2022
DOI: 10.1016/j.procs.2021.12.240
|View full text |Cite
|
Sign up to set email alerts
|

Secure Authentication Scheme for 5G-based V2X Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 6 publications
0
8
0
1
Order By: Relevance
“…Like any system and especially regular vehicular networks, V2X is exposed to several types of attacks and threats. In order to protect this network against these attacks, it is necessary to classify them (Table 1) [20,21].…”
Section: Classification Of V2x Attacksmentioning
confidence: 99%
“…Like any system and especially regular vehicular networks, V2X is exposed to several types of attacks and threats. In order to protect this network against these attacks, it is necessary to classify them (Table 1) [20,21].…”
Section: Classification Of V2x Attacksmentioning
confidence: 99%
“…Vehicle to Everything/Infrastructure (V2X/V2I) allows for wireless communication with the vehicles [21]. V2X/V2I offers various advantages over the usual line of sight sensors placed on ego-vehicles [22].…”
Section: Wireless Vehicle Communicationmentioning
confidence: 99%
“…6 provides a high-level perspective of the V2X communication system. The possible multiple communication modes are [30]:…”
Section: Proposed Workmentioning
confidence: 99%
“…7 illustrates the procedure of authentication and communication between vehicle and Road Side Unit (RSU). The following is a detailed description of each step [30]:…”
Section: Fig 6: V2x Communication Systemmentioning
confidence: 99%
See 1 more Smart Citation