5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities

被引:12
作者
Boualouache A. [1 ]
Brik B. [2 ]
Tang Q. [3 ]
Korba A.A. [4 ,5 ]
Cherrier S. [6 ]
Senouci S.-M. [2 ]
Pardo E. [3 ]
Ghamri-Doudane Y. [4 ]
Langar R. [5 ,6 ,7 ]
Engel T. [1 ]
机构
[1] University of Luxembourg, Luxembourg
[2] University of Bourgogne Franche Comté, France
[3] Luxembourg Institute of Science and Technology (LIST), Luxembourg
[4] University of la Rochelle, France
[5] Badji Mokhtar Annaba University, Algeria
[6] University Gustave Eiffel, France
[7] ÉCole de Technologie Supérieure (ÉTS), Canada
来源
IEEE Internet of Things Magazine | 2023年 / 6卷 / 01期
关键词
15;
D O I
10.1109/IOTM.001.2200140
中图分类号
学科分类号
摘要
5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G), unprecedented new vehicular use-cases can be supported on top of the same physical network. NS promises to enable the sharing of common network infrastructure and resources while ensuring strict traffic isolation and providing necessary network resources to each NS. However, enabling NS in vehicular networks brings new security challenges and requirements that automotive or 5G standards have not yet addressed. Attackers can exploit the weakest link in the slicing chain, connected and automated vehicles, to violate the slice isolation and degrade its performance. Furthermore, these attacks can be more powerful, especially if they are produced in cross-border areas of two countries, which require an optimal network transition from one operator to another. Therefore, this article aims to provide an overview of newly enabled 5G-V2X slicing use cases and their security issues while focusing on cross-border slicing attacks. It also presents the open security issues of 5G-V2X slicing and identifies some opportunities. © 2018 IEEE.
引用
收藏
页码:114 / 119
页数:5
相关论文
共 17 条
[1]  
Garcia-Roger D., Et al., V2X support in 3GPP specifications: From 4G to 5G and beyond, IEEE Access, 8, 2020
[2]  
Alalewi A., Dayoub I., Cherkaoui S., On 5G-V2X use cases and enabling technologies: A comprehensive survey, IEEE Access, 9, 2021
[3]  
Afolabi I., Et al., Network slicing and softwarization: A survey on principles, enabling technologies, and solutions, IEEE Commun. Surveys Tutorials, 20, 3, pp. 2429-2453, (2018)
[4]  
Intelligent Transport Systems (ITS)
[5]  
Security
[6]  
Threat, Vulnerability and Risk Analysis (TVRA), (2017)
[7]  
Study on Security Aspects of Enhanced Network Slicing, (2019)
[8]  
Kousaridas A., Et al., 5G vehicleto-everything services in cross-border environments: Standardization and challenges, IEEE Commun. Standards Mag., 5, 1, pp. 22-30, (2021)
[9]  
Hetzer D., Et al., 5G connected and automated driving: Use cases, technologies and trials in cross-border environments, EURASIP J. Wirel. Commun. Netw, 2021, 1, (2021)
[10]  
Kousaridas A., Et al., 5G vehicle-to-everything services in cross-border environments: Standardization and challenges, IEEE Commun. Standards Mag, 5, 1, pp. 22-30, (2021)