An Optimal Security Management Framework for Backhaul-aware 5G-Vehicle to Everything (V2X),ERICDATA高等教育知識庫
高等教育出版
熱門: 黃光男  朱丽彬  王善边  王美玲  崔雪娟  黃乃熒  
高等教育出版
首頁 臺灣期刊   學校系所   學協會   民間出版   大陸/海外期刊   政府機關   學校系所   學協會   民間出版   DOI註冊服務
閱讀全文
篇名
An Optimal Security Management Framework for Backhaul-aware 5G-Vehicle to Everything (V2X)
並列篇名
An Optimal Security Management Framework for Backhaul-aware 5G-Vehicle to Everything (V2X)
作者 Vishal SharmaJiyoon KimYongho KoIlsun YouJung Taek Seo
英文摘要
Cellular (C) setups facilitate the connectivity amongst the devices with better provisioning of services to its users. Vehicular networks are one of the representative setups that aim at expanding their functionalities by using the available cellular systems like Long Term Evolution (LTE)-based Evolved Universal Terrestrial Radio Access Network (E-UTRAN) as well as the upcoming Fifth Generation (5G)-based functional architecture. The vehicular networks include Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Pedestrian (V2P) and Vehicle to Network (V2N), all of which are referred to as Vehicle to Everything (V2X). 5G has dominated the vehicular network and most of the upcoming research is motivated towards the fully functional utilization of 5G-V2X. Despite that, credential management and edge-initiated security are yet to be resolved under 5G-V2X. To further understand the issue, this paper presents security management as a principle of sustainability and key-management. The performance tradeoff is evaluated with the key-updates required to maintain a secure connection between the vehicles and the 5G-terminals. The proposed approach aims at the utilization of high-speed mmWave-based backhaul for enhancing the security operations between the core and the sub-divided functions at the edge of the network through a dual security management framework. The evaluations are conducted using numerical simulations, which help to understand the impact on the sustainability of connections as well as identification of the fail-safe points for secure and fast operations. Furthermore, the evaluations help to follow the multiple tradeoffs of security and performance based on the metrics like mandatory key updates, the range of operations and the probability of connectivity.
起訖頁 249-264
關鍵詞 Security5G-V2XBackhaulSustainabilityKey-managementDual-management
刊名 網際網路技術學刊  
期數 202001 (21:1期)
出版單位 台灣學術網路管理委員會
DOI 10.3966/160792642020012101021   複製DOI
QR Code
該期刊
上一篇
Intelligent Ocean Convergence Platform Based on IoT Empowered with Edge Computing
該期刊
下一篇
A Lightweight Authentication and Key Agreement Scheme for Telecare Medicine Information System

高等教育知識庫  閱讀計畫  教育研究月刊  新書優惠  

教師服務
合作出版
期刊徵稿
聯絡高教
高教FB
讀者服務
圖書目錄
教育期刊
訂購服務
活動訊息
數位服務
高等教育知識庫
國際資料庫收錄
投審稿系統
DOI註冊
線上購買
高點網路書店 
元照網路書店
博客來網路書店
教育資源
教育網站
國際教育網站
關於高教
高教簡介
出版授權
合作單位
知識達 知識達 知識達 知識達 知識達 知識達
版權所有‧轉載必究 Copyright2011 高等教育文化事業股份有限公司  All Rights Reserved
服務信箱:edubook@edubook.com.tw 台北市館前路 26 號 6 樓 Tel:+886-2-23885899 Fax:+886-2-23892500