000 04095nlm1a2200505 4500
001 663712
005 20231030041904.0
035 _a(RuTPU)RU\TPU\network\34882
090 _a663712
100 _a20210301a2019 k y0engy50 ba
101 0 _aeng
102 _aUS
135 _adrcn ---uucaa
181 0 _ai
182 0 _ab
200 1 _aSDN-Based Secure and Privacy-Preserving Scheme for Vehicular Networks: A 5G Perspective
_fS. Garg, K. Kaur, G. Kaddoum [et al.]
203 _aText
_celectronic
300 _aTitle screen
320 _a[References: 46 tit.]
330 _aThe ever-increasing demands of vehicular networkspose significant challenges such as availability, computation complexity, security, trust, authentication, etc. This becomes even morecomplicated for high-speed moving vehicles. As a result, increasing the capacity of these networks has been attracting considerableawareness. In this regard, the next generation of cellular networks,5G, is expected to be a promising solution enabling high data rates,capacity, and quality of service as well as low latency communications. However, 5G networks still face challenges in providingubiquitous and reliable connections among high-speed vehicles.Thus, to overcome the gaps in the existing solutions, we proposea software defined network (SDN)-based consolidated frameworkproviding end-to-end security and privacy in 5G enabled vehicularnetworks. The framework simplifies network management throughSDN, while achieving optimized network communications. It operates in two phases: first, an elliptic curve cryptographic basedauthentication protocol is proposed to mutually authenticate thecluster heads and certificate authority in SDN-based vehicular setups, and, second, an intrusion detection module supported by tensor based dimensionality reduction is designed to reduce the computational complexity and identify the potential intrusions in thenetwork. In order to assess the performance of the proposed framework, an extensive evaluation is performed on three simulators;NS3, SUMO, and SPAN. To harness the potential benefits of the proposed model, the first module, is evaluated on the basis of securityfeatures, whereas the second module is evaluated, and comparedwith the existing state-of-the-art models, on the basis of detectionrate, false positive rate, accuracy, detection time, and communication overhead. The simulation results indicate the superiority ofthe proposed framework as compared to the existing models.
333 _aРежим доступа: по договору с организацией-держателем ресурса
461 _tIEEE Transactions on Vehicular Technology
463 _tVol. 68, iss. 9
_v[P. 8421-8433]
_d2019
610 1 _aтруды учёных ТПУ
610 1 _aэлектронный ресурс
610 1 _aauthentication
610 1 _a5G mobile communication
610 1 _aintrusion detection
610 1 _areliability
610 1 _aprotocols
610 1 _aface
610 1 _aмобильная связь
610 1 _aаутентификация
610 1 _aвторжения
610 1 _aнадежность
701 1 _aGarg
_bS.
_gSahil
701 1 _aKaur
_bK.
701 1 _aKaddoum
_bG.
_gGeorges
701 1 _aAhmed
_bS. H.
701 1 _aDzhayakodi (Jayakody) Arachshiladzh
_bD. N. K.
_cspecialist in the field of electronics
_cProfessor of Tomsk Polytechnic University
_f1983-
_gDushanta Nalin Kumara
_2stltpush
_3(RuTPU)RU\TPU\pers\37962
712 0 2 _aНациональный исследовательский Томский политехнический университет
_bИнженерная школа информационных технологий и робототехники
_bНаучно-образовательный центр "Автоматизация и информационные технологии"
_h8422
_2stltpush
_3(RuTPU)RU\TPU\col\27515
801 1 _aRU
_b63413507
_c20110823
801 2 _aRU
_b63413507
_c20210301
_gRCR
856 4 0 _uhttps://doi.org/10.1109/TVT.2019.2917776
942 _cCF