Abstract

Security concerns in 5 G-V2X communication, including message authenticity, entity identification, and efficient malicious entity detection, necessitate innovative solutions. This paper introduces a novel protocol aimed at addressing security challenges in 5 G-V2X communication, focusing on authentication and misbehaving entity revocation. The protocol employs short bilinear pairing digital signatures for message authentication and pseudo-identity for entity verification. Key generation utilizes a Secret Splitting-based approach, distributing partial keys to vehicles within the same group, ensuring secure future communication. In terms of performance, our protocol excels in communication efficiency, costing only 280 bytes per message, the lowest among evaluated protocols. It also demonstrates competitive computation efficiency, with a signing time of 0.614 ms per message and a verification time of 5.035 ms per signature. Our innovative revocation method ensures timely detection and reporting of misbehaving entities, with an average detection time of 2.3 s and an average revocation time of 1.8 s. Our protocol enhances security in 5 G-V2X communication while maintaining superior communication and computation efficiency.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.