Efficient Semantic-aware Encryption for Secure Communications in Intelligent Connected Vehicles

πŸ“… 2025-02-23
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
To address eavesdropping threats arising from open wireless channels in intelligent connected vehicle (ICV) semantic communications, this paper proposes ESAEβ€”an Efficient Semantic-Aware Encryption scheme enabling end-to-end semantic-level security without conventional key distribution. ESAE innovatively introduces a session key self-generation mechanism grounded in semantic reciprocity and a YOLO-v10–driven Semantic-Aware Key Preprocessing (SA-KP) method, ensuring key consistency under semantic equivalence. By synergistically integrating semantic communication, lightweight cryptography, and semantic consistency modeling, ESAE achieves robust performance across diverse wireless channel conditions: 99.2% key agreement rate, encryption/decryption latency below 15 ms, and substantial reduction in key transmission overhead and associated security risks.

Technology Category

Application Category

πŸ“ Abstract
Semantic communication (SemCom) significantly improves inter-vehicle interactions in intelligent connected vehicles (ICVs) within limited wireless spectrum. However, the open nature of wireless communications introduces eavesdropping risks. To mitigate this, we propose the Efficient Semantic-aware Encryption (ESAE) mechanism, integrating cryptography into SemCom to secure semantic transmission without complex key management. ESAE leverages semantic reciprocity between source and reconstructed information from past communications to independently generate session keys at both ends, reducing key transmission costs and associated security risks. Additionally, ESAE introduces a semantic-aware key pre-processing method (SA-KP) using the YOLO-v10 model to extract consistent semantics from bit-level diverse yet semantically identical content, ensuring key consistency. Experimental results validate ESAE's effectiveness and feasibility under various wireless conditions, with key performance factors discussed.
Problem

Research questions and friction points this paper is trying to address.

Secures semantic communication in ICVs
Reduces key transmission costs
Ensures key consistency with SA-KP
Innovation

Methods, ideas, or system contributions that make the work stand out.

Semantic-aware Encryption
Session Key Generation
YOLO-v10 Model
πŸ”Ž Similar Papers
No similar papers found.
Bizhu Wang
Bizhu Wang
Beijing University of Posts and Telecommunications
Anomaly detectionSemantic CommunicationLLM
Z
Zhiqiang Bian
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
Y
Yue Chen
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
X
Xiaodong Xu
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China; Department of Broadband Communication, Peng Cheng Laboratory, Shenzhen, China
C
Chen Sun
Sony (China) Research Laboratory
Wenqi Zhang
Wenqi Zhang
Zhejiang University
Language ModelMultimodal LearningEmbodied Agents
P
Ping Zhang
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China; Department of Broadband Communication, Peng Cheng Laboratory, Shenzhen, China