Abstract

Many researchers have invested their time, effort, and energy on the research area of “Vehicular-to-everything” which is also known as V2X in term of security and vulnerabilities. For communications like V2X, the European Telecommunications Standards Institute (ETSI) has been engaged in order to formulate quality standards for these types of the methodological communication system. The Wi-Fi protocol 802.11p has no capability to offer any sort of security and privacy of data. However, upon the development that took place in the field of 5G technology, now many companies, as well as researchers, have locked the attention to use this technology so that the V2X communication can serve the people with better security and protect them from the harmful acts. If the 802.11p can be exchanged with the 5G, it will surely bring advancements to the ETSI security mechanisms. Nevertheless, it is possible to have counterattack from the new features that will have been installed. It will be made sure that the attacks can be encountered with efficiency rest assured. This thesis stands for taking a point on the aspects of Statistical in-depth security analysis for Vehicle to everything communication over 5g network and how 5G can put effect on the security of the communication. In this thesis, it has been investigated that it is not impossible to make a transit from the 802.11p to 5G NR in term of security aspects. However, it needs some alteration in the protocol stack. That is why different types of improvements have been proposed in this thesis so that the security mechanisms will get stronger and better. The advancements due to the improvement will eradicate the present certificate mechanism which is needed for the authentication. This will be done only because the prospects and aspects of 5G will provide the communication with so many features that authentication will not be needed in that regard. In the end, the positivity and negativity of the introduction of 5G in V2X communication will be discussed along with further recommendations.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call