Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication

被引:2
|
作者
Al-Mekhlafi, Zeyad Ghaleb [1 ]
Al-Janabi, Hussam Dheaa Kamel [2 ]
Al-Shareeda, Mahmood A. [3 ]
Mohammed, Badiea Abdulkarem [4 ]
Alshudukhi, Jalawi Sulaiman [1 ]
Al-Dhlan, Kawther A. [5 ]
机构
[1] Univ Hail, Dept Informat & Comp Sci, Coll Comp Sci & Engn, Hail, Saudi Arabia
[2] Al Mustafa Univ Coll, Comp Tech Engn, Baghdad, Iraq
[3] Iraq Univ Coll, Dept Commun Engn, Basra, Iraq
[4] Univ Hail, Dept Comp Engn, Coll Comp Sci & Engn, Hail, Saudi Arabia
[5] Univ Hail, Dept Artificial Intelligence & Data Sci, Coll Comp Sci & Engn, Hail, Saudi Arabia
关键词
5G-Helped vehicular communication; Fog computing; Fog computing and blockchain; Certificateless CPPA; 5G-Based vehicular system; AGGREGATE SIGNATURE; EFFICIENT; SECURITY; INTERNET;
D O I
10.1007/s12083-024-01778-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the goal of enhancing traffic flow and decreasing road accidents, fifth-generation (5G)-assisted vehicular fog computing was developed through innovative studies in wireless network connection technologies. But, with such high speeds and open wireless networks built into the system, privacy and security are major issues. To ensure the safety of vehicular fog computing with 5G assistance, it is essential to verify vehicle-to-vehicle traffic communication. Numerous conditional privacy-preserving authentications (CPPA) solutions have been created to safeguard communications connected to traffic in systems. Nevertheless, utilising these CPPA approaches to validate signatures is computationally costly. Elliptic curve cryptography provides authentication and conditional privacy in this certificateless authentication method for 5G-assisted vehicular fog computing, which streamlines the process of verifying vehicle signatures. In contrast, the certificateless CPPA method rapidly authenticates a signature using blockchain technology, eliminating the need for any prior identification or validation of its legitimacy. According to our experiment carried out the AVISPA tool, there are no vulnerabilities in the system that could be exploited by a Doley-Yao threat. In comparison to older approaches, the proposed solution significantly reduces the computational, communication, and energy consumption expenses.
引用
收藏
页码:3703 / 3721
页数:19
相关论文
共 50 条
  • [31] Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
    Tomar, Ashish
    Tripathi, Sachin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 451 - 468
  • [32] Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
    Ashish Tomar
    Sachin Tripathi
    Cluster Computing, 2022, 25 : 451 - 468
  • [33] Consortium Blockchain for Cooperative Location Privacy Preservation in 5G-Enabled Vehicular Fog Computing
    Boualouache, Abdelwahab
    Sedjelmaci, Hichem
    Engel, Thomas
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (07) : 7087 - 7102
  • [34] A Blockchain-Based Authentication Scheme for 5G Applications
    Ren, Lanfang
    Huang, Xiaoting
    Zhou, Huachun
    Yang, Bo
    Su, Li
    MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 155 - 168
  • [35] BPT Scheme: Establishing Trusted Vehicular Fog Computing Service for Rural Area Based on Blockchain Approach
    Dewanta, Favian
    Mambo, Masahiro
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) : 1752 - 1769
  • [36] An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy
    Ogundoyin, Sunday Oyinlola
    Kamil, Ismaila Adeniyi
    VEHICULAR COMMUNICATIONS, 2021, 31
  • [37] L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system
    Almazroi, Abdulwahab Ali
    Alqarni, Mohammed A.
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    PLOS ONE, 2023, 18 (10):
  • [38] A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
    Weng, Chi-Yao
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Deng, Yong-Yuan
    IEEE ACCESS, 2021, 9 : 145522 - 145537
  • [39] Revocable Certificateless Cross-Domain Authentication Scheme Based on PrimarySecondary Blockchain
    Wang, Ze
    Zong, Zhenglin
    Li, Fang
    Sun, Shimin
    Zhao, Ping
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (05): : 5880 - 5891
  • [40] A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
    Dewanta, Favian
    Mambo, Masahiro
    IEEE ACCESS, 2019, 7 : 103095 - 103114