Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks

Shuja Ansari, Jawad Ahmad, Syed Aziz Shah*, Ali Kashif Bashir, Tuleen Boutaleb, Sinan Sinanovic

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

29 Citations (Scopus)
205 Downloads (Pure)

Abstract

There is a high demand for secure and reliable communications for Connected Autonomous Vehicles (CAVs) in the automotive industry. Privacy and security are key issues in CAVs, where network attacks can result in fatal accidents. The computational time, cost, and robustness of encryption algorithms are important factors in low latency 5G‐enabled secure CAV networks. The presented chaotic Tangent‐Delay Ellipse Reflecting Cavity‐Map system and PieceWise Linear Chaotic Map‐based encryption on short messages exchanged in a CAV network provide both robustness and high speed encryption. In this work, we propose a 5G radio network architecture, which leverages multiple radio access technologies and utilizes Cloud Radio Access Network functionalities for privacy preserved and secure CAV networks. The proposed Vehicular Safety Message identifier algorithm meets transmission requirements with a high probability of 85% for low round trip delay of ≤50 milliseconds. The proposed chaos‐based encryption algorithm exhibits faster speeds with a computational time of 2 to 3 milliseconds, showcasing its lightweight properties ideal for time critical applications.
Original languageEnglish
Article numbere3966
Number of pages13
JournalTransactions on Emerging Telecommunications Technologies
Volume31
Issue number5
Early online date27 Apr 2020
DOIs
Publication statusPublished - May 2020

Keywords

  • connected autonomous vehicles (CAVs)
  • privacy
  • security
  • network attacks
  • 5G

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks'. Together they form a unique fingerprint.

Cite this