Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
Author:
Al-Mekhlafi Zeyad Ghaleb1ORCID, Al-Shareeda Mahmood A.2ORCID, Manickam Selvakumar2ORCID, Mohammed Badiea Abdulkarem1ORCID, Alreshidi Abdulrahman1ORCID, Alazmi Meshari1ORCID, Alshudukhi Jalawi Sulaiman1ORCID, Alsaffar Mohammad1ORCID, Rassem Taha H.3ORCID
Affiliation:
1. College of Computer Science and Engineering, University of Ha’il, Ha’il 81481, Saudi Arabia 2. National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia 3. School of Computer Science and Informatics, De Montfort University, The Gateway, Leicester LE1 9BH, UK
Abstract
Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To verify vehicles, however, these conditional privacy-preserving authentication (CPPA) systems required a roadside unit, an expensive component of vehicular networks. Moreover, these CPPA systems incur exceptionally high communication and processing costs. This study proposes a CPPA method based on fog computing (FC), as a solution for these issues in 5G-enabled vehicle networks. In our proposed FC-CPPA method, a fog server is used to establish a set of public anonymity identities and their corresponding signature keys, which are then preloaded into each authentic vehicle. We guarantee the security of the proposed FC-CPPA method in the context of a random oracle. Our solutions are not only compliant with confidentiality and security standards, but also resistant to a variety of threats. The communication costs of the proposal are only 84 bytes, while the computation costs are 0.0031, 2.0185 to sign and verify messages. Comparing our strategy to similar ones reveals that it saves time and money on communication and computing during the performance evaluation phase.
Funder
Scientific Research Deanship at the University of Ha’il, Saudi Arabia
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference39 articles.
1. Zhang, J., Jiang, Y., Cui, J., He, D., Bolodurina, I., and Zhong, H. (2022). DBCPA: Dual Blockchain-Assisted Conditional Privacy-Preserving Authentication Framework and Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Mob. Comput., 1–15. 2. Hamdan, M.A., Maklouf, A.M., and Mnif, H. (2022, January 11–13). Review of Authentication with Privacy-preserving Schemes for 5G-enabled Vehicular Networks. Proceedings of the 15th IEEE International Conference on Security of Information and Networks (SIN), Sousse, Tunisia. 3. Al-Mekhlafi, Z.G., Al-Shareeda, M.A., Manickam, S., Mohammed, B.A., and Qtaish, A. (2023). Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks. Mathematics, 11. 4. Zhong, H., Yang, F., Wei, L., Zhang, J., Gu, C., and Cui, J. Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks. Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications. 5. Al-Shareeda, M.A., and Manickam, S. (2022). COVID-19 Vehicle Based on an Efficient Mutual Authentication Scheme for 5G-Enabled Vehicular Fog Computing. Int. J. Environ. Res. Public Health, 19.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|