EconPapers    
Economics at your fingertips  
 

Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems

Nuwan Weerasinghe, Muhammad Arslan Usman, Chaminda Hewage (), Eckhard Pfluegel and Christos Politis
Additional contact information
Nuwan Weerasinghe: Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK
Muhammad Arslan Usman: Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK
Chaminda Hewage: Cybersecurity and Information Networks Centre (CINC), Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK
Eckhard Pfluegel: Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK
Christos Politis: Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK

Future Internet, 2023, vol. 15, issue 5, 1-19

Abstract: Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, security and privacy concerns pose significant challenges that must be addressed. Therefore, researchers have focused on improving the security and integrity of vehicle data sharing, with a particular emphasis on V2X application layer security and privacy requirements. This is crucial given that V2X networks can consist of vehicles manufactured by different companies and registered in various jurisdictions, which may only be within communication range for a few seconds. Thus, it is necessary to establish a trusting relationship between vehicles quickly. The article proposes a threshold cryptography-based key exchange protocol that meets the key requirements for V2X data sharing and privacy, including the rapid establishment of trust, the maintenance of vehicle anonymity, and the provision of secure messages. To evaluate the feasibility and performance of the proposed protocol, a tailored testbed that leverages the NS-3 network simulator, a commercial 5G network, and public cloud infrastructure is used. Overall, the proposed protocol provides a potential solution for addressing security and privacy concerns in V2X networks, which is essential for successfully implementing and adopting this technology.

Keywords: V2X; VANET; threshold cryptography; 5G; 3GPP sidelink; cloud computing; computational efficiency; cyber-physical systems (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/15/5/157/pdf (application/pdf)
https://www.mdpi.com/1999-5903/15/5/157/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:15:y:2023:i:5:p:157-:d:1130886

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:15:y:2023:i:5:p:157-:d:1130886