Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication

被引:2
|
作者
Al-Mekhlafi, Zeyad Ghaleb [1 ]
Al-Janabi, Hussam Dheaa Kamel [2 ]
Al-Shareeda, Mahmood A. [3 ]
Mohammed, Badiea Abdulkarem [4 ]
Alshudukhi, Jalawi Sulaiman [1 ]
Al-Dhlan, Kawther A. [5 ]
机构
[1] Univ Hail, Dept Informat & Comp Sci, Coll Comp Sci & Engn, Hail, Saudi Arabia
[2] Al Mustafa Univ Coll, Comp Tech Engn, Baghdad, Iraq
[3] Iraq Univ Coll, Dept Commun Engn, Basra, Iraq
[4] Univ Hail, Dept Comp Engn, Coll Comp Sci & Engn, Hail, Saudi Arabia
[5] Univ Hail, Dept Artificial Intelligence & Data Sci, Coll Comp Sci & Engn, Hail, Saudi Arabia
关键词
5G-Helped vehicular communication; Fog computing; Fog computing and blockchain; Certificateless CPPA; 5G-Based vehicular system; AGGREGATE SIGNATURE; EFFICIENT; SECURITY; INTERNET;
D O I
10.1007/s12083-024-01778-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the goal of enhancing traffic flow and decreasing road accidents, fifth-generation (5G)-assisted vehicular fog computing was developed through innovative studies in wireless network connection technologies. But, with such high speeds and open wireless networks built into the system, privacy and security are major issues. To ensure the safety of vehicular fog computing with 5G assistance, it is essential to verify vehicle-to-vehicle traffic communication. Numerous conditional privacy-preserving authentications (CPPA) solutions have been created to safeguard communications connected to traffic in systems. Nevertheless, utilising these CPPA approaches to validate signatures is computationally costly. Elliptic curve cryptography provides authentication and conditional privacy in this certificateless authentication method for 5G-assisted vehicular fog computing, which streamlines the process of verifying vehicle signatures. In contrast, the certificateless CPPA method rapidly authenticates a signature using blockchain technology, eliminating the need for any prior identification or validation of its legitimacy. According to our experiment carried out the AVISPA tool, there are no vulnerabilities in the system that could be exploited by a Doley-Yao threat. In comparison to older approaches, the proposed solution significantly reduces the computational, communication, and energy consumption expenses.
引用
收藏
页码:3703 / 3721
页数:19
相关论文
共 50 条
  • [41] Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
    Al-Mekhlafi, Zeyad Ghaleb
    Lashari, Saima Anwar
    Altmemi, Jalal Mohammed Hachim
    Al-Shareeda, Mahmood A.
    Mohammed, Badiea Abdulkarem
    Sallam, Amer A.
    Al-Qatab, Bassam Ali
    Alshammari, Mohammad T.
    Alayba, Abdulaziz M.
    IEEE ACCESS, 2024, 12 : 100152 - 100166
  • [42] Secure and Efficient Computing Resource Management in Blockchain-Based Vehicular Fog Computing
    Ming Kong
    Junhui Zhao
    Xiaoke Sun
    Yiwen Nie
    中国通信, 2021, 18 (04) : 115 - 125
  • [43] Secure and Efficient Computing Resource Management in Blockchain-Based Vehicular Fog Computing
    Kong, Ming
    Zhao, Junhui
    Sun, Xiaoke
    Nie, Yiwen
    CHINA COMMUNICATIONS, 2021, 18 (04) : 115 - 125
  • [44] Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain
    Umoren, Otuekong
    Singh, Raman
    Pervez, Zeeshan
    Dahal, Keshav
    SENSORS, 2022, 22 (10)
  • [45] Blockchain-Based Secure Authentication with Improved Performance for Fog Computing
    Umoren, Otuekong
    Singh, Raman
    Awan, Shahid
    Pervez, Zeeshan
    Dahal, Keshav
    SENSORS, 2022, 22 (22)
  • [46] EBAS: An Efficient Blockchain-Based Authentication Scheme for Secure Communication in Vehicular Ad Hoc Network
    Feng, Xia
    Cui, Kaiping
    Jiang, Haobin
    Li, Ze
    SYMMETRY-BASEL, 2022, 14 (06):
  • [47] Performance analysis of a fog computing-based vehicular communication
    Kumar M.
    Gupta P.
    Kumar A.
    International Journal of Vehicle Information and Communication Systems, 2024, 9 (02) : 115 - 134
  • [48] Anonymous-authentication scheme based on fog computing for VANET
    Han, Mu
    Liu, Shuai
    Ma, Shidian
    Wan, Ailan
    PLOS ONE, 2020, 15 (02):
  • [49] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [50] A Blockchain-Based Authentication Scheme for 5G-Enabled IoT
    Bidisha Goswami
    Hiten Choudhury
    Journal of Network and Systems Management, 2022, 30