Detailed Information

Cited 2 time in webofscience Cited 3 time in scopus
Metadata Downloads

An Optimal Security Management Framework for Backhaul-aware 5G-Vehicle to Everything (V2X)

Authors
Sharma, VishalKim, JiyoonKo, YonghoYou, IlsunSeo, Jung Taek
Issue Date
Jan-2020
Publisher
LIBRARY & INFORMATION CENTER, NAT DONG HWA UNIV
Keywords
Security; 5G-V2X; Backhaul; Sustainability; Key-management; Dual-management
Citation
JOURNAL OF INTERNET TECHNOLOGY, v.21, no.1, pp.245 - 260
Journal Title
JOURNAL OF INTERNET TECHNOLOGY
Volume
21
Number
1
Start Page
245
End Page
260
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/80202
DOI
10.3966/160792642020012101021
ISSN
1607-9264
Abstract
Cellular (C) setups facilitate the connectivity amongst the devices with better provisioning of services to its users. Vehicular networks are one of the representative setups that aim at expanding their functionalities by using the available cellular systems like Long Term Evolution (LTE)-based Evolved Universal Terrestrial Radio Access Network (E-UTRAN) as well as the upcoming Fifth Generation (5G)-based functional architecture. The vehicular networks include Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Pedestrian (V2P) and Vehicle to Network (V2N), all of which are referred to as Vehicle to Everything (V2X). 5G has dominated the vehicular network and most of the upcoming research is motivated towards the fully functional utilization of 5G-V2X. Despite that, credential management and edge-initiated security are yet to be resolved under 5G-V2X. To further understand the issue, this paper presents security management as a principle of sustainability and key-management. The performance tradeoff is evaluated with the key-updates required to maintain a secure connection between the vehicles and the 5G-terminals. The proposed approach aims at the utilization of high-speed mmWave-based backhaul for enhancing the security operations between the core and the sub-divided functions at the edge of the network through a dual security management framework. The evaluations are conducted using numerical simulations, which help to understand the impact on the sustainability of connections as well as identification of the fail-safe points for secure and fast operations. Furthermore, the evaluations help to follow the multiple tradeoffs of security and performance based on the metrics like mandatory key updates, the range of operations and the probability of connectivity.
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher SEO, JUNGTAEK photo

SEO, JUNGTAEK
College of IT Convergence (컴퓨터공학부(스마트보안전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE