Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing.

Autor: Al-Mekhlafi ZG; College of Computer Science and Engineering, University of Ha'il, Ha'il 81481, Saudi Arabia., Al-Shareeda MA; National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia., Manickam S; National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia., Mohammed BA; College of Computer Science and Engineering, University of Ha'il, Ha'il 81481, Saudi Arabia., Alreshidi A; College of Computer Science and Engineering, University of Ha'il, Ha'il 81481, Saudi Arabia., Alazmi M; College of Computer Science and Engineering, University of Ha'il, Ha'il 81481, Saudi Arabia., Alshudukhi JS; College of Computer Science and Engineering, University of Ha'il, Ha'il 81481, Saudi Arabia., Alsaffar M; College of Computer Science and Engineering, University of Ha'il, Ha'il 81481, Saudi Arabia., Rassem TH; School of Computer Science and Informatics, De Montfort University, The Gateway, Leicester LE1 9BH, UK.
Jazyk: angličtina
Zdroj: Sensors (Basel, Switzerland) [Sensors (Basel)] 2023 Mar 28; Vol. 23 (7). Date of Electronic Publication: 2023 Mar 28.
DOI: 10.3390/s23073543
Abstrakt: Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To verify vehicles, however, these conditional privacy-preserving authentication (CPPA) systems required a roadside unit, an expensive component of vehicular networks. Moreover, these CPPA systems incur exceptionally high communication and processing costs. This study proposes a CPPA method based on fog computing (FC), as a solution for these issues in 5G-enabled vehicle networks. In our proposed FC-CPPA method, a fog server is used to establish a set of public anonymity identities and their corresponding signature keys, which are then preloaded into each authentic vehicle. We guarantee the security of the proposed FC-CPPA method in the context of a random oracle. Our solutions are not only compliant with confidentiality and security standards, but also resistant to a variety of threats. The communication costs of the proposal are only 84 bytes, while the computation costs are 0.0031, 2.0185 to sign and verify messages. Comparing our strategy to similar ones reveals that it saves time and money on communication and computing during the performance evaluation phase.
Databáze: MEDLINE
Nepřihlášeným uživatelům se plný text nezobrazuje