DeepAI AI Chat
Log In Sign Up

Security of 5G-V2X: Technologies, Standardization and Research Directions

by   Vishal Sharma, et al.

Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. Especially, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For this, the evolvement of LTE-V2X is revolutionary, but it fails to handle the demands of high throughput, ultra-high reliability, and ultra-low latency alongside its security mechanisms. To counter this, 5G-V2X is considered as an integral solution, which not only resolves the issues related to LTE-V2X but also provides a function-based network setup. Several reports have been given for the security of 5G, but none of them primarily focuses on the security of 5G-V2X. This article provides a detailed overview of 5G-V2X with a security-based comparison with the LTE-V2X. A novel Security Reflex Function (SRF)-based architecture is also proposed and several research challenges are presented to be resolved in upcoming solutions related to the security of 5G-V2X. Alongside this, the article laid forward the requirements of Ultra-Dense and Ultra-Secure (UD-US) transmissions in 5G-V2X.


page 4

page 6


Physical Layer Security for Ultra-Reliable and Low-Latency Communications

Ultra-reliable and low-latency communication (URLLC) is one category of ...

Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers

The 5th generation (5G) network adopts a great number of revolutionary t...

C-V2X Security Requirements and Procedures: Survey and Research Directions

The 3rd Generation Partnership Project (3GPP) defines the first specific...

A Vision of C-V2X: Technologies, Field Testing and Challenges with Chinese Development

C-V2X (Cellular Vehicle-to-Everything) is the important enabling technol...

Swarm of UAVs for Network Management in 6G: A Technical Review

Fifth-generation (5G) cellular networks have led to the implementation o...

A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks

The 5G networks have the capability to provide high compatibility for th...

5G Security and Privacy: A Research Roadmap

Cellular networks represent a critical infrastructure and their security...