You are on page 1of 9

1

Security of 5G-V2X: Technologies, Standardization


and Research Directions
Vishal Sharma, Ilsun You, Nadra Guizani

Abstract—Cellular-Vehicle to Everything (C-V2X) aims at re- yet to be evaluated based on the existing infrastructure [4] [5].
solving issues pertaining to the traditional usability of Vehicle There has been a huge rush towards the establishment of LTE-
to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. V2X models while studying the capability of LTE in terms
Specifically, C-V2X lowers the number of entities involved in
vehicular communications and allows the inclusion of cellular- of performance and security. The primary motive for utilizing
security solutions to be applied to V2X. For this, the evolvement of existing strategies is for their communication range. To provide
arXiv:1905.09555v3 [cs.NI] 18 Dec 2019

LTE-V2X is revolutionary, but it fails to handle the demands of high security for these models, additional functional layers are added.
throughput, ultra-high reliability, and ultra-low latency alongside This not only increases the cost of ownership but also decreases
its security mechanisms. To counter this, 5G-V2X is considered the compliance of autonomous vehicles [6] [7].
as an integral solution, which not only resolves the issues related
to LTE-V2X but also provides a function-based network setup. In short, C-V2X aims at bridging the gap between the vehicu-
Several reports have been given for the security of 5G, but none of lar and cellular communication industry by supporting a large
them primarily focuses on the security of 5G-V2X. This article range of Information and Communications Technology (ICT)
provides a detailed overview of 5G-V2X with a security-based applications. All the major technologies targeting C-V2X can
comparison to LTE-V2X. A novel Security Reflex Function (SRF)- be observed for the following categories:
based architecture is proposed and several research challenges are
presented related to the security of 5G-V2X. Furthermore, the
article lays out requirements of Ultra-Dense and Ultra-Secure (UD- A. Multi-Vendor Services Support (MVSS)
US) transmissions necessary for 5G-V2X.
V2X depends on the convergence of a large number of
Index Terms—5G, Security, V2X, Mobility, Threats. cellular-applications, which are being provided by multiple
vendors. In general, C-V2X is considered to be an opera-
I. C-V2X: OVERVIEW tional property of a single organization (Original Equipment
The current era of vehicular travel is witnessing a dynamic Manufacturer (OEM)), which uses cellular facilities to control
shift from individually driven vehicles to network controlled the transmissions in the network. However, with a variety of
vehicles. This new infrastructure is studied under the name of cellular-applications, it is liable that a single vehicle will be
Vehicle-to-Everything (V2X), which aims at controlling vehicu- supported by multiple vendors. Thus, Multi-Vendor Services
lar communications for specific operations where a vehicle is Support (MVSS) becomes one of the crucial principles to be
able to communicate with any of the other entities available followed in C-V2X. Layouts through slices, edge-formations,
on the network. Growing from Vehicle-to-Infrastructure (V2I) fog-infrastructure, Software Defined Networking (SDN), and
and Vehicle-to-Vehicle (V2V), V2X broadens the domain of its Network Function Virtualization (NFV) can be the principal
applicability while leveraging on a different range of technolo- technologies for MVSS [8].
gies, such as Dedicated Short-Range Communications (DSRC),
Wireless Access in Vehicular Environment (WAVE), Cellular- B. Autonomous Algorithm Safety (AAS)
V2X (C-V2X) that includes Long-Term Evolution V2X (LTE-
Algorithms are the key behind the successful operations of
V2X), 5G Infrastructure Public-Private Partnership (5GPPP-
autonomous vehicles in C-V2X. Majority of these algorithms
V2X), automated-Ethernet (onboard communications), and Wire-
rely on the formation of a secure channel between the vehicles
less Local Area Network V2X (WLAN-V2X) [1] [2] [3]. C-
(V) and all other applications in the network (X). Vulnerability
V2X is also seen as a base for implementing technologies like
in the algorithms can lead to several types of cyber attacks on C-
Low Power Wide Area Network (LPWAN), IPv6-Low-Power
V2X. The threat level increases as vehicles in the network oper-
Wireless Personal Area Network (6LoWPAN) and Long Range
ate from full-assistance to no-assistance (fully-autonomous). As
Wide Area Network (LoRaWAN) where conservation of energy
discussed in [1] by the Society of Automotive Engineers (SAE),
is the primary motive of the deployed technology.
the AAS depends on the mode of operations and deployment
It has been predominantly established by earlier studies that
scenarios of vehicles. Specifically, in C-V2X, channel security,
C-V2X is a better alternative to any of the existing technologies
session management, security-patches, key management, access
based on the performance and deployment strategies. However,
control, and camouflage-detection are the key perspectives to
factors like coverage, mobility management, Total Cost of Own-
look forward to for AAS. Policing, resource management, and
ership (TCO), reliability, latency, security, and scalability are
risk mitigation are other issues to be tackled for AAS in C-V2X.
V. Sharma and I. You (Corresponding Author) are with the De-
partment of Information Security Engineering, Soonchunhyang Univer-
sity, The Republic of Korea, Email: vishal sharma2012@hotmail.com, il- C. Network Control and Safety (NCS)
sunu@gmail.com. N. Guizani is with the Washington State University, USA, From the C-V2X point of view, it is required to study network
Email: nadraguizani07@gmail.com. This work is supported by the Soonchun-
hyang University Research Fund. control and safety as a single component, as their tradeoff
2

shows a considerable impact on the implementation as well as information and vehicle systems from hackers. The attacks
the security of the network. Attaining MVSS and AAS helps in any of these modes pose a considerable effect on the
to efficiently control the operations in C-V2X. The detection trustworthiness of the network as well as creates a huge
of anomalies, attack-mitigation, and prevention against zero- impact on ownership and quality of experience.
day vulnerabilities are other metrics that need to be efficiently • Secure Mobility management and Service Layoffs: Mobility
handled. NCS also accounts for the management of vulnerable and service layoffs are the crucial aspects of C-V2X.
activities, misbehavior detection and session security in C-V2X. There are several solutions available that focus on both fast
and secure service layoffs and handover management [10].
II. U SE -C ASES FOR S ECURE C-V2X However, with proprietary network formations, the security
C-V2X aims at facilitating on-the-go network, which primarily factors become dominant and should be resolved through
matches similar capabilities of a stand-alone cellular network. mechanisms applicable to C-V2X, especially leveraging on
Several studies are available that highlight the practical aspects LTE and 5G technologies.
and application-based use-cases of C-V2X, however, in order to • S-B2MP (Secure Base to Multi-Peer Networks): One of
complement the existing findings and studies, some use-cases the interactively keen examples of C-V2X is B2MP, in
from the C-V2X security perspective are listed below: which a vehicle serves as the Base Station to multiple peers.
However, the presence of an attacker on-board may expose
• Autonomous Car Security: Autonomous cars use real-time
the key metrics of the network, which can be used to launch
data and instructions from different sensors connected to
several exploitations leading to a huge impact on the overall
the cellular network. The guidance maps for real-time
formation of C-V2X. Thus, S-B2MP is another security-
coordination can be accessed through the C-V2X communi-
oriented use case of these networks.
cations. The security features of C-V2X help to prevent any
• Secured Named Data Networking (NDN): NDN is a basic
impersonation and replay attack which may misguide the
network communication mode that supports secure data
vehicle and lead to interruptions and accidents. The security
directly at the network layer by making every data packet
considerations and applying several key-based mechanisms
verifiable. NDN uses ad hoc and broadcast-style communi-
can help to provide strong encryption for transmissions
cations and is independent of communication technologies.
involving guidance data to autonomous cars.
Therefore, it can be used with C-V2X to enhance its feature
• Driver Authentications: In assisted cars, secure operations
based on secure media-independent formations.
of C-V2X can help verify the drivers through third-party
• Traffic Management and Anomaly Detections: The traf-
authentications. The medical conditions of the driver can
fic management includes issues related to speed manage-
also be verified through attached sensors and several light-
ment, traffic information, routing information, cooperative
weight authentications can help to quantify access control
navigation, etc [11]. Moreover, driver-behavior, vehicular-
to the legitimate driver.
anomalies, and network intruders are other factors affecting
• Vehicle-Health Monitoring: The vehicle’s health can be
the core functionalities of the vehicular system. Sufficiently
monitored through C-V2X, which sends instructions in real-
secure mechanisms can help to resolve these issues and
time to car software maintainers for every machine issue.
identify potential anomalies prior to their attack.
During wrong- configurations, there are high possibilities
for an intruder to gain access to the components of a vehicle
III. C-V2X S ECURITY A RCHITECTURE AND T RENDS
which may be further exploited to gain access to the entire
network. Such situations can be encountered through the The traditional technologies for V2X, evolving V2I, and V2V,
formation of a secure communication channel in C-V2X. like DSRC and 802.11p, require a large number of entities
• Secure Public Safety Communications (PSCs): C-V2X is for connecting vehicles and supporting their transmissions to
expected to play a pivotal role in PSCs by allowing vehicles OEMs. However, with the evolution of C-V2X under 3GPP,
to communicate the shortest path to other devices in cases the existing cellular infrastructure can be used for supporting
such as: real-time delivering of food, medicine, and another vehicular communications. With the advent of LTE technology,
kind of services that are time-sensitive. Moreover, the the V2X is highlighted for its vast range of applications, and with
security features of C-V2X can help extend its applications a shift of LTE towards 5G, the upcoming trends are focusing
to military and civilians expeditions. The systematic and on utilizing both these architectures to provide security services
secure coordination can help to attain high reliability and to the involved entities [12] [6] [7]. This section discusses base
low latency for the devices involved in C-V2X setup. architectures defined for LTE-V2X and 5G-V2X along with their
• Inter and Intra Vehicular Security: Trust and privacy are security concerns and applicability.
major concerns in the case of inter- and intra-vehicular
communication [9]. Inter-vehicular communications refer A. LTE-V2X
to the C-V2X setup that is comprised of vehicles from LTE-V2X leverages services from eNB, and Mobility Man-
different vendors. In such a scenario, security becomes a agement Entity (MME), which accounts for providing various
dominant factor, and it is expected to use pseudonyms or control functions for V2X, as shown in Fig. 1. The standard LTE
proxies for preventing inter-network eavesdropping. Intra- architecture is comprised of Packet Data Network Gateway (P-
vehicular communication refers to the onboard operations GW), User Equipment (UE), Serving Gateway (S-GW), Home
of a vehicle involved in C-V2X. In this mode, security Subscriber Server (HSS), and Broadcasting Server (BS). All
technologies are required to protect the customer’s private of which operate as components of the Evolved Universal
3

Application Server The security features are provided through specified security
functions, namely, Authentication Credential Repository and
V2X Control Requirements
Function P-GW Data Network Processing Function (ARPF), and Security Anchor Function
HSS
(SEAF) both of which are collocated with the AUSF [15]. The
MME S-GW BS
details on each of them can be followed from the technical
User Equipment Identity Theft
specification by 3GPP on the security of 5G networks [7].
MME
BS
Mobile Management Entity
Broadcasting Server
User Privacy
Anonymity
However, there are no concurrent studies which discuss the
HSS Home Subscriber Server Confidentiality
E-UTRAN Evolved Universal Terrestrial Integrity security from V2X perspectives. This article provides an initial
Radio Access Network Availability
P-GW
S-GW
Packet Data Network Gateway
Serving Gateway
Phishing
Sniffing
screening of such requirements as discussed in the next section.
E-UTRAN

eNB Evolved Node B Broadcast Storming


Accessibility
Accountability
Authentication
Situational Awareness
Network Core 00 00 00 00 000 000 000 000 00 00 00 $33
00 00 00 00 00 00 00 00 00 00 00 00 00 00 000 000$33
Localization 00 00 00 00 00 00 00 00 00 00 00$33 00 00 00 00 00
Backward Broadcasting 0260 0 0 0 0 0 0 0 0 0 0260 0 0 0 0 0 0 0 0 0 02600 00 00 00 000 000 000 000 000 000 000 000 00 00
Message Protection 00 00 00 00 00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 0 0
PCF 0000000000000000000000000000000000 AUSF UDM
Channel Secrecy 0 0 0 0 0 0000000000000000000000000 0 0 0 0 0

SMF

eNB SECURITY FUNCTIONS


AMF

USER PLANE
FUNCTION

DATA NETWORK

UPF
Fig. 1: An illustration of LTE-V2X architecture and security AF (R)AN

requirements [6].
UE

Terrestrial Radio Access Network (E-UTRAN) [13]. The traffic


to the Data Network (DN) is facilitated through P-GW and
measurement report based transmissions are used for supporting UE
vehicular communications. Although efficient, there are a series
of issues with this architecture as it is unable to provide strong
mechanisms for vehicle authentication, credential management,
privacy and anonymity of involved entities [14] [9]. Moreover, PCF: Policy Control Function
AMF: Access and Mobility Function
SMF: Session Management Function
UDM: Unified Data Management
LTE-V2X does not comply with the upcoming requirements of AUSF: Authentication Server Function
(R)AN: (Radio) Access Network
AF: Application Function
UPF: User Plane Function
ultra-low latency and ultra-high reliability [6]. In addition, there
is limited support for positioning and trajectory-based solutions Computationally expensive security for supporting V2X
No-standard procedures for intra- as well as inter-handovers of vehicles
for V2X. As depicted in Fig. 1, the security requirements are Dependence on the primary authentication
Lacks end to end protection
tedious to resolve based on the component architecture of LTE. Rigid and non-reflex access management for handling rapid changes
Non-confirmation of the requesting entities
Thus, a paradigm shift is required from LTE to 5G for supporting Non-supporting procedures for on-demand gNBs

edge computing, which is an integral aspect of V2X services.


Fig. 2: An illustration of exemplary scenario for 5G-V2X archi-
B. 5G-V2X tecture based on 3GPP TS 23.501.
In contrast to LTE, 5G-V2X is a function based architecture
which primarily focuses on providing service-based accessi-
bility to the involved entities. The key advantages of 5G- IV. 5G-V2X: S ECURITY ATTACKS , THREATS , AND
V2X are service-based policing for applications, low-latency, REQUIREMENTS
high-reliability and functional support for V2X, which can be The majority of the shortcomings of DSRC, 802.11p, and
operated in Non-Standalone 5G (NS-5G) or Standalone-5G (S- LTE-V2X are meant to be handled through the efficient function
5G) mode depending on the deployment changes to the initial handlers in 5G-V2X. The search for security solutions and possi-
architecture [7] [15]. NS-5G-V2X is dependent on the underlying ble remedies against known and unknown threats depend on the
LTE-deployment to facilitate the requirements laid by 5G com- deployment strategies of 5G-V2X. If V2X is enabled with NS-
munications. The scope of enhancement to security is limited as 5G, the attacks possible on LTE-V2X holds true and can exploit
this requires the exact identification of the 5G functions, which the services in 5G-V2X. However, with S-5G, the attack window
will match the components defined in LTE [6]. However, with S- decreases and the protection against threats can be increased
5G, the scope widens, but it also requires work from the ground while maintaining ultra-low latency and ultra-high reliability
level while managing communication back to the core. amongst the entities. Network planning and deployment play a
The core functions of 5G-V2X setup include; Policy Control key role in deciding the security of 5G-V2X. The placement
Function (PCF), Access and Mobility Function (AMF), Authen- of functions and control, and decisions on policing implicate
tication Server Function (AUSF), Session Management Function possible exploitation of vulnerabilities. In addition, the exposure
(SMF), Application Function (AF), Unified Data Management of keys and the use of an insecure channel of communication
(UDM), and User Plane Function (UPF), as shown in Fig. 2. are other points of attack in 5G-V2X. Moreover, V2X forms the
4

edge component of 5G, which may or may not have a secure the core increases the latency and weakens the links between the
channel. Thus, the possibilities of attacks increase when the AMF, SMF, and UPF.
devices undergo major mobility transitions. The cell coverage
is another issue that can be evaluated by the eavesdropper to B. 5G-V2X Specific Security Issues
launch any potential attacks on the vehicles.
There is a scarcity of studies and no-concurrent solutions
available which predominantly depicts the security aspects of
A. General Issues 5G-V2X. The ones for NS-5G-V2X only focus on the existing
This section provides detail for several key attacks and threats issues limited to the infrastructure support of LTE. In the recent
when deploying services through 5G-V2X. releases of TS series by 3GPPP [7]1 , security is defined for
• The main reason for a possible attack in 5G-V2X is the
5G-V2X in the Access Stratum and Non-Access Stratum mode.
irregular placement of gNB, which is the counterpart of The primary security is defined using 5G-AKA or EAP-AKA’
eNB and MME of LTE-V2X. The primary impact can be through a hierarchical key distribution. The security is gov-
caused by the authentication and authorization of vehicles. erned through secure key exchanges and by assuming different
In the semi-autonomous mode, a certificate-based secu- strategies for each of the involved entities. Although this report
rity, provided through email or semi-autonomous mode, is provides a detailed possible layout of security for 5G, it is yet to
used assuming the network operates on a secure-line up be considered for V2X because of differences in the dynamics
between RSU and OEM. However, with major autonomy, and mode of operations of a vehicle from a regular UE.
the certificate-based solution may hinder the smooth transit V to X authentication and securing the credentials are the
between gNBs. key issues to be considered for 5G-V2X [6]. Moreover, network
• The presence of a malicious node may exploit the vul-
layout, planning, and handover are yet to have proper solutions
nerability in OBU and gain access to the network (zero- for both intra- and inter-modes. The deployment of 5G-functions
day attacks). Thus, it becomes the responsibility of the near to edge or core also needs further research from a 5G’s
network entity to prevent such attacks. Static information perspective. Although, C-V2X (LTE and 5G) decreases the
and weak hash functions may lead to certificate forgery. number of RSU required in the existing technology focused by
Which prevents the capture of secure elements of a vehicle vendors (from OEM to Vehicle connectivity), yet there are still
is an ultimate requirement. issues pertaining to universal availability, interim-management
• For cellular-assisted autonomous driving, it is desirable
of slices, and access management. The requirement of dynamic
to prevent any known and chosen plain/ciphertext attacks. RSUs, as stated in [6], can be attained through stationed
Such attacks are possible as major sensor information vehicles, but there is no architecture to grasp this facility.
is shared without encryption. Backward broadcasting and In addition to the above discussions, the 5G security reports
signal storming are the other issues related to the security depend on the expensive backward operations which become
aspect of 5G-V2X. complex when applied to V2X solutions. Moreover, the use of a
• Message security is another factor for securing transmis-
Certificate Revocation List (CRL) for initial authentication can
sions in 5G-V2X. The content in these networks should only be accounted for a dense RSU network, and it involves a
be secured through secret keys. With the existing security high dependency on a centralized authority, which is a problem
modules, the keys are generated by following a hierarchical when looking at a global deployment of unified V2X technology.
pattern. Fresh keys need to be maintained, and synchronized The available information in TS reports [7] resolves the perfect
patterns must be used to prevent any replay attack or De- forward security for 5G UEs, but there is a gap in the use of this
synchronous attacks. technology for V2X. Although, 5G architecture aims to protect
• Irrespective of the network planning and layouts, side-
keys used in the next phase, capturing of the vehicle or signature
channel attacks are tedious to detect and can exploit the replication can lead to the violation of forwarding secrecy. Thus,
entire network by merely affecting the vehicle or gNB in attaining perfect forward secrecy is a crucial aspect for V2X
the 5G setup. In addition to these, service-based attacks are because of the physical threats to the credentials of vehicles.
expected to prevail in 5G-V2X unlike DSRC or LTE-V2X Another issue to be taken care of is the extensive depen-
as all the content in the 5G is expected to be classified into dence on the primary authentication and assumption of security
several services. Thus, service-based attack prevention and assurance schemes. With the involvement of long-term secret
threat detection are key issues to focus on while securing keys, it is yet to be decided whether these will be generated
the functionalities in 5G-V2X. through the 5G-core or the 5G functional units deployed in the
periphery of OEMs. The protection of long-term keys depends on
It is worth noting that the security in 5G-V2X not only depends
the deployment range and positioning of 5G-security functions
on the security functions but also on the location of certain
for V2X. SEAF must be placed in the deep network leading
regular entities/functions, which involve gNB, SMF, AMF, and
to nearly impossible physical attacks, but this also raises the
UPF. Control over any of these exploits the entire network. Thus,
concerns as SMF and AMF, in this case, have to be placed
it becomes inevitably important to secure the passes between
near gNB or vehicle for facilitated transitions [7]. The current
these entities while leveraging the services of security functions.
versions do not provide any discussion on home network security
However, the positioning of servers providing security functions
of V2X and there are limited discussions on using public-key
must be carefully selected. A security anchor function near to
operations when the vehicle is operating in its home network.
a user may lead to several client-side attacks while placing at
1 3GPP TS 33.501 V0.7.1 (2018-01)
5

,QYROYHGDQG$IIHFWHG(QWLWLHV
$WWDFNVDQG7KUHDWV 7\SHV 1HWZRUN
)XQFWLRQV
%UXWH)RUFH:HDN9DOLGDWLRQ$FFHVV '65& 95
$XWKHQWLFDWLRQDQG
YLRODWLRQ6HVVLRQFRQWURO%URNHQ 9;16*9; 9 H1%00($6 +666*:
$XWKRUL]DWLRQ$WWDFNV
$XWKHQWLFDWLRQ$&/0RGLILFDWLRQ *9; 9 J1% 60) $0) 83)$)
'65& 95
0DOLFLRXV1RGH$WWDFNV %ODFN+ROH*UH\+ROH6LQN+ROH$WWDFNV /7( 9;16*9; 9 H1%00($6
*9; 9 J1% 60) $0) 83)$)
'65& 95
5HSOLFDWLRQ'XSOLFDWLRQ0RGLILFDWLRQ
&HUWLILFDWH)RUJHU\ /7( 9;16*9; 9 H1%00($6 +666*:
$OWHUDWLRQ
*9; 9 J1% 60) $0) 83)$)
'65& 95
1RLVH-DPPLQJ6LJQDO6WRUPLQJFRYHUW
&KDQQHO,QWHUIHUHQFH /7( 9;16*9; 9 H1%00($6
DQGRYHUWFKDQQHOV
*9; 9 J1% 60) $0) 83)$)
'65& 95
&LSKHU7H[W3ODLQ7H[W
.QRZQDQG&KRVHQ /7( 9;16*9; 9 H1%00($6 +666*:
$WWDFNV
*9; 9 J1% 60) $0) 83)$)
'DWD'HOHWLRQ'DWD '65& 95
5HSOLFDWLRQ'XSOLFDWLRQ0RGLILFDWLRQ
'LVFORVLQJ'DWD)RUJHU\ /7( 9;16*9; 9 H1%00($6 +666*:
$OWHUDWLRQ
DQG'LVWULEXWLRQV *9; 9 J1% 60) $0) 83)$) 6)
'65& 95
'H6\QFKURQL]DWLRQ 7&3'H6\QFKURQL]DWLRQ'16SRLVRQLQJ
/7( 9;16*9; 9 H1%00(
$WWDFNV 3RUWLGHQWLILFDWLRQ,&03DWWDFNV
*9; 9 J1% 60) $0)
'65& 95$6
'R6DQG ''R6$WWDFNV 8'3)ORRG6<1)ORRG3LQJRI'HDWK /7( 9;16*9; 9 H1%00($6%6
*9; 9 J1% 60) $0)
'65& 95
(DYHVGURSSLQJ,PSHUVRQDWLRQ
$FFHVV$WWDFNV /7( 9;16*9; 9 H1%00(
0DQLQWKH0LGGOH0DVTXHUDGH$WWDFN
*9; 9 J1% 60) $0)
'65& 95
)DOVLILHG,QIRUPDWLRQ,QMHFWLRQ)DOVLILHG
)DEULFDWLRQ$WWDFNV /7( 9;16*9; 9 H1%
6HQVRUUHDGLQJVDQG0LVLQWHUSUHWDWLRQV
*9; 9 J1% 60) $0)
'65& 95
*360$30RGLILFDWLRQV  /7( 9;16*9; 9 H1%
*9; 9 J1%
'65& 95
7HUPLQDOV$WWDFNV +LGGHQ7HUPLQDOVDQG([SRVHG7HUPLQDOV /7( 9;16*9; 9 H1%
*9; 9 J1% 60) $0)
'65& 95
.H\([SORLWDWLRQ  /7( 9;16*9; 9 H1%00($6 +666*:
*9; 9 J1% 83)$) 60) $0) 6)
&RQWHQW0RGLILFDWLRQDQG+HDGHU '65& 95
0HVVDJH0RGLILFDWLRQDQG
0RGLILFDWLRQ64/,QMHFWLRQV&RGH /7( 9;16*9; 9 H1%$600(
7DPSHULQJ
REIXVFDWLRQ *9; 9 J1% 83)$) 60) $0)
'65& 95
1HWZRUN6WDONLQJDQG
6QLIILQJ)RUHQVLFV6SRRILQJ 6SDPPLQJ /7( 9;16*9; 9 H1%$600(
3HQHWUDWLRQ$WWDFNV
*9; 9 83) J1% 60)
'65& 95
&ORQLQJDWWDFNV&RGHREIXVFDWLRQ
5HSURJUDPPLQJ$WWDFNV /7( 9;16*9; 9 H1%
;66VFULSWLQJ
*9; 9 J1% 60) $0)
'65& 95
5HVRXUFH'HSOHWLRQ
 /7( 9;16*9; 9 H1%$600(%6
$WWDFNV
*9; 9 J1%
'65& 95
7RSRORJ\EDVHG5HVRXUFHVEDVHG
5RXWLQJ$WWDFNV /7( 9;16*9; 9 H1%00($6%6
7UDIILFEDVHG
*9; 9 83) J1% 60) $0)
6HUYLFHEDVHGQHWZRUN '65& 
3UHYHQWLRQDQG6HVVLRQ  /7( 9;16*9; 9$6 H1%
+LMDFNLQJ *9; 9 83)$) J1% 60) $0)
&DFKHDWWDFN7LPLQJDWWDFN '65& 95
6LGH&KDQQHO$WWDFNV 3RZHUPRQLWRULQJDWWDFNDQG /7( 9;16*9; 9 H1%
(OHFWURPDJQHWLFDWWDFN$FRXVWLFDWWDFN *9; 9 J1%
'65& 95
=HURGD\ ([WHULRUDQG,QWHULRU /7( 9;16*9; 9 H1%00($6 +666*:
*9; 9 83) J1% 60) $0) 6)
'65& 9
6\ELO$WWDFNV  /7( 9;16*9; 9
*9; 9
'65& 95
0HVVDJH&RQQHFW6HUYLFH$FFHVVEDVHG
7LPLQJ$WWDFNV /7( 9;16*9; 9 H1%00(
5DQJHEDVHG5HSOD\$WWDFNV
*9; 9 J1% 60) $0)
 
7XQQHOLQJ$WWDFNV ,&03'163RUW+773 /7( 9;16*9; 9 H1%00($6 +666*:
*9; 9 83) J1% 60) $0) 6)
9HKLFOH&RQILJXUDWLRQ$OWHUDWLRQV9HKLFOH '65& 9
9HKLFOH+HDOWK'LVUXSWLRQ FDSWXULQJ)LUPZDUHDQG9HKLFOH6RIWZDUH /7( 9;16*9; 9
0RGLILFDWLRQ7UDMHFWRU\$OWHUDWLRQ *9; 9

Fig. 3: A detailed list of attacks and threats with a focus on the involved and affected entities/functions of C-V2X. (Entity List: -
V: Vehicles (on-board units (OBUs))/ User Equipment, R: Road Side Units, AS: Application Server, SF: Security Functions)

Also, attaining end to end protection by preventing Sybil attacks for the majority of the components is done through computa-
leading to effects on confidentiality and integrity is a must tionally expensive operations and any sort of attack can cause
while deploying 5G-V2X solutions. Finally, the confirmations severe damage. To resolve such issues and to further enhance
of requesting entities and identification of vehicles need to be the performance, a conceptualized architecture is proposed on
decided on measuring both performance and security. For a the backbone of the architecture given by 3GPP [7].
clearer understanding, the impact of several attacks and threats
with a difference in the use of technology is presented in Fig. 3. A. Architectural Enhancements
V. 5G-V2X: C ONCEPTUALIZED A RCHITECTURE The proposed architecture discusses the security inclusions
The technology solutions for C-V2X at the moment support through edge computing where users, vehicles and several sen-
more of V2V and V2I than V2X. The existing conceptualized sors/devices are treated as a part of everything and strategies are
views leverage 5G security modules for securing V2X communi- provided for both intra- as well as inter-handover of vehicles.
cations. However, as discussed in the earlier section, the security The proposed conceptualized architecture uses a new function
6

0000000 $33
Network Core 00 00 00 00 00 00 00 00 00 00 00 00 00 00 000000$33
000000000000000000000000000000000$33
0026000000000000 00 00 0000000000000026000000000000 00 00 00 00 00 00 00 00 0 0
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 002600 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
PCF 0000000000000000000000000000000000000000000000
0 0 0 0 0 00000000000000000000000000000000000000000000000 0 0 0 0 0 AUSF UDM
000000000000
SMF

AMF SECURITY FUNCTIONS

OEM

SETUP-1 SETUP-2
SW SRF
UPF AF UPF AF

DN (R)AN DN (R)AN
SENSOR
gNB
SRF
gNB
UE
SRF

SV SV

NO-ADDITIONAL OVERHEADS ADDITIONAL OVERHEADS

KAMF KSEAF
LOCATION AND TRAJECTORY
PARTIAL KEYS (-P) BASED KEY GENERATION

KSRF-SW KSRF-SW-P KSRF-SW-P(gNB)

Static Vehicle ( SV)


EDGE NETWORK

EDGE NETWORK
EDGE NETWORK

EDGE NETWORK
as a gNB
KgNB KgNB KgNB-P KgNB-P
KSRF-SW-P KSRF-SW-P(SV)

(Partial Control)
KV KV KV-P KV-P

KSRF-SW-P(V)
INTRA-MODE INTRA-MODE

EDGE-INITIATED EDGE-INITIATED
DEVICE/VEHICLE MOBILITY DEVICE/VEHICLE
MANAGEMENT AUTHENTICATION
The entire process involves one time overhead of obtaining partial keys.

Updates in KSRF-SW-P are required only when user/vehicle side changes are made to the applications. No changes are required in the
KSRF-SW as mobility management is kept independent of authentication.

The mobility management can be carried out without re-authentication, based on the decisions passed by SRFs.

Fig. 4: An illustration of the conceptualized 5G-V2X security architecture for intra- and inter-mode of operations for vehicles using
Security Reflex Function (SRF).

“Security Reflex Function (SRF)”, as shown in Fig. 4, to support • Supports on-demand gNB: SRF allows strategic control
rapid changes in the network as well as to define policies over the network by including static vehicles as user-side
for access management. Moreover, SRF accounts for attaining gNBs, termed as gNB’. This also helps to support parking-
the feature of Ultra-Dense and Ultra-Secure (UD-US) mobility based networks as well as Emergency Communication
management, which is needed as it is expected that a huge Vehicles (ECV).
number of cellular-supported vehicles will be roaming on roads • Allows splitting and slice management: SRF supports the
demanding all time connectivity. It is desired to understand the core principle of slice management and helps to maintain
features and operational strategy of SRF before following its role the vehicle as well as slice anonymity by deriving several
in 5G-V2X. The details are: short-term keys depending on the mode of operations (intra
• Edge-based authenticator: SRF provides edge-initiated au- or inter).
thentication for the entities involved in 5G-V2X. It reduces • User-side secondary authentication: SRF allows user-side
the burden of the core by covering user-side roles of SMF authentication when the static vehicles are used as access
and AMF. points. Moreover, it allows secondary authentication for
• Partial-key allocations: SRF uses partial key allocations by specifying route optimization by reducing the number of
deriving several keys from the keys obtained from AMF intermediate hops while maintaining the end to end security.
and SEAF. It uses device-based specific keys for managing • Multi-radio facilities: With vehicles in proximity to ev-
V2X connectivity. It sits on top of gNB and can operate in erything, it is desired that multiple radio facilities must
a dual-mode with the specified gNB. be supported by the 5G security functions. However, it
7

is an expensive operation to include such facilities on all key generation, thus, maintaining the freshness throughout the
devices. Thus, SRF act as a common function, which allows connectivity. Even if the network synchronization is disturbed
radio-translations to support the security of vehicles having for the vehicles, the SRF maintains an independent connection
communication in different modes. to the core security functions, allowing zero-drop during re-
verification. Most dominantly, SRF helps to overcome issues
B. Workflow and Key Generations related to certificate forgery and also allows expensive public-
key operations to be used by providing a short-pass between the
The workflow and key generations in the conceptualized
vehicles and everything. The vehicles can use dual authentication
architecture can be orchestrated through specific frameworks
through SRF, which allows partial authentication with the gNB or
or by simply dividing the existing keys. In the derived setup,
nearby sensor and partial authentication with the core functions,
partial keys are used, which can be treated similarly to the
once the vehicle-services are initialized.
secondary authentication where SEAF is used to derive several
In the intra-mode, when the vehicles operate in the periphery
SEAF’. However, SEAF’ does not account for rapid changes,
of gNB, SV, or a sensor, no additional mechanisms or key
nor does it provides any support for edge-based V2X security.
exchanges are required for re-authentication as KV is securely
Additional overheads are also accounted for because of re-
derived from KSRF . The rapid changes to the network are
verification between the SEAF and SEAF’. In the proposed
also handled by the re-authentication with the SRF, which also
architecture, two different setups can be used to deploy SRFs.
prevents issues related to access management. For the inter-mode
In the first setup, the SRF can be fixed using switch (SW)-
operations (handover), AMF accounts for the security of SRFs
hub (gNB) architecture. The SRF then becomes the interface
and prevents re-authentication by relying on SRF to check the
between the gNB and the core security functions and KAM F or
validity of the vehicle under movement.
KSEAF is used to derive several KSRF −SW and KSRF −SW −P
All these operations help to decrease the total cost of oper-
keys, which further generate the KgN B and KV for the terminals
ations, which is measured on the basis of the number of hops
and vehicles in its periphery. The derived keys are particularly
to be traversed for generating keys, especially during the re-
applicable either for mobility management or authentication, as
authentication. Moreover, the end to end security as well as
shown in Fig. 4. This is the simplest form and it allows easier
the backward security can easily be observed by including the
intra-handovers without additional overheads on gNB. However,
SRF in the existing architecture. SRF also exhibits the control
it involves additional switches to be placed as a control center
properties which can be extended through a different framework
for several hubs or gNBs.
for attaining UD-US mobility management. Furthermore, SRF,
In the second setup, SRF and gNB are collocated, which adds
through the disintegration of authentication and mobility man-
to the overheads of operations on a single terminal. However,
agement, allows extensive privacy and anonymous operations
several security-passes and inclusion of additional switches as
along with highly secure network management. The disintegrated
well as modifications to the core architecture can be avoided in
operations also reduce the network stress in terms of overheads
this case. As an abstracted view, SRF may look like a derivative
by dividing the user-side management functionaries.
of existing architecture, but it provides a specialized location and
To present this, standard EAP-AKA’ is used for authentica-
trajectory-based key generations, which adds up to the efficiency
tion when a vehicle moves across the terminals in the tradi-
and service-based security requirements of 5G-V2X. Based on
tional [7] and the proposed setup. The proposed architecture
the location as well as the availability of Static Vehicles (SV),
brings authentication near to the vehicle at the edge leading to
SRF keys are used to derive additional keys, KSRF −SW (SV )
conservation of 2.5% to 11.3% signaling overheads, as shown in
and KSRF −SW (V ) (Fig. 4), which enable 5G-V2X architecture
Fig. 5, by utilizing the computational model given in [10]. The
to use SV as one of the gNBs. This widens the coverage and
signaling overheads are reduced based on the intermediate hops
can be considered as one of the core solutions for PSCs through
5G-V2X2 .
Traditional Setup Proposed Architecture

C. 5G-V2X Authentication 3500


Signaling Overheads (bytes*hops/sec)

This conceptualized architecture can be used to support the 3000

host as well as network-initiated authentications. For V2X se- 2500

curity, the proposed architecture uses KX and KV for edge- 2000


Hops:
initiated authentication. Both these keys are derived at the edge 5~20
1500
and it prevents any long-distance transmissions, which also helps
to attain optimized routes for the derivation of keys as well as 1000

V2X authentication. The location and trajectory initiated key 500

generation also reduces the signaling overheads as KSRF alone 0


can be used to generate the edge-side keys. 128 256 512 1024 128 256 512
Message Size (bytes)
1024 128 256 512 1024

EAP−AKA’ EAP−AKA’ − SRF involvement EAP−AKA’ − SRF involvement


SRF-based architecture is secure for most of the issues that with no changes to signaling
messages
with changes to signaling
messages (initial Auth−Req from
are presented in Fig. 3. For the authentication and authorization, SRF instead of AUSF)

SRF derives its keys from AMF, which follows session-wise Fig. 5: A graphical comparison for signaling overheads of
vehicle’s mobility through EAP-AKA’ in the traditional and the
2 The proposed scheme divides the mobility and authentication procedures
proposed SRF-based 5G-V2X.
allowing the network to respond quickly to the rapid changes.
8

Technology Enablers

SC-FDM (C-V2X), Network Slicing, SDN~NFV


-:Security:- Research Directions and
Public Key Infrastructure, Group 5G-V2X Security Issues of 5G-V2X
Authentication, Slice Authentication,
Edge-Fog Authentication, Hybrid 3GPP TS
Excessive Service Initiations
Authentication, EPS-AKA, EAP-AKA', (Leading),
5G-AKA NGMN,
SRF Positioning
5GPPP-WG,
ETSI, IETF
Credential Theft Policing

DSRC/802.11p Zero-Day Vulnerabilities


EN (12253:2004, 12795:2002, Existing Standards, Key Reporting Signal Storming
12834:2002, 13372:2004, Organizations, Technologies and
14906:2004) Challenges Service-Attributed Attacks
SAE, ETSI-ITS, ARIB
Resource Depletion Attack

Operational Bands SRF - Side Channel Attack


LTE-V2X
LTE-V2X, V2V - DSRC, 802.11p- Session Hijacking
Reserved : 5.855-5.905 GHz ETSI, 3GPP,
(US, Europe, Korea) 5GAA, SAE, Configuration Attacks (Key Injections)
V2X (5G): sub-6GHz IETF
Flooding Attacks

Fig. 6: An illustration of existing standards, key reporting organizations, technologies and research challenges particularly
emphasizing the proposed SRF-based 5G-V2X.

involved in authentication. The output for EAP-AKA’ shows and it is desired to develop strategies for credential theft.
lesser improvement as the protocol is driven by core security Solutions like self-evaluations and introduction of self-
functions. However, to fully utilize the proposed architecture, it checking logic can help to facilitate these requirements
is recommended to consider developing novel protocols that can whenever the vehicles are initiated in the network.
enhance the performance to a large extent at a similar strength • Configuration attacks: These attacks are most dominant for
of security. NS-5G-V2X, as V2V/P broadcasts can be used to mislead
the receiving entity to make wrong decisions. These attacks
VI. D ISCUSSIONS AND R ESEARCH C HALLENGES also pave a way for routing attacks as well as session
Security concerns of C-V2X are dominated by the type of hijacking.
architecture used for deploying devices and entities up to the • Perfect forward secrecy: This issue is applicable to the
core. Especially for 5G-V2X, there are some additional security majority of the networks as no concurrent approach can
concerns, such as service-based accessibility, signal storming, provide perfect forward secrecy at an efficient rate. How-
and edge-based authentications. These issues did not prevail ever, with the use of certain technologies and protocols,
much in LTE-V2X; however, for NS-5G-V2X, these become it can be achieved on the backbone of the conceptualized
dominant performance affecting concerns for LTE equipment. architecture by utilizing several instances of SRF.
Further details can be seen in Fig. 6. • Insider threats and zero-day attacks: Privacy and anonymity
Some of the key research challenges and open issues, which are affected most by insider threats and potential zero-
can be targeted as a part of future work, while using the day vulnerabilities. Both these tend to expose the entire
conceptualized architecture, are presented below: network and share the key-exchange phenomenon to outer
entities, which can launch attacks to misled the vehicles [9].
• Prevention of excessive service initiations: When an attacker
Thus, managing insider threats and developing strategies to
is able to violate the SRF, it may initiate multiple services
prevent zero-day attacks, by understanding the window of
to interrupt the V2X operations.
vulnerability especially for V2X, are major challenges to
• SRF positioning: The positioning of the SRF function is an
resolve in 5G-V2X.
optimization issue and it may vary from one scenario to the
next. In some cases, where OEM wants direct control of the
VII. C ONCLUSION
vehicles, SRF functions need to be placed near the OEM,
which will violate the principles of edge-computing. Thus, This article presents an overview of C-V2X technologies and
its positioning and selection of key-relaying solutions are standards while focusing on the current situations of LTE-V2X
major concerns to be resolved. and 5G-V2X. Several use-cases, service supports, and security
• Accurate sensor relaying: The location and trajectory-based requirements are discussed in detail. Issues related to existing
key generations are based on accurate sensor readings. 5G-V2X based on standalone as well as non-standalone are pre-
Thus, it is desired that vehicles’ data is accurately retrieved sented through comparisons. A conceptualized Security Reflex
under all circumstances. Function (SRF)-based architecture is also presented, which aims
• Credential theft: In case of false requests from the vehicles, to reduce the burden of secure mobility management of vehi-
the exposure of KV may pose threats to KX , which is cles in 5G-V2X. In addition, various open issues and research
the key of the devices with which the vehicles communi- directions are discussed which help to understand the current
cate directly. Thus, this will involve re-authentication, but aspects of 5G-V2X and its security alongside the usability of
identification of an instance of re-authentication is tedious, the conceptualized architecture.
9

R EFERENCES
[1] Z. MacHardy, A. Khan, K. Obana, and S. Iwashina, “V2X access tech-
nologies: Regulation, research, and remaining challenges,” IEEE Commu-
nications Surveys Tutorials, vol. 20, pp. 1858–1877, thirdquarter 2018.
[2] P. Wang, B. Di, H. Zhang, K. Bian, and L. Song, “Platoon cooperation in
cellular V2X networks for 5G and beyond,” IEEE Transactions on Wireless
Communications, vol. 18, no. 8, pp. 3919–3932, 2019.
[3] A. Earls, “WLAN, radar, IoT, V2X to complement 5G at IMS,” EE-
Evaluation Engineering, vol. 56, no. 6, pp. 8–13, 2017.
[4] H. S. Ma, E. Zhang, S. Li, Z. Lv, and J. Hu, “A V2X design for 5G network
based on requirements of autonomous driving,” tech. rep., SAE Technical
Paper, https://doi.org/10.4271/2016-01-1887, 2016.
[5] Y. Yang, S. Dang, Y. He, and M. Guizani, “Markov decision-based pilot
optimization for 5G V2X vehicular communications,” IEEE Internet of
Things Journal, pp. 1–1, 2018.
[6] “Cellular V2X Communications Towards 5G.”
https://www.5gamericas.org/cellular-v2x-communications-towards-5g/
[Last Accessed - March 2019].
[7] “Technical specification -3GPP TS 33.501.”
http://www.3gpp.org/ftp//Specs/archive/33 series/33.501/ [Last Accessed -
March 2019].
[8] C. Campolo, A. Molinaro, A. Iera, and F. Menichella, “5g network
slicing for vehicle-to-everything services,” IEEE Wireless Communications,
vol. 24, no. 6, pp. 38–45, 2017.
[9] A. Zhang and X. Lin, “Security-aware and privacy-preserving d2d com-
munications in 5g,” IEEE Network, vol. 31, no. 4, pp. 70–77, 2017.
[10] V. Sharma, I. You, F. Palmieri, D. N. K. Jayakody, and J. Li, “Secure and
energy-efficient handover in fog networks using blockchain-based dmm,”
IEEE Communications Magazine, vol. 56, no. 5, pp. 22–31, 2018.
[11] L. Hobert, A. Festag, I. Llatser, L. Altomare, F. Visintainer, and A. Ko-
vacs, “Enhancements of V2X communication in support of cooperative
autonomous driving,” IEEE communications magazine, vol. 53, no. 12,
pp. 64–70, 2015.
[12] R. Molina-Masegosa and J. Gozalvez, “LTE-V for sidelink 5G V2X
vehicular communications: a new 5G technology for short-range vehicle-
to-everything communications,” IEEE Vehicular Technology Magazine,
vol. 12, no. 4, pp. 30–39, 2017.
[13] K. Ahmed and M. J. Lee, “Secure resource allocation for LTE-based
V2X service,” IEEE Transactions on Vehicular Technology, pp. 1–1.
10.1109/TVT.2018.2868609, 2018.
[14] K. Bian, G. Zhang, and L. Song, “Toward secure crowd sensing in vehicle-
to-everything networks,” IEEE Network, vol. 32, no. 2, pp. 126–131, 2018.
[15] S. Chen, J. Hu, Y. Shi, Y. Peng, J. Fang, R. Zhao, and L. Zhao, “Vehicle-to-
everything (V2X) services supported by LTE-based systems and 5G,” IEEE
Communications Standards Magazine, vol. 1, no. 2, pp. 70–76, 2017.

You might also like