Detailed Information

Cited 0 time in webofscience Cited 37 time in scopus
Metadata Downloads

Security of 5G-V2X: Technologies, Standardization, and Research Directions

Full metadata record
DC Field Value Language
dc.contributor.authorSharma, Vishal-
dc.contributor.authorYou, Ilsun-
dc.contributor.authorGuizani, Nadra-
dc.date.accessioned2021-08-11T08:32:52Z-
dc.date.available2021-08-11T08:32:52Z-
dc.date.issued2020-09-
dc.identifier.issn0890-8044-
dc.identifier.issn1558-156X-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/2488-
dc.description.abstractC-V2X aims at resolving issues pertaining to the traditional usability of V2I and V2V networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For this, the evolvement of LTE-V2X is revolutionary, but it fails to handle the demands of high throughput, ultrahigh reliability, and ultra-low latency alongside its security mechanisms. To counter this, 5G-V2X is considered as an integral solution, which not only resolves the issues related to LTE-V2X but also provides a function-based network setup. Several reports have been given for the security of 5G, but none of them primarily focuses on the security of 5G-V2X and its supportive mobile backhaul. This article provides a detailed overview of 5G-V2X with a security-based comparison to LTE-V2X. A novel Security Reflex Function (SRF)-based architecture is proposed and several research challenges are presented related to the security of 5G-V2X. Furthermore, the article lays out requirements of Ultra-Dense and Ultra-Secure (UD-US) transmissions necessary for 5G-V2X.-
dc.format.extent9-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers-
dc.titleSecurity of 5G-V2X: Technologies, Standardization, and Research Directions-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/MNET.001.1900662-
dc.identifier.scopusid2-s2.0-85087063816-
dc.identifier.wosid000591303900044-
dc.identifier.bibliographicCitationIEEE Network, v.34, no.5, pp 306 - 314-
dc.citation.titleIEEE Network-
dc.citation.volume34-
dc.citation.number5-
dc.citation.startPage306-
dc.citation.endPage314-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusV2X-
dc.subject.keywordPlusNETWORKS-
dc.subject.keywordAuthorVehicle-to-everything-
dc.subject.keywordAuthor5G mobile communication-
dc.subject.keywordAuthorLong Term Evolution-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorComputer architecture-
dc.subject.keywordAuthorReliability-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE