Security of 5G-V2X: Technologies, Standardization, and Research Directions
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sharma, Vishal | - |
dc.contributor.author | You, Ilsun | - |
dc.contributor.author | Guizani, Nadra | - |
dc.date.accessioned | 2021-08-11T08:32:52Z | - |
dc.date.available | 2021-08-11T08:32:52Z | - |
dc.date.issued | 2020-09 | - |
dc.identifier.issn | 0890-8044 | - |
dc.identifier.issn | 1558-156X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/2488 | - |
dc.description.abstract | C-V2X aims at resolving issues pertaining to the traditional usability of V2I and V2V networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For this, the evolvement of LTE-V2X is revolutionary, but it fails to handle the demands of high throughput, ultrahigh reliability, and ultra-low latency alongside its security mechanisms. To counter this, 5G-V2X is considered as an integral solution, which not only resolves the issues related to LTE-V2X but also provides a function-based network setup. Several reports have been given for the security of 5G, but none of them primarily focuses on the security of 5G-V2X and its supportive mobile backhaul. This article provides a detailed overview of 5G-V2X with a security-based comparison to LTE-V2X. A novel Security Reflex Function (SRF)-based architecture is proposed and several research challenges are presented related to the security of 5G-V2X. Furthermore, the article lays out requirements of Ultra-Dense and Ultra-Secure (UD-US) transmissions necessary for 5G-V2X. | - |
dc.format.extent | 9 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers | - |
dc.title | Security of 5G-V2X: Technologies, Standardization, and Research Directions | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/MNET.001.1900662 | - |
dc.identifier.scopusid | 2-s2.0-85087063816 | - |
dc.identifier.wosid | 000591303900044 | - |
dc.identifier.bibliographicCitation | IEEE Network, v.34, no.5, pp 306 - 314 | - |
dc.citation.title | IEEE Network | - |
dc.citation.volume | 34 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 306 | - |
dc.citation.endPage | 314 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | V2X | - |
dc.subject.keywordPlus | NETWORKS | - |
dc.subject.keywordAuthor | Vehicle-to-everything | - |
dc.subject.keywordAuthor | 5G mobile communication | - |
dc.subject.keywordAuthor | Long Term Evolution | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Computer architecture | - |
dc.subject.keywordAuthor | Reliability | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.