2020 IEEE Conference on Communications and Network Security (CNS) 2020
DOI: 10.1109/cns48642.2020.9162271
|View full text |Cite
|
Sign up to set email alerts
|

Platoon Handover Authentication in 5G-V2X : IEEE CNS 20 Poster

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…We refer to the method developed by Li and Lai [12], with which a timestamp is added to a transmitted message to prevent replay attacks.…”
Section: Adding a Timestamp To A Messagementioning
confidence: 99%
See 1 more Smart Citation
“…We refer to the method developed by Li and Lai [12], with which a timestamp is added to a transmitted message to prevent replay attacks.…”
Section: Adding a Timestamp To A Messagementioning
confidence: 99%
“…But R will discard Q since KINT(M∥TS') ≠ KINT(M∥TS) where KINT(M∥TS') is the integrity message generated by R. It is considered as tampered data (see Step (12) in Section 3.2.1; also see Step (12) of Section 3.2.3).…”
Section: Replay Attackmentioning
confidence: 99%
“…The main question is whether the data transmission technology—5G—meets the needs of the autonomous car use-cases. In addition to the higher available bandwidth that is offered by 5G, another huge advantage is the seamless handover between cells without packet loss [ 21 ]. The bandwidth provided by 5G, both for the up- and downlink, offers significantly more options regarding use-cases.…”
Section: Related Workmentioning
confidence: 99%
“…[36] use an aggregate signature mechanism based on identity-based cryptography, which has a key escrow problem. The scheme in [37] should protect platoon members' privacy when the SDN controller monitors the platoon's position because it may be deployed in untrusted third-party applications. The solution in [38] has proposed a universal protocol for N2 and Xn handovers.…”
Section: Discussionmentioning
confidence: 99%
“…G. Li and C. Lai [37] proposed an efficient platoon authentication handover protocol. Messages have been aggregated by using Aggregated Message Authentication Codes (AMACs) in the 5G-V2X network to reduce handover signalling overhead and delay during authentication.…”
Section: Group Handovermentioning
confidence: 99%