4.7 Review

Survey on existing authentication issues for cellular-assisted V2X communication

期刊

VEHICULAR COMMUNICATIONS
卷 12, 期 -, 页码 50-65

出版社

ELSEVIER
DOI: 10.1016/j.vehcom.2018.01.008

关键词

V2X; LTE; Security; 5G; Authentication

向作者/读者索取更多资源

The integration of Internet of Things (IoT) into cellular network infrastructure is gaining much attention from the research community and standardisation groups, where new cellular-based enabling communication technologies are proposed to provide data links over existing cellular networks for IoT deployment. The Long Term Evolution (LTE) network and the emerging 5G system (New Radio) are widely acknowledged as the main driving forces for the connected-vehicle in the mobile network domain. On the other hand, vehicular networks are characterised by high mobility, high node density, dynamic network topology, time sensitivity and high transmission reliability. These unique characteristics of vehicular networks introduce new security implications and therefore, necessitate enhancement of existing LTE security or provision of new security techniques, in order to ensure fast, secure and reliable vehicular communications under mobile network. In this paper, an introduction to Vehicle to Everything (V2X) communications and services alongside the corresponding service requirement is presented. Then, the potential benefits of using cellular infrastructure for V2X services and the reference architectures for cellular-based V2X systems are described. We then focus on the security requirements of V2X in cellular network, specifically; on the authentication of V2X entities, as any violation or breach of authentication process can expose the entire network to serious consequences. The paper discusses common V2X threats and surveys existing V2X authentication solutions proposed in the literature. Finally, paper presents security issues related to V2X communication in cellular network leading towards possible research challenges. (C) 2018 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据