Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems

Author:

Weerasinghe Nuwan1,Usman Muhammad Arslan1ORCID,Hewage Chaminda2ORCID,Pfluegel Eckhard1,Politis Christos1

Affiliation:

1. Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK

2. Cybersecurity and Information Networks Centre (CINC), Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK

Abstract

Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, security and privacy concerns pose significant challenges that must be addressed. Therefore, researchers have focused on improving the security and integrity of vehicle data sharing, with a particular emphasis on V2X application layer security and privacy requirements. This is crucial given that V2X networks can consist of vehicles manufactured by different companies and registered in various jurisdictions, which may only be within communication range for a few seconds. Thus, it is necessary to establish a trusting relationship between vehicles quickly. The article proposes a threshold cryptography-based key exchange protocol that meets the key requirements for V2X data sharing and privacy, including the rapid establishment of trust, the maintenance of vehicle anonymity, and the provision of secure messages. To evaluate the feasibility and performance of the proposed protocol, a tailored testbed that leverages the NS-3 network simulator, a commercial 5G network, and public cloud infrastructure is used. Overall, the proposed protocol provides a potential solution for addressing security and privacy concerns in V2X networks, which is essential for successfully implementing and adopting this technology.

Publisher

MDPI AG

Subject

Computer Networks and Communications

Reference44 articles.

1. Paul, A., Chilamkurti, N., Daniel, A., and Rho, S. (2017). Chapter 2—Intelligent transportation systems, Intelligent Vehicular Networks and Communications, Elsevier.

2. 3GPP Universal Mobile Telecommunications System (UMTS), and LTE (2017). Architecture enhancement for V2X Services (3GPP TS 23.285 version 14.2.0 Release 14) Technical Report, ETSI. Available online: https://www.etsi.org/deliver/etsi_ts/123200_123299/123285/14.02.00_60/ts_123285v140200p.pdf.

3. Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures;Hamida;Electronics,2015

4. IFilippi, A., Moerman, K., Martinez, V., Haran, O., and Toledano-Autotalks, R. (2017, January 27–29). IEEE802.11p ahead of LTE-V2V for safety applications. Proceedings of the 2017 IEEE Vehicular Networking Conference (VNC), Torino, Italy. Available online: https://www.nxp.com.cn/docs/en/white-paper/LTE-V2V-WP.pdf.

5. Dawood, M., Fuhrmann, W., and Ghita, B.V. (2014, January 8–10). Assay of White Space Technology Standards for Vehicular Cognitive Access. Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V;Sensors;2024-08-20

2. Attack Identification and Classification in V2X Scenarios;2024 23rd International Symposium INFOTEH-JAHORINA (INFOTEH);2024-03-20

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3