top of page

Initial Project Proposal

Secured communication between Autonomous Vehicles using 5G Networks

_______________

Problem

Onboard processing is not enough for autonomous vehicles to process data from multiple sensors and safely navigate through traffic. With the low latency and high speed of a 5G network, we can utilize cloud computing to process data from the sensors and communicate with adjacent vehicles. The extra processing power will help vehicles safely respond to surrounding traffic conditions without human interaction, such as sudden accidents and unexpected pedestrians. With cloud computing, we get closer to the dream of autonomous vehicles performing dynamic driving tasks and replacing humans under all roadway and environmental conditions [1]. For autonomous vehicles to be safe, we need network communication that can reliably, securely, and quickly transfer data between vehicles, the internet, and everything.

Previous Work

Onboard processing is not enough for autonomous vehicles to process data from multiple sensors and safely navigate through traffic. With the low latency and high speed of a 5G network, we can utilize cloud computing to process data from the sensors and communicate with adjacent vehicles. The extra processing power will help vehicles safely respond to surrounding traffic conditions without human interaction, such as sudden accidents and unexpected pedestrians. With cloud computing, we get closer to the dream of autonomous vehicles performing dynamic driving tasks and replacing humans under all roadway and environmental conditions [1]. For autonomous vehicles to be safe, we need network communication that can reliably, securely, and quickly transfer data between vehicles, the internet, and everything.

Approach

Our approach will be to survey, analyze and evaluate different methods of combating security threats that affect communication between autonomous vehicles in 5G networks. We will research a variety of security methods that apply to 5G and V2X networks that keep with the requirements of such networks. We will then offer analysis and evaluation of such security methods and have a detailed explanation explaining the pros and cons of each one. To conclude, we will propose our best solution to the problem.

Schedule/Deliverables

References

  1. C. Lai, R. Lu, D. Zheng, and X. Shen, “Security and Privacy Challenges in 5G-Enabled Vehicular Networks,” IEEE Network, vol. 34, no. 2, pp. 37–45, 2020.

  2. S. Rahmadika, K. Lee and K. Rhee, "Blockchain-Enabled 5G Autonomous Vehicular Networks," 2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC), Bandung, Indonesia, 2019, pp. 275-280, doi: 10.1109/ICSECC.2019.8907054.

  3. C. Campolo, A. Molinaro, A. Iera and F. Menichella, "5G Network Slicing for Vehicle-to-Everything Services," in IEEE Wireless Communications, vol. 24, no. 6, pp. 38-45, Dec. 2017, doi: 10.1109/MWC.2017.1600408.

  4. X. Foukas, G. Patounas, A. Elmokashfi and M. K. Marina, "Network Slicing in 5G: Survey and Challenges," in IEEE Communications Magazine, vol. 55, no. 5, pp. 94-100, May 2017, doi: 10.1109/MCOM.2017.1600951.

bottom of page