Cargando…

Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing

Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To verify vehicles, however, these conditional privacy-preserving authentication (CPPA) systems required a roadside unit, an expensiv...

Descripción completa

Detalles Bibliográficos
Autores principales: Al-Mekhlafi, Zeyad Ghaleb, Al-Shareeda, Mahmood A., Manickam, Selvakumar, Mohammed, Badiea Abdulkarem, Alreshidi, Abdulrahman, Alazmi, Meshari, Alshudukhi, Jalawi Sulaiman, Alsaffar, Mohammad, Rassem, Taha H.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098888/
https://www.ncbi.nlm.nih.gov/pubmed/37050601
http://dx.doi.org/10.3390/s23073543
_version_ 1785024922180911104
author Al-Mekhlafi, Zeyad Ghaleb
Al-Shareeda, Mahmood A.
Manickam, Selvakumar
Mohammed, Badiea Abdulkarem
Alreshidi, Abdulrahman
Alazmi, Meshari
Alshudukhi, Jalawi Sulaiman
Alsaffar, Mohammad
Rassem, Taha H.
author_facet Al-Mekhlafi, Zeyad Ghaleb
Al-Shareeda, Mahmood A.
Manickam, Selvakumar
Mohammed, Badiea Abdulkarem
Alreshidi, Abdulrahman
Alazmi, Meshari
Alshudukhi, Jalawi Sulaiman
Alsaffar, Mohammad
Rassem, Taha H.
author_sort Al-Mekhlafi, Zeyad Ghaleb
collection PubMed
description Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To verify vehicles, however, these conditional privacy-preserving authentication (CPPA) systems required a roadside unit, an expensive component of vehicular networks. Moreover, these CPPA systems incur exceptionally high communication and processing costs. This study proposes a CPPA method based on fog computing (FC), as a solution for these issues in 5G-enabled vehicle networks. In our proposed FC-CPPA method, a fog server is used to establish a set of public anonymity identities and their corresponding signature keys, which are then preloaded into each authentic vehicle. We guarantee the security of the proposed FC-CPPA method in the context of a random oracle. Our solutions are not only compliant with confidentiality and security standards, but also resistant to a variety of threats. The communication costs of the proposal are only 84 bytes, while the computation costs are [Formula: see text] , [Formula: see text] to sign and verify messages. Comparing our strategy to similar ones reveals that it saves time and money on communication and computing during the performance evaluation phase.
format Online
Article
Text
id pubmed-10098888
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100988882023-04-14 Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing Al-Mekhlafi, Zeyad Ghaleb Al-Shareeda, Mahmood A. Manickam, Selvakumar Mohammed, Badiea Abdulkarem Alreshidi, Abdulrahman Alazmi, Meshari Alshudukhi, Jalawi Sulaiman Alsaffar, Mohammad Rassem, Taha H. Sensors (Basel) Article Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To verify vehicles, however, these conditional privacy-preserving authentication (CPPA) systems required a roadside unit, an expensive component of vehicular networks. Moreover, these CPPA systems incur exceptionally high communication and processing costs. This study proposes a CPPA method based on fog computing (FC), as a solution for these issues in 5G-enabled vehicle networks. In our proposed FC-CPPA method, a fog server is used to establish a set of public anonymity identities and their corresponding signature keys, which are then preloaded into each authentic vehicle. We guarantee the security of the proposed FC-CPPA method in the context of a random oracle. Our solutions are not only compliant with confidentiality and security standards, but also resistant to a variety of threats. The communication costs of the proposal are only 84 bytes, while the computation costs are [Formula: see text] , [Formula: see text] to sign and verify messages. Comparing our strategy to similar ones reveals that it saves time and money on communication and computing during the performance evaluation phase. MDPI 2023-03-28 /pmc/articles/PMC10098888/ /pubmed/37050601 http://dx.doi.org/10.3390/s23073543 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Al-Mekhlafi, Zeyad Ghaleb
Al-Shareeda, Mahmood A.
Manickam, Selvakumar
Mohammed, Badiea Abdulkarem
Alreshidi, Abdulrahman
Alazmi, Meshari
Alshudukhi, Jalawi Sulaiman
Alsaffar, Mohammad
Rassem, Taha H.
Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
title Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
title_full Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
title_fullStr Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
title_full_unstemmed Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
title_short Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
title_sort efficient authentication scheme for 5g-enabled vehicular networks using fog computing
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098888/
https://www.ncbi.nlm.nih.gov/pubmed/37050601
http://dx.doi.org/10.3390/s23073543
work_keys_str_mv AT almekhlafizeyadghaleb efficientauthenticationschemefor5genabledvehicularnetworksusingfogcomputing
AT alshareedamahmooda efficientauthenticationschemefor5genabledvehicularnetworksusingfogcomputing
AT manickamselvakumar efficientauthenticationschemefor5genabledvehicularnetworksusingfogcomputing
AT mohammedbadieaabdulkarem efficientauthenticationschemefor5genabledvehicularnetworksusingfogcomputing
AT alreshidiabdulrahman efficientauthenticationschemefor5genabledvehicularnetworksusingfogcomputing
AT alazmimeshari efficientauthenticationschemefor5genabledvehicularnetworksusingfogcomputing
AT alshudukhijalawisulaiman efficientauthenticationschemefor5genabledvehicularnetworksusingfogcomputing
AT alsaffarmohammad efficientauthenticationschemefor5genabledvehicularnetworksusingfogcomputing
AT rassemtahah efficientauthenticationschemefor5genabledvehicularnetworksusingfogcomputing