Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing

被引:10
作者
Mohammed, Badiea Abdulkarem [1 ]
Al-Shareeda, Mahmood A. [2 ]
Alsadhan, Abeer Abdullah [3 ]
Al-Mekhlafi, Zeyad Ghaleb [4 ]
Sallam, Amer A. [5 ]
Al-Qatab, Bassam Ali [6 ]
Alshammari, Mohammad T. [4 ]
Alayba, Abdulaziz M. [4 ]
机构
[1] Univ Hail, Coll Comp Sci & Engn, Dept Comp Engn, Hail 81481, Saudi Arabia
[2] Iraq Univ Coll, Dept Commun Engn, Basrah 11800, Iraq
[3] Imam Abdulrahman Bin Faisal Univ, Appl Coll, Comp Sci Dept, Dammam 31113, Saudi Arabia
[4] Univ Hail, Coll Comp Sci & Engn, Dept Informat & Comp Sci, Hail 81481, Saudi Arabia
[5] Taiz Univ, Fac Engn & Informat Technol, Comp Networks & Distributed Syst Dept, Taizi, Yemen
[6] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Software Engn, Kuala Lumpur 50603, Malaysia
关键词
Authentication; Security; Servers; Privacy; Edge computing; Blockchains; Computer science; 5G mobile communication; Vehicle dynamics; Advanced driver assistance systems; Blockchain; revocation; fog server; pseudonym authentication; fifth generation(5g); vehicular fog computing; PRIVACY; FRAMEWORK;
D O I
10.1109/ACCESS.2024.3372390
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The driving experience in fifth-generation (5G)-assisted vehicular fog computing systems has improved thanks to recent advancements in intelligent transportation. However, in the present vehicular system setup, the phenomenon of providing low computation overhead with massive serving capability is crucial. In the existing scenario, the computational complexity rises when an authenticated driver travels from one roadside unit (RSU) area to another RSU region and must undergo re-authentication by the existing RSU. In this paper, an efficient blockchain-based pseudonym authentication scheme to address these issues and avoiding using RSU for 5G-assisted vehicular fog computing. The pseudonym identity generated for each vehicles and fog servers in order to exchange information about the road environment. The proposed scheme avoids re-authentication by the future fog server by utilising bilinear pairing of points on the elliptic curve and utilising blockchain technology without the need for a trusted authority. For fog computing, fog server obtains the verification key to authenticate the messages sent from vehicles for supporting revocation. The security analysis part of this work shows that the proposed scheme is not only satisfy requirements of security and privacy, but also resistance security attacks. Finally, the evaluation of the proposed scheme's performance shows that it is more efficient than existing schemes with regards to computation cost, verification speed, and energy consumption.
引用
收藏
页码:33089 / 33099
页数:11
相关论文
共 28 条
[1]   Bilinear Pairing-Based Hybrid Signcryption for Secure Heterogeneous Vehicular Communications [J].
Ali, Ikram ;
Chen, Yong ;
Ullah, Niamat ;
Afzal, Muhammad ;
He, Wen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (06) :5974-5989
[2]   An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs [J].
Ali, Ikram ;
Li, Fagen .
VEHICULAR COMMUNICATIONS, 2020, 22
[3]   Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey [J].
Ali, Ikram ;
Hassan, Alzubair ;
Li, Fagen .
VEHICULAR COMMUNICATIONS, 2019, 16 :45-61
[4]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[5]   MC-Safe: Multi-channel Real-time V2V Communication for Enhancing Driving Safety [J].
Bai, Yunhao ;
Zheng, Kuangyu ;
Wang, Zejiang ;
Wang, Xiaorui ;
Wang, Junmin .
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2020, 4 (04)
[6]   NERA: A new and efficient RSU based authentication scheme for VANETs [J].
Bayat, Majid ;
Pournaghi, Morteza ;
Rahimi, Majid ;
Barmshoory, Mostafa .
WIRELESS NETWORKS, 2020, 26 (05) :3083-3098
[7]   A new and efficient authentication scheme for vehicular ad hoc networks [J].
Bayat, Majid ;
Barmshoory, Mostafa ;
Pournaghi, S. Morteza ;
Rahimi, Majid ;
Farjami, Yaghoub ;
Aref, Mohammad Reza .
JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 24 (02) :171-183
[8]  
crypto.stanford, Pairing-based cryptography library
[9]  
cygwin, Cygwin Linux Environment Emulator for Windows
[10]  
El-Salakawy Gina, 2020, 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), P146, DOI 10.1109/NILES50944.2020.9257890