ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing

被引:16
|
作者
Mohammed, Badiea Abdulkarem [1 ]
Al-Shareeda, Mahmood A. [2 ]
Manickam, Selvakumar [2 ]
Al-Mekhlafi, Zeyad Ghaleb [1 ]
Alayba, Abdulaziz M. [1 ]
Sallam, Amer A. [3 ]
机构
[1] Univ Hail, Coll Comp Sci & Engn, Hail 81481, Saudi Arabia
[2] Sains Malaysia Univ, Natl Adv Ctr IPv6 NAv6, George Town 11800, Malaysia
[3] Taiz Univ, Engn & Informat Technol Coll, Taizi 6803, Yemen
关键词
fog computing; vehicular network; authentication and privacy; 5G technology; 5G-enabled vehicular fog computing; SECURE; EFFICIENT;
D O I
10.3390/math11061446
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Vehicular fog computing enabled by the Fifth Generation (5G) has been on the rise recently, providing real-time services among automobiles in the field of smart transportation by improving road traffic safety and enhancing driver comfort. Due to the public nature of wireless communication channels, in which communications are conveyed in plain text, protecting the privacy and security of 5G-enabled vehicular fog computing is of the utmost importance. Several existing works have proposed an anonymous authentication technique to address this issue. However, these techniques have massive performance efficiency issues with authenticating and validating the exchanged messages. To face this problem, we propose a novel anonymous authentication scheme named ANAA-Fog for 5G-enabled vehicular fog computing. Each participating vehicle's temporary secret key for verifying digital signatures is generated by a fog server under the proposed ANAA-Fog scheme. The signing step of the ANAA-Fog scheme is analyzed and proven secure with the use of the ProfVerif simulator. This research also satisfies privacy and security criteria, such as conditional privacy preservation, unlinkability, traceability, revocability, and resistance to security threats, as well as others (e.g., modify attacks, forgery attacks, replay attacks, and man-in-the-middle attacks). Finally, the result of the proposed ANAA-Fog scheme in terms of communication cost and single signature verification is 108 bytes and 2.0185 ms, respectively. Hence, the assessment metrics section demonstrates that our work incurs a little more cost in terms of communication and computing performance when compared to similar studies.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
    Al-Mekhlafi, Zeyad Ghaleb
    Al-Shareeda, Mahmood. A. A.
    Manickam, Selvakumar
    Mohammed, Badiea Abdulkarem
    Alreshidi, Abdulrahman
    Alazmi, Meshari
    Alshudukhi, Jalawi Sulaiman
    Alsaffar, Mohammad
    Rassem, Taha. H. H.
    SENSORS, 2023, 23 (07)
  • [2] COVID-19 Vehicle Based on an Efficient Mutual Authentication Scheme for 5G-Enabled Vehicular Fog Computing
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2022, 19 (23)
  • [3] FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks
    Mohammed, Badiea Abdulkarem
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    Al-Mekhlafi, Zeyad Ghaleb
    Alreshidi, Abdulrahman
    Alazmi, Meshari
    Alshudukhi, Jalawi Sulaiman
    Alsaffar, Mohammad
    IEEE ACCESS, 2023, 11 : 18571 - 18581
  • [4] Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
    Al-Mekhlafi, Zeyad Ghaleb
    Lashari, Saima Anwar
    Altmemi, Jalal Mohammed Hachim
    Al-Shareeda, Mahmood A.
    Mohammed, Badiea Abdulkarem
    Sallam, Amer A.
    Al-Qatab, Bassam Ali
    Alshammari, Mohammad T.
    Alayba, Abdulaziz M.
    IEEE ACCESS, 2024, 12 : 100152 - 100166
  • [5] Consortium Blockchain for Cooperative Location Privacy Preservation in 5G-Enabled Vehicular Fog Computing
    Boualouache, Abdelwahab
    Sedjelmaci, Hichem
    Engel, Thomas
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (07) : 7087 - 7102
  • [6] Chebyshev Polynomial-Based Fog Computing Scheme Supporting Pseudonym Revocation for 5G-Enabled Vehicular Networks
    Al-Mekhlafi, Zeyad Ghaleb
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    Mohammed, Badiea Abdulkarem
    Alreshidi, Abdulrahman
    Alazmi, Meshari
    Alshudukhi, Jalawi Sulaiman
    Alsaffar, Mohammad
    Alsewari, Abdulrahman
    ELECTRONICS, 2023, 12 (04)
  • [7] L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system
    Almazroi, Abdulwahab Ali
    Alqarni, Mohammed A.
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    PLOS ONE, 2023, 18 (10):
  • [8] FC-LSR: Fog Computing-Based Lightweight Sybil Resistant Scheme in 5G-Enabled Vehicular Networks
    Almazroi, Abdulwahab Ali
    Alkinani, Monagi H.
    Al-Shareeda, Mahmood A.
    Alqarni, Mohammed A.
    Almazroey, Alaa Atallah
    Gaber, Tarek
    IEEE ACCESS, 2024, 12 : 30101 - 30112
  • [9] Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications
    Al-Mekhlafi, Zeyad Ghaleb
    Al-Janabi, Hussam Dheaa Kamel
    Khalil, Ayman
    Al-Shareeda, Mahmood A.
    Mohammed, Badiea Abdulkarem
    Alsadhan, Abeer Abdullah
    Alayba, Abdulaziz M.
    Saleh, Ahmed M. Shamsan
    Al-Reshidi, Hamad A.
    Almekhlafi, Khalil
    IEEE ACCESS, 2024, 12 : 71232 - 71247
  • [10] Anonymous-authentication scheme based on fog computing for VANET
    Han, Mu
    Liu, Shuai
    Ma, Shidian
    Wan, Ailan
    PLOS ONE, 2020, 15 (02):