ICC 2022 - IEEE International Conference on Communications 2022
DOI: 10.1109/icc45855.2022.9838953
|View full text |Cite
|
Sign up to set email alerts
|

A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks

Abstract: In recent years, the world of vehicular communication is in full progress. With the emerge of the fifth-generation (5G) technology, the high bandwidth and low latency features in the 5G vehicle to everything (5G-V2X) network become possible. However, the current 5G mechanism specified by the Third Generation Partnership Project (3GPP) Release 16 incurs high signaling overhead over the radio access network and the core network when a vehicle platoon moves from a source base station to the target base station. M… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 14 publications
0
0
0
Order By: Relevance
“…Proof-of-Concepts Various concepts of CLC-based solutions have been proposed, such as for authentication [41][42][43][44][45][46][47][48][49][50][51][52][53][54][55][56][57][58], aggregated signing [44,[59][60][61][62][63][64], key agreement [65,66], and signcryption [67][68][69][70][71][72][73]. However, common for these proposals is that they have either been tested in a controller lab environment [42,47,48,59,64,74]…”
Section: Gaps Description Going Forwardmentioning
confidence: 99%
See 1 more Smart Citation
“…Proof-of-Concepts Various concepts of CLC-based solutions have been proposed, such as for authentication [41][42][43][44][45][46][47][48][49][50][51][52][53][54][55][56][57][58], aggregated signing [44,[59][60][61][62][63][64], key agreement [65,66], and signcryption [67][68][69][70][71][72][73]. However, common for these proposals is that they have either been tested in a controller lab environment [42,47,48,59,64,74]…”
Section: Gaps Description Going Forwardmentioning
confidence: 99%
“…Moreover, a detailed review of the implementation descriptions in the literature analysis shows an unsatisfactory level of reproducibility and comparability since many implementation details are left out, and very few articles share source code. Several articles leave out testing and performance evaluation in realistic environments as future work (e.g., [31,47,52,55,64]). Also, several articles referred to a small set of previous articles that carried out implementations of the crypto operations used in some of the CLC protocols, and used these to theoretically compute performance metrics (e.g., [43][44][45]60,67]).…”
Section: Gap 1: Proof Of Conceptsmentioning
confidence: 99%
“…The handover can happen even more frequently in the 5G network, as the 5G has employed smaller cells than the Long Term Evolution (LTE). [8] To mitigate the shortcomings, we propose our Efficient Group Handover Authentication protocol, which is named as EGHA. It contains the following outstanding features: 1) The protocol can achieve major security properties through cryptography methods while preserving the architecture of the 3GPP standard R16.…”
Section: Introductionmentioning
confidence: 99%