |
         |  +-------+-------+             +-----+-----+  |
         |          |                           |        |
         |    +-----+-----+               +-----+-----+  |
         |    |LTE-V2X PHY|               |Negotiation|  | Sd
         |    |Transceiver|               |   Signal  +--+----
         |    |   Module  |               | Interface |  |
         |    +-----+-----+               +-----+-----+  |
         |          |           Sender          |        |
         +----------+---------------------------+--------+
                    |Sq                         |
                    |                           |
                    |                           |
                    |                           |
                    |Rq                         |
         +----------+---------------------------+--------+
         |          |          Receiver         |        |
         |    +-----+-----+               +-----+-----+  |
         |    |LTE-V2X PHY|               |Negotiation|  | Rd
         |    |Transceiver|               |   Signal  +--+----
         |    |   Module  |               | Interface |  |
         |    +-----+-----+               +-----+-----+  |
         |          |                           |        |
         |  +-------+-------+             +-----+-----+  |
         |  |  LTE-V2X PHY  |             |Channel Key|  | Rk
         |  |Synchronisation+-------------+ Extraction+--+----
         |  |     Module    |             |   Module  |  |
         |  +-------+-------+             +-----+-----+  |
         |          |                           |        |
         |    +-----+-----+   +-------+   +-----+-----+  |
         |    |LTE-V2X PHY|   |LTE-V2X|   |LTE-V2X PHY|  | Rn
         |    |   Modem   +---+ Upper +---+ Management+--+----
         |    |   Module  |   |Control|   |  Program  |  |
         |    +-----------+   +-------+   +-----------+  |
         |                                               |
         +-----------------------------------------------+
 	   
	  </artwork>
        </artset>
      </figure>

      <t>Eight reference points of LTE-V2X physical layer key distribution
      system are defined in Fig. 1 with the following meanings:</t>

      <ul spacing="normal">
        <li>Sq represents the transceiver interface of the sender;</li>

        <li>Rq represents the transceiver interface of the receiver;</li>

        <li>Sd represents the negotiation signal interface point of the
        sender;</li>

        <li>Rd represents the negotiation signal interface point of the
        receiver;</li>

        <li>Sk represents the key interface reference point of the
        sender;</li>

        <li>Rk represents the key interface reference point of the
        receiver;</li>

        <li>Sn represents the management program interface reference point of
        the sender;</li>

        <li>Rn represents the management program interface reference point of
        the receiver.</li>
      </ul>
    </section>

    <section anchor="test-methods-of-lte-v2x-physical-layer-key-distribution-system">
      <name>Test Methods of LTE-V2X Physical Layer Key Distribution
      System</name>

      <section anchor="the-average-key-generation-rate-of-lte-v2x-physical-layer-key-distribution-system">
        <name>The Average Key Generation Rate of LTE-V2X Physical Layer Key
        Distribution System</name>

        <section anchor="test-content">
          <name>Test Content</name>

          <t>Test the average key generation rate of LTE-V2X physical layer
          key distribution system in the specified scenario. The average key
          generation rate is defined as the number of bits/generation time of
          the key generated by the LTE-V2X physical layer key distribution
          system at the sender or receiver side over a period of time.</t>
        </section>

        <section anchor="test-configuration">
          <name>Test Configuration</name>

          <t>The test configuration is shown in Fig. 2, and the test software
          is LTE-V2X physical layer key distribution system management
          program.</t>

          <figure>
            <name>The test configuration of the average key generation
            rate</name>

            <artset>
              <artwork type="ascii-art" xml:space="preserve">
		  
                           +--------------+ 
              +------------+Upper computer+------------+
              |            +--------------+            | 
              |Sk                                      |Rk 
 +------------+------------+              +------------+------------+
 |  The sender of the key  |Sd          Rd| The receiver of the key |
 |                         +--------------+                         |
 |  distribution system    |Sq          Rq|  distribution system    |
 +-------------------------+              +-------------------------+
		  
		 </artwork>
            </artset>
          </figure>
        </section>

        <section anchor="test-steps">
          <name>Test Steps</name>

          <t>Perform the test as follows:</t>

          <t>1.Record the generated keys by the upper computer and count for
          10 min, then calculate the average key generation rate;</t>

          <t>2.Calculate the average key generation rate by the upper computer
          to record the generated keys and counting for 10 min;</t>

          <t>3.Repeat the test three times and take the average value to
          obtain the average key generation rate of the system in the
          specified scenario.</t>
        </section>
      </section>

      <section anchor="output-key-consistency-of-lte-v2x-physical-layer-key-distribution-system">
        <name>Output Key Consistency of LTE-V2X Physical Layer Key
        Distribution System</name>

        <section anchor="test-content-1">
          <name>Test Content</name>

          <t>The key files generated by the sender and receiver of LTE-V2X
          physical layer key distribution system are compared for content
          consistency.</t>
        </section>

        <section anchor="test-configuration-1">
          <name>Test Configuration</name>

          <t>The test configuration is shown in Fig. 2, and the test software
          is file comparison software.</t>
        </section>

        <section anchor="test-steps-1">
          <name>Test Steps</name>

          <t>Perform the test as follows:</t>

          <t>1.Carry out the test configuration as in Fig. 2, and export the
          output key files of the sender and receiver at the same time by the
          upper computer, and the key file is not less than 125KB.</t>

          <t>2.Use the file comparison software to compare the binary file
          contents of the output key files generated at both ends and record
          the comparison results.</t>
        </section>

        <section anchor="notes-1">
          <name>Notes</name>

          <t>If the output key file is an encapsulated message or encrypted,
          the system shall support key message parsing or decryption.</t>
        </section>
      </section>

      <section anchor="output-key-randomness-of-lte-v2x-physical-layer-key-distribution-system">
        <name>Output Key Randomness of LTE-V2X Physical Layer Key Distribution
        System</name>

        <section anchor="test-content-2">
          <name>Test Content</name>

          <t>The key file generated by LTE-V2X physical layer key distribution
          system is tested for randomness in accordance with the requirements
          of AIS-20/31.</t>
        </section>

        <section anchor="test-configuration-2">
          <name>Test Configuration</name>

          <t>The test configuration is shown in Fig. 2, and the test software
          is randomness test software.</t>
        </section>

        <section anchor="test-steps-2">
          <name>Test Steps</name>

          <t>Perform the test as follows:</t>

          <t>1.Carry out the test configuration as in Fig. 2, and export the
          output key file of the sender and receiver at the same time by the
          upper computer, and the key file is not less than 125KB.</t>

          <t>2.Using the randomness test software that complies with the test
          cases and evaluation methods required by AIS-20/31, analyze the
          randomness of the output key files generated at both ends in terms
          of binary random numbers and record the test results.</t>
        </section>
      </section>
    </section>

    <section anchor="security-considerations">
      <name>Security Considerations</name>

      <t>This section will address only security considerations associated
      with the test environment of LTE-V2X Physical Layer Key Distribution
      Systems. It is necessary to ensure that the upper computer as well as
      the sender and the receiver are in a secure and trusted environment.</t>
    </section>

    <section anchor="iana-considerations">
      <name>IANA Considerations</name>

      <t>This document has no IANA actions.</t>
    </section>
  </middle>

  <back>
    <references>
      <name>Normative References</name>

      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement
          Levels</title>

          <author fullname="S. Bradner" initials="S." surname="Bradner"/>

          <date month="March" year="1997"/>

          <abstract>
            <t>In many standards track documents several words are used to
            signify the requirements in the specification. These words are
            often capitalized. This document defines these words as they
            should be interpreted in IETF documents. This document specifies
            an Internet Best Current Practices for the Internet Community, and
            requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>

        <seriesInfo name="BCP" value="14"/>

        <seriesInfo name="RFC" value="2119"/>

        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>

      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key
          Words</title>

          <author fullname="B. Leiba" initials="B." surname="Leiba"/>

          <date month="May" year="2017"/>

          <abstract>
            <t>RFC 2119 specifies common key words that may be used in
            protocol specifications. This document aims to reduce the
            ambiguity by clarifying that only UPPERCASE usage of the key words
            have the defined special meanings.</t>
          </abstract>
        </front>

        <seriesInfo name="BCP" value="14"/>

        <seriesInfo name="RFC" value="8174"/>

        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>

    <?line 261?>

    <section anchor="workflow-of-lte-v2x-physical-layer-key-distribution-system-based-on-message-reconciliation">
      <name>Workflow of LTE-V2X Physical Layer Key Distribution System Based
      on Message Reconciliation</name>

      <t>The flow of Message Reconciliation-based LTE-V2X Physical Layer Key
      Distribution System usually includes several blocks such as channel
      detection, signal synchronisation, channel estimation, feature
      quantization, information reconciliation and privacy amplification, as
      shown in Fig. 3.</t>

      <figure>
        <name>Workflow of LTE-V2X physical layer key distribution system based
        on message reconciliation</name>

        <artset>
          <artwork type="ascii-art" xml:space="preserve">
             Sender                              Receiver
           +---------+         +-------+        +---------+
           | Channel +---------+LTE-V2X+-------&gt;| Channel |
           |Detection|         |Signal |        |Detection|
           +----+----+         +-------+        +----+----+
                |                                    |
                v                                    v
        +---------------+                    +---------------+
        |    Signal     |                    |    Signal     |
        |Synchronisation|                    |Synchronisation|
        +-------+-------+                    +-------+-------+
                |                                    |
                v                                    v
           +----------+                         +----------+
           | Channel  |                         | Channel  |
           |Estimation|                         |Estimation|
           +----+-----+                         +----+-----+
                |                                    |
                v                                    v
          +------------+                       +------------+
          |  Feature   |                       |  Feature   |
          |Quantisation|                       |Quantisation|
          +-----+------+       +-------+       +-----+------+
                |              |Initial|             |
                +--------------+  Key  +-------------+
                |              +-------+             |
                v                                    v
        +--------------+     +-----------+    +--------------+
        | Information  |     |Negotiation|    | Information  |
        |Reconciliation|&lt;----+   Signal  +---&gt;|Reconciliation|
        +-------+------+     +-----------+    +------+-------+
                |                                    |
                |            +-----------+           |
                +------------+Negotiation+-----------+
                |            |    Key    |           |
                v            +-----------+           v
         +-------------+                      +-------------+
         |   Privacy   |                      |   Privacy   |
         |Amplification|                      |Amplification|
         +------+------+                      +------+------+
                |             +---------+            |
                +-------------+Final Key+------------+
                v             +---------+            v</artwork>
        </artset>
      </figure>

      <t>The specific steps of the workflow are as follows:</t>

      <t>1.Channel Detection: The sender sends an LTE-V2X physical layer
      signal to the receiver, and the receiver shall be able to detect and
      receive this signal.</t>

      <t>2.Signal Synchronization: The known frequency-conducting signal
      sequence in the received signal is extracted by coarse and fine
      synchronization. Frequency bias estimation and frequency compensation
      are generally required since the received signal will have frequency
      bias deviation due to the channel.</t>

      <t>3.Channel Estimation: Extract channel characteristics for the
      frequency compensated received signal.</t>

      <t>4.Feature Quantization: Discrete continuous channel state information
      into streams of 0 and 1 bits to obtain the initial key.</t>

      <t>5.Message Reconciliation: Due to channel and estimation algorithms,
      there will be inconsistent bits in the initial keys of the two
      communicating parties. Obtaining the symmetric shared key by removing
      the inconsistent bits in the interactions of negotiation signals, or
      using the error correcting capability of channel coding techniques can
      help achieve encrypted transmission of the message.</t>

      <t>6.Privacy Amplification: Using the one-way mapping property of the
      hash function to improve the randomness and security of the shared
      key.</t>
    </section>

    <section anchor="workflow-of-lte-v2x-physical-layer-key-distribution-system-based-on-error-correcting-codes">
      <name>Workflow of LTE-V2X Physical Layer Key Distribution System Based
      on Error correcting Codes</name>

      <t>LTE-V2X physical layer key distribution system based on error
      correcting codes does not seek to achieve identical key generation
      results at the sender and receiver, but instead it uses error correcting
      codes and one-time encryption and decryption in conjunction. Error
      correcting code decoding recovers a small number of error bits, and
      one-time encryption and decryption would not introduce additional error
      bits other than the key generation error. The process usually includes
      several parts such as channel detection, signal synchronization, channel
      estimation, feature quantization, error correcting coding, synchronous
      encryption, synchronous decryption, and error correcting decoding, as
      shown in Fig. 4.</t>

      <figure>
        <name>Workflow of LTE-V2X physical layer key distribution system based
        on error correcting codes</name>

        <artset>
          <artwork type="ascii-art" xml:space="preserve">
	   
                Sender                        Receiver
              +---------+     +-------+     +---------+
              | Channel |     |LTE-V2X|     | Channel |
              |         +-----+       +----&gt;|         |
              |Detection|     |Signal |     |Detection|
              +----+----+     +-------+     +----+----+
                   |                             |
                   v                             v
           +---------------+             +---------------+
           |    Signal     |             |    Signal     |
           |Synchronisation|             |Synchronisation|
           +-------+-------+             +-------+-------+
                   |                             |
                   v                             v
             +-----------+                 +-----------+
             |  Channel  |                 |  Channel  |
             |Estimation |                 |Estimation |
             +-----+-----+                 +-----+-----+
                   |                             |
                   v                             v
            +-------------+               +-------------+
            |   Feature   |               |   Feature   |
            |Quantisation |               |Quantisation |
            +------+------+               +------+------+
                   |                             |
                   v                             v
             +-----------+    +-------+    +-----------+
             |Synchronous|    |LTE-V2X|    |Synchronous|
             |           +---&gt;|       +---&gt;|           |
             |Encryption |    |Signal |    |Decryption |
             +-----------+    +-------+    +-----------+
                   ^                             ^
                   |                             |
              +----+-----+                  +----+-----+
       Send   |  Error   |                  |  Error   | Receive
     --------&gt;|Correcting|                  |Correcting+--------&gt;
      Message |  Coding  |                  | Decoding | Message
              +----------+                  +----------+
	   
	  </artwork>
        </artset>
      </figure>

      <t>The specific steps of the workflow are as follows:</t>

      <t>1.Channel Detection: The sender sends an LTE-V2X physical layer
      signal to the receiver, and the receiver shall be able to detect and
      receive this signal.</t>

      <t>2.Signal Synchronization: The known frequency-conducting signal
      sequence in the received signal is extracted by coarse and fine
      synchronization. Frequency bias estimation and frequency compensation
      are generally required since the received signal will have frequency
      bias deviation due to the channel.</t>

      <t>3.Channel Estimation: Extract channel characteristics for the
      frequency compensated received signal.</t>

      <t>4.Feature Quantization: Discrete continuous channel state information
      into streams of 0 and 1 bits to obtain the one-time key.</t>

      <t>5.Error Correcting Coding: Error correcting coding of the plaintext
      bitstream of the sending message.</t>

      <t>6.Synchronous Encryption: The ciphertext bit stream is obtained by
      bit wise dissimilarity between the one-time secret key generated by the
      sender and the bit stream after error correction coding. Add appropriate
      synchronization information of one-time secret key, modulate and
      transmit it using the LTE-V2X channel.</t>

      <t>7.Synchronous Decryption: Receive the signal from LTE-V2X channel and
      demodulate it, recover synchronization information of one-time secret
      key, delete synchronization information of key to get the ciphertext
      message bit stream, and then bitwise dissimilar the corresponding
      one-time key of the receiver and the ciphertext bit stream to obtain the
      plaintext bit stream with error correction code.</t>

      <t>8.Error Correcting Decoding: The plaintext bit stream containing the
      error correcting code is error correcting decoded to get the received
      information.</t>
    </section>
  </back>

  <!-- ##markdown-source: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-->
</rfc>
