10,310 research outputs found
Edge-Assisted Vehicular Networks Security.
PolĂtica de acceso abierto tomada de: https://v2.sherpa.ac.uk/id/publication/29486?template=romeoEdge Computing paradigms are expected to solve
some major problems affecting current application scenarios that
rely on Cloud computing resources to operate. These novel
paradigms will bring computational resources closer to the users
and by doing so they will not only reduce network latency and
bandwidth utilization but will also introduce some attractive
context-awareness features to these systems. In this paper we
show how the enticing features introduced by Edge Computing
paradigms can be exploited to improve security and privacy in
the critical scenario of vehicular networks (VN), especially
existing authentication and revocation issues. In particular, we
analyze the security challenges in VN and describe three
deployment models for vehicular edge computing, which refrain
from using vehicular-to-vehicular communications. The result is
that the burden imposed to vehicles is considerably reduced
without sacrificing the security or functional features expected in
vehicular scenarios
Security of 5G-V2X: Technologies, Standardization and Research Directions
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to
the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to
Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities
involved in vehicular communications and allows the inclusion of
cellular-security solutions to be applied to V2X. For this, the evolvement of
LTE-V2X is revolutionary, but it fails to handle the demands of high
throughput, ultra-high reliability, and ultra-low latency alongside its
security mechanisms. To counter this, 5G-V2X is considered as an integral
solution, which not only resolves the issues related to LTE-V2X but also
provides a function-based network setup. Several reports have been given for
the security of 5G, but none of them primarily focuses on the security of
5G-V2X. This article provides a detailed overview of 5G-V2X with a
security-based comparison to LTE-V2X. A novel Security Reflex Function
(SRF)-based architecture is proposed and several research challenges are
presented related to the security of 5G-V2X. Furthermore, the article lays out
requirements of Ultra-Dense and Ultra-Secure (UD-US) transmissions necessary
for 5G-V2X.Comment: 9 pages, 6 figures, Preprin
Pay as You Go: A Generic Crypto Tolling Architecture
The imminent pervasive adoption of vehicular communication, based on
dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will
foster a richer service ecosystem for vehicular applications. The appearance of
new cryptography based solutions envisaging digital identity and currency
exchange are set to stem new approaches for existing and future challenges.
This paper presents a novel tolling architecture that harnesses the
availability of 5G C-V2X connectivity for open road tolling using smartphones,
IOTA as the digital currency and Hyperledger Indy for identity validation. An
experimental feasibility analysis is used to validate the proposed architecture
for secure, private and convenient electronic toll payment
- …