Detailed Information

Cited 0 time in webofscience Cited 3 time in scopus
Metadata Downloads

An Optimal Security Management Framework for Backhaul-aware 5G-Vehicle to Everything (V2X)

Authors
Sharma, VishalKim, JiyoonKo, YonghoYou, IlsunSeo, Jung Taek
Issue Date
2020
Publisher
National Dong Hwa University
Keywords
Security; 5G-V2X; Backhaul; Sustainability; Key-management; Dual-management
Citation
Journal of Internet Technology, v.21, no.1, pp 245 - 260
Pages
16
Journal Title
Journal of Internet Technology
Volume
21
Number
1
Start Page
245
End Page
260
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3732
DOI
10.3966/160792642020012101021
ISSN
1607-9264
2079-4029
Abstract
Cellular (C) setups facilitate the connectivity amongst the devices with better provisioning of services to its users. Vehicular networks are one of the representative setups that aim at expanding their functionalities by using the available cellular systems like Long Term Evolution (LTE)-based Evolved Universal Terrestrial Radio Access Network (E-UTRAN) as well as the upcoming Fifth Generation (5G)-based functional architecture. The vehicular networks include Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Pedestrian (V2P) and Vehicle to Network (V2N), all of which are referred to as Vehicle to Everything (V2X). 5G has dominated the vehicular network and most of the upcoming research is motivated towards the fully functional utilization of 5G-V2X. Despite that, credential management and edge-initiated security are yet to be resolved under 5G-V2X. To further understand the issue, this paper presents security management as a principle of sustainability and key-management. The performance tradeoff is evaluated with the key-updates required to maintain a secure connection between the vehicles and the 5G-terminals. The proposed approach aims at the utilization of high-speed mmWave-based backhaul for enhancing the security operations between the core and the sub-divided functions at the edge of the network through a dual security management framework. The evaluations are conducted using numerical simulations, which help to understand the impact on the sustainability of connections as well as identification of the fail-safe points for secure and fast operations. Furthermore, the evaluations help to follow the multiple tradeoffs of security and performance based on the metrics like mandatory key updates, the range of operations and the probability of connectivity.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE