Ultra-secure transmissions for 5G-V2X communications

Abstract Contact with Vehicle-to-everything (V2X) is a field that concerns many academic institutions as well as the industry. Standards for these communications have been developed by the European Telecommunications Standards Institute (ETSI). Such standards define a protocol stack that builds on top of the 802.11p Wi-Fi protocol, which does not provide protection. Many businesses and research institutes are now interested in using this emerging technology in V2X communications due to the successful implementation of 5G. The possibility of exchanging 802.11p with 5 G allows, among many other changes, to improve the efficiency of the protection mechanisms specified by the ETSI. The new features could also carry new vulnerabilities at the same time. The aim of this work is to examine how security is affected by the implementation of 5 G in V2X communications. We show that the transition from 802.11p to 5 G is feasible, but not easy, and the remainder of the protocol stack needs certain changes. In addition, some potential changes are suggested to the protection mechanisms offered higher up in the stack. Improvements include the elimination of the existing authentication certificate mechanism, since some 5G features would render it redundant. Finally, the pros and cons of implementing 5G are discussed in V2X communications.

[1]  Geoffrey Ye Li,et al.  Non-Orthogonal Multiple Access for High-Reliable and Low-Latency V2X Communications in 5G Systems , 2017, IEEE Journal on Selected Areas in Communications.

[2]  Shahid Mumtaz,et al.  Millimeter-Wave Massive MIMO Communication for Future Wireless Systems: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[3]  Li Zhao,et al.  Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G , 2017, IEEE Communications Standards Magazine.

[4]  Mate Boban,et al.  Design aspects for 5G V2X physical layer , 2016, 2016 IEEE Conference on Standards for Communications and Networking (CSCN).

[5]  Gaoxiang Zhang,et al.  Toward Secure Crowd Sensing in Vehicle-to-Everything Networks , 2018, IEEE Network.

[6]  Xianbin Wang,et al.  SDN Enabled 5G-VANET: Adaptive Vehicle Clustering and Beamformed Transmission for Aggregated Traffic , 2017, IEEE Communications Magazine.

[7]  Tanesh Kumar,et al.  5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[8]  Qi Shi,et al.  Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.

[9]  Hanwen Cao,et al.  A Testbed for Experimenting 5G-V2X Requiring Ultra Reliability and Low-Latency , 2017, WSA.

[10]  Ghada Arfaoui,et al.  Security and Resilience in 5G: Current Challenges and Future Directions , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[11]  Ben-Jye Chang,et al.  Efficient Emergency Forwarding to Prevent Message Broadcasting Storm in Mobile Society via Vehicle-to-X Communications for 5G LTE-V , 2016, 2016 International Computer Symposium (ICS).

[12]  Mihai Dimian,et al.  Toward Environmental-Adaptive Visible Light Communications Receivers for Automotive Applications: A Review , 2016, IEEE Sensors Journal.

[13]  F. J. Alvarez,et al.  Characterization of the Near-Far problem in a CDMA-based acoustic localization system , 2015, 2015 IEEE International Conference on Industrial Technology (ICIT).

[14]  Quanyan Zhu,et al.  PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[15]  Christian Waldschmidt,et al.  Wireless channel-based message authentication , 2015, 2015 IEEE Vehicular Networking Conference (VNC).

[16]  Jari Arkko,et al.  Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.

[17]  Rose Qingyang Hu,et al.  Security for 5G Mobile Wireless Networks , 2018, IEEE Access.

[18]  Geoffrey Ye Li,et al.  NOMA-Based Low-Latency and High-Reliable Broadcast Communications for 5G V2X Services , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[19]  Ramjee Prasad,et al.  Securing communication in inter domains Internet of Things using identity-based cryptography , 2017, 2017 International Workshop on Big Data and Information Security (IWBIS).

[20]  Ahmed Serhrouchni,et al.  Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS) , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).