2021
DOI: 10.3390/s21020665
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X

Abstract: 5G-Vehicle-to-Everything (5G-V2X) supports high-reliability and low latency autonomous services and applications. Proposing an efficient security solution that supports multi-zone broadcast authentication and satisfies the 5G requirement is a critical challenge. In The 3rd Generation Partnership Project (3GPP) Release 16 standard, for Cellular- Vehicle-to-Everything (C-V2X) single-cell communication is suggested to reuse the IEEE1609.2 security standard that utilizes the Public Key Infrastructure (PKI) cryptog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 38 publications
0
8
0
Order By: Relevance
“…The complex CAV security problems may be classified in three areas: at the vehicle level, the supplier chain, and data collection. First, attacks at the vehicle level may occur via the capture of car sensors, physical controls, and V2X communications [158][159][160]. Second, the autonomous nature without human participation will lead to physical hijacking.…”
Section: Connected Autonomous Vehiclesmentioning
confidence: 99%
“…The complex CAV security problems may be classified in three areas: at the vehicle level, the supplier chain, and data collection. First, attacks at the vehicle level may occur via the capture of car sensors, physical controls, and V2X communications [158][159][160]. Second, the autonomous nature without human participation will lead to physical hijacking.…”
Section: Connected Autonomous Vehiclesmentioning
confidence: 99%
“…Goriparthi et al ’s scheme open the way for adversaries to perform attacks like cryptanalytic and cloning attacks. Hakeem et alimplemented and analyzed the proposed key generation and authentication methods using an authentication simulator and a bilinear pairing library Hakeem and Kim ( 2021 ).…”
Section: Related Workmentioning
confidence: 99%
“…Recent research introduces many security protocols to improve vehicular group communication security by improving network authentication, availability, integrity, and nonrepudiation. The group key management protocols must provide secure key generation, key distribution, and key updating with a minimum communication overhead [ 1 , 2 , 3 ]. Many group key generation protocols are proposed in the literature; some are based on the symmetric key generation, and some use the asymmetric key generation [ 4 , 5 , 6 ].…”
Section: Introductionmentioning
confidence: 99%