ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing

被引:30
作者
Almazroi, Abdulwahab Ali [1 ]
Aldhahri, Eman A. A. [2 ]
Al-Shareeda, Mahmood A. A. [3 ]
Manickam, Selvakumar A. [3 ]
机构
[1] Univ Jeddah, Coll Comp & Informat Technol Khulais, Dept Informat Technol, Jeddah, Saudi Arabia
[2] Univ Jeddah, Coll Comp Sci & Engn, Dept Comp Sci & Artificial Intelligence, Jeddah, Saudi Arabia
[3] Univ Sains Malaysia, Natl Adv Ctr IPv6 NAv6, Gelugor, Penang, Malaysia
关键词
SECURITY PROTOCOLS;
D O I
10.1371/journal.pone.0287291
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Fifth-generation (5G)-enabled vehicular fog computing technologies have always been at the forefront of innovation because they support smart transport like the sharing of traffic data and cooperative processing in the urban fabric. Nevertheless, the most important factors limiting progress are concerns over message protection and safety. To cope with these challenges, several scholars have proposed certificateless authentication schemes with pseudonyms and traceability. These schemes avoid complicated management of certificate and escrow of key in the public key infrastructure-based approaches in the identity-based approaches, respectively. Nevertheless, problems such as high communication costs, security holes, and computational complexity still exist. Therefore, this paper proposes an efficient certificateless authentication called the ECA-VFog scheme for fog computing with 5G-assisted vehicular systems. The proposed ECA-VFog scheme applied efficient operations based on elliptic curve cryptography that is supported by a fog server through a 5G-base station. This work conducts a safety analysis of the security designs to analysis the viability and value of the proposed ECA-VFog scheme. In the performance ovulation section, the computation costs for signing and verification process are 2.3539 ms and 1.5752 ms, respectively. While, the communication costs and energy consumption overhead of the ECA-VFog are 124 bytes and 25.610432 mJ, respectively. Moreover, comparing the ECA-VFog scheme to other existing schemes, the performance estimation reveals that it is more cost-effective with regard to computation cost, communication cost, and energy consumption.
引用
收藏
页数:20
相关论文
共 40 条
[11]   A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks [J].
Boualouache, Abdelwahab ;
Engel, Thomas .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (02) :1128-1172
[12]  
Cui J., 2022, IEEE T INTELL TRANSP
[13]   Model-based mutation testing from security protocols in HLPSL [J].
Dadeau, Frederic ;
Heam, Pierre-Cyrille ;
Kheddam, Rafik ;
Maatoug, Ghazi ;
Rusinowitch, Michael .
SOFTWARE TESTING VERIFICATION & RELIABILITY, 2015, 25 (5-7) :684-711
[14]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[15]  
Genc Y., 2022, 2022 30 SIGNAL PROCE, P1
[17]  
Jiang Shuo, 2022, 2022 7th International Conference on Computer and Communication Systems (ICCCS), P530, DOI 10.1109/ICCCS55155.2022.9845923
[18]   An intelligent approach for building a secure decentralized public key infrastructure in VANET [J].
Kumar, Neeraj ;
Iqbal, Rahat ;
Misra, Sudip ;
Rodrigues, Joel J. P. C. .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (06) :1042-1058
[19]  
Liang Y., 2022, IEEE SYST J, DOI [10.1109/JSYST.2022.3180221, DOI 10.1109/JSYST.2022.3180221]
[20]   PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs [J].
Liu, Xiaoxue ;
Wang, Yichuan ;
Li, Yanping ;
Cao, Hao .
COMPUTER NETWORKS, 2023, 226