2020
DOI: 10.25046/aj0506132
|View full text |Cite
|
Sign up to set email alerts
|

5G, Vehicle to Everything Communication: Opportunities, Constraints and Future Directions

Abstract: The 5G, as a new source of telecommunication infrastructure technology, has attracted many stakeholders to promote the progress of its standards and the development of its technology industry. The 5G reinforces new technologies and delivers vehicles for everything services (V2X) to drivers and passengers. It also offers several advantages. On the other hand, due to pervasive network connectivity, there are significant trust, security, and privacy issues for vehicles this affects the overall performance of 5G V… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…In the case of the third one, we can fnd Sybil here; the attacking node spoofs many identities in the road network. Finally, in the last one, we can cite a location tracking attack; this consists of that the location of the vehicle through a certain period is considered as if it were a kind of personal data [26][27][28][29].…”
Section: Privacy Protectionmentioning
confidence: 99%
“…In the case of the third one, we can fnd Sybil here; the attacking node spoofs many identities in the road network. Finally, in the last one, we can cite a location tracking attack; this consists of that the location of the vehicle through a certain period is considered as if it were a kind of personal data [26][27][28][29].…”
Section: Privacy Protectionmentioning
confidence: 99%
“…In this section, we have presented many applications and solutions implemented to ensure the security of 5G V2X communication to preserve and maintain the security of users. And we have been able to gather these solutions and summarize them into three categories [19]…”
Section: ) General Issuesmentioning
confidence: 99%
“…Our study found that the attack window decreases, and the protection against threats can be increased. Hence, the security of 5G-V2X represents a critical role [19]. For this fact, security solutions and possible remedies for identified and unidentified threats should be able to handle 5G-V2X implementation approaches and meet the security requirements.…”
Section: Proposed Approachmentioning
confidence: 99%
“…5G, which is a new global standard of communication, is especially designed for the purpose of forward compatibility and to flexibly support services like mission-critical communication, mobile broadband, IOT, cloud-based services, and D2D communication [1]. With the increasing demand for QoS and the data transfer speed for mobile networks, there is still a requirement for new communication technologies [2,3]. Due to the compatibility features, Cloud Assisted MANET, which is the combination of Cloud and Mobile Ad-Hoc Network, has received a lot of interest from researchers today.…”
Section: Introductionmentioning
confidence: 99%