Abstract

Recently, the proposed Cybertwin-driven 6G network architecture has attracted attentions from academia, which can support the communication anchor, security agent and other functions for physical devices. Especially, Cybertwin can provide promising Vehicle-to-Everything (V2X) applications in future. However, security and privacy of Cybertwin still face various threats and challenges, which may impact future deployments for Cybertwin-driven 6G V2X. In this paper, we first introduce the architecture and promising applications of Cybertwin-driven 6G V2X. Then, we analyze essential data security and privacy preservation requirements for Cybertwin-driven 6G V2X. Particularly, we present the security reference architecture of Cybertwin-driven 6G V2X. As a case study, we investigate the migration of Cybertwin caused by vehicle mobility, and propose a handover authentication scheme to create new Cybertwin between vehicle and edge server based on proxy ring signature technique. Finally, we discuss several open research directions for achieving more secure Cybertwin-driven 6G V2X.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call