Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems

被引:2
作者
Weerasinghe, Nuwan [1 ]
Usman, Muhammad Arslan [1 ]
Hewage, Chaminda [2 ]
Pfluegel, Eckhard [1 ]
Politis, Christos [1 ]
机构
[1] Kingston Univ London, Fac Sci Engn & Comp, London KT1 2EE, England
[2] Cardiff Metropolitan Univ, Cybersecur & Informat Networks Ctr CINC, Cardiff Sch Technol, Cardiff CF5 2YB, Wales
来源
FUTURE INTERNET | 2023年 / 15卷 / 05期
关键词
V2X; VANET; threshold cryptography; 5G; 3GPP sidelink; cloud computing; computational efficiency; cyber-physical systems; KEY MANAGEMENT; HOC; AUTHENTICATION;
D O I
10.3390/fi15050157
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, security and privacy concerns pose significant challenges that must be addressed. Therefore, researchers have focused on improving the security and integrity of vehicle data sharing, with a particular emphasis on V2X application layer security and privacy requirements. This is crucial given that V2X networks can consist of vehicles manufactured by different companies and registered in various jurisdictions, which may only be within communication range for a few seconds. Thus, it is necessary to establish a trusting relationship between vehicles quickly. The article proposes a threshold cryptography-based key exchange protocol that meets the key requirements for V2X data sharing and privacy, including the rapid establishment of trust, the maintenance of vehicle anonymity, and the provision of secure messages. To evaluate the feasibility and performance of the proposed protocol, a tailored testbed that leverages the NS-3 network simulator, a commercial 5G network, and public cloud infrastructure is used. Overall, the proposed protocol provides a potential solution for addressing security and privacy concerns in V2X networks, which is essential for successfully implementing and adopting this technology.
引用
收藏
页数:19
相关论文
共 44 条
[1]  
Al Ibrahim O, 2011, INT WIREL COMMUN, P1672, DOI 10.1109/IWCMC.2011.5982786
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]  
[Anonymous], 2013, 160922013 IEEE, DOI DOI 10.1109/IEEESTD.2013.6509896
[4]  
[Anonymous], 2016, TAP BRIDGE CLASS REF
[5]  
[Anonymous], Amazon Elastic Compute Cloud (EC2)
[6]   A Survey on Device-to-Device Communication in Cellular Networks [J].
Asadi, Arash ;
Wang, Qing ;
Mancuso, Vincenzo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1801-1819
[7]  
Bellare M., 1993, P 1 ACM C COMP COMM, P62
[8]  
Bellovin S., 2005, REQUEST COMMENTS RFC
[9]   Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures [J].
Ben Hamida, Elyes ;
Noura, Hassan ;
Znaidi, Wassim .
ELECTRONICS, 2015, 4 (03) :380-423
[10]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615