000 | 04095nlm1a2200505 4500 | ||
---|---|---|---|
001 | 663712 | ||
005 | 20231030041904.0 | ||
035 | _a(RuTPU)RU\TPU\network\34882 | ||
090 | _a663712 | ||
100 | _a20210301a2019 k y0engy50 ba | ||
101 | 0 | _aeng | |
102 | _aUS | ||
135 | _adrcn ---uucaa | ||
181 | 0 | _ai | |
182 | 0 | _ab | |
200 | 1 |
_aSDN-Based Secure and Privacy-Preserving Scheme for Vehicular Networks: A 5G Perspective _fS. Garg, K. Kaur, G. Kaddoum [et al.] |
|
203 |
_aText _celectronic |
||
300 | _aTitle screen | ||
320 | _a[References: 46 tit.] | ||
330 | _aThe ever-increasing demands of vehicular networkspose significant challenges such as availability, computation complexity, security, trust, authentication, etc. This becomes even morecomplicated for high-speed moving vehicles. As a result, increasing the capacity of these networks has been attracting considerableawareness. In this regard, the next generation of cellular networks,5G, is expected to be a promising solution enabling high data rates,capacity, and quality of service as well as low latency communications. However, 5G networks still face challenges in providingubiquitous and reliable connections among high-speed vehicles.Thus, to overcome the gaps in the existing solutions, we proposea software defined network (SDN)-based consolidated frameworkproviding end-to-end security and privacy in 5G enabled vehicularnetworks. The framework simplifies network management throughSDN, while achieving optimized network communications. It operates in two phases: first, an elliptic curve cryptographic basedauthentication protocol is proposed to mutually authenticate thecluster heads and certificate authority in SDN-based vehicular setups, and, second, an intrusion detection module supported by tensor based dimensionality reduction is designed to reduce the computational complexity and identify the potential intrusions in thenetwork. In order to assess the performance of the proposed framework, an extensive evaluation is performed on three simulators;NS3, SUMO, and SPAN. To harness the potential benefits of the proposed model, the first module, is evaluated on the basis of securityfeatures, whereas the second module is evaluated, and comparedwith the existing state-of-the-art models, on the basis of detectionrate, false positive rate, accuracy, detection time, and communication overhead. The simulation results indicate the superiority ofthe proposed framework as compared to the existing models. | ||
333 | _aРежим доступа: по договору с организацией-держателем ресурса | ||
461 | _tIEEE Transactions on Vehicular Technology | ||
463 |
_tVol. 68, iss. 9 _v[P. 8421-8433] _d2019 |
||
610 | 1 | _aтруды учёных ТПУ | |
610 | 1 | _aэлектронный ресурс | |
610 | 1 | _aauthentication | |
610 | 1 | _a5G mobile communication | |
610 | 1 | _aintrusion detection | |
610 | 1 | _areliability | |
610 | 1 | _aprotocols | |
610 | 1 | _aface | |
610 | 1 | _aмобильная связь | |
610 | 1 | _aаутентификация | |
610 | 1 | _aвторжения | |
610 | 1 | _aнадежность | |
701 | 1 |
_aGarg _bS. _gSahil |
|
701 | 1 |
_aKaur _bK. |
|
701 | 1 |
_aKaddoum _bG. _gGeorges |
|
701 | 1 |
_aAhmed _bS. H. |
|
701 | 1 |
_aDzhayakodi (Jayakody) Arachshiladzh _bD. N. K. _cspecialist in the field of electronics _cProfessor of Tomsk Polytechnic University _f1983- _gDushanta Nalin Kumara _2stltpush _3(RuTPU)RU\TPU\pers\37962 |
|
712 | 0 | 2 |
_aНациональный исследовательский Томский политехнический университет _bИнженерная школа информационных технологий и робототехники _bНаучно-образовательный центр "Автоматизация и информационные технологии" _h8422 _2stltpush _3(RuTPU)RU\TPU\col\27515 |
801 | 1 |
_aRU _b63413507 _c20110823 |
|
801 | 2 |
_aRU _b63413507 _c20210301 _gRCR |
|
856 | 4 | 0 | _uhttps://doi.org/10.1109/TVT.2019.2917776 |
942 | _cCF |