IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v15y2023i5p157-d1130886.html
   My bibliography  Save this article

Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems

Author

Listed:
  • Nuwan Weerasinghe

    (Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK)

  • Muhammad Arslan Usman

    (Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK)

  • Chaminda Hewage

    (Cybersecurity and Information Networks Centre (CINC), Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK)

  • Eckhard Pfluegel

    (Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK)

  • Christos Politis

    (Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK)

Abstract

Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, security and privacy concerns pose significant challenges that must be addressed. Therefore, researchers have focused on improving the security and integrity of vehicle data sharing, with a particular emphasis on V2X application layer security and privacy requirements. This is crucial given that V2X networks can consist of vehicles manufactured by different companies and registered in various jurisdictions, which may only be within communication range for a few seconds. Thus, it is necessary to establish a trusting relationship between vehicles quickly. The article proposes a threshold cryptography-based key exchange protocol that meets the key requirements for V2X data sharing and privacy, including the rapid establishment of trust, the maintenance of vehicle anonymity, and the provision of secure messages. To evaluate the feasibility and performance of the proposed protocol, a tailored testbed that leverages the NS-3 network simulator, a commercial 5G network, and public cloud infrastructure is used. Overall, the proposed protocol provides a potential solution for addressing security and privacy concerns in V2X networks, which is essential for successfully implementing and adopting this technology.

Suggested Citation

  • Nuwan Weerasinghe & Muhammad Arslan Usman & Chaminda Hewage & Eckhard Pfluegel & Christos Politis, 2023. "Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems," Future Internet, MDPI, vol. 15(5), pages 1-19, April.
  • Handle: RePEc:gam:jftint:v:15:y:2023:i:5:p:157-:d:1130886
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/15/5/157/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/15/5/157/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:15:y:2023:i:5:p:157-:d:1130886. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.