TY - JOUR
T1 - 5G Vehicle-to-Everything Services
T2 - Gearing up for Security and Privacy
AU - Lu, Rongxing
AU - Zhang, Lan
AU - Ni, Jianbing
AU - Fang, Yuguang
PY - 2020/2
Y1 - 2020/2
N2 - 5G is emerging to serve as a platform to support networking connections for sensors and vehicles on roads and provide vehicle-to-everything (V2X) services to drivers and pedestrians. 5G V2X communication brings tremendous benefits to us, including improved safety, high reliability, large communication coverage, and low service latency. On the other hand, due to ubiquitous network connectivity, it also presents serious trust, security, and privacy issues toward vehicles, which may impede the success of 5G V2X. In this article, we present a comprehensive survey on the security of 5G V2X services. Specifically, we first review the architecture and the use cases of 5G V2X. We also study a series of trust, security, and privacy issues in 5G V2X services and discuss the potential attacks on trust, security, and privacy in 5G V2X. Then, we offer an in-depth analysis of the state-of-the-art strategies for securing 5G V2X services and elaborate on how to achieve the trust, security, or privacy protection in each strategy. Finally, by pointing out several future research directions, it is expected to draw more attention and efforts into the emerging 5G V2X services.
AB - 5G is emerging to serve as a platform to support networking connections for sensors and vehicles on roads and provide vehicle-to-everything (V2X) services to drivers and pedestrians. 5G V2X communication brings tremendous benefits to us, including improved safety, high reliability, large communication coverage, and low service latency. On the other hand, due to ubiquitous network connectivity, it also presents serious trust, security, and privacy issues toward vehicles, which may impede the success of 5G V2X. In this article, we present a comprehensive survey on the security of 5G V2X services. Specifically, we first review the architecture and the use cases of 5G V2X. We also study a series of trust, security, and privacy issues in 5G V2X services and discuss the potential attacks on trust, security, and privacy in 5G V2X. Then, we offer an in-depth analysis of the state-of-the-art strategies for securing 5G V2X services and elaborate on how to achieve the trust, security, or privacy protection in each strategy. Finally, by pointing out several future research directions, it is expected to draw more attention and efforts into the emerging 5G V2X services.
KW - 5G vehicle-to-everything (V2X) services
KW - challenges
KW - privacy
KW - security
KW - solutions
KW - trust
UR - http://www.scopus.com/inward/record.url?scp=85079692229&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-85079692229&origin=recordpage
U2 - 10.1109/JPROC.2019.2948302
DO - 10.1109/JPROC.2019.2948302
M3 - RGC 21 - Publication in refereed journal
SN - 0018-9219
VL - 108
SP - 373
EP - 389
JO - Proceedings of the IEEE
JF - Proceedings of the IEEE
IS - 2
M1 - 8897696
ER -