ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing

被引:16
|
作者
Mohammed, Badiea Abdulkarem [1 ]
Al-Shareeda, Mahmood A. [2 ]
Manickam, Selvakumar [2 ]
Al-Mekhlafi, Zeyad Ghaleb [1 ]
Alayba, Abdulaziz M. [1 ]
Sallam, Amer A. [3 ]
机构
[1] Univ Hail, Coll Comp Sci & Engn, Hail 81481, Saudi Arabia
[2] Sains Malaysia Univ, Natl Adv Ctr IPv6 NAv6, George Town 11800, Malaysia
[3] Taiz Univ, Engn & Informat Technol Coll, Taizi 6803, Yemen
关键词
fog computing; vehicular network; authentication and privacy; 5G technology; 5G-enabled vehicular fog computing; SECURE; EFFICIENT;
D O I
10.3390/math11061446
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Vehicular fog computing enabled by the Fifth Generation (5G) has been on the rise recently, providing real-time services among automobiles in the field of smart transportation by improving road traffic safety and enhancing driver comfort. Due to the public nature of wireless communication channels, in which communications are conveyed in plain text, protecting the privacy and security of 5G-enabled vehicular fog computing is of the utmost importance. Several existing works have proposed an anonymous authentication technique to address this issue. However, these techniques have massive performance efficiency issues with authenticating and validating the exchanged messages. To face this problem, we propose a novel anonymous authentication scheme named ANAA-Fog for 5G-enabled vehicular fog computing. Each participating vehicle's temporary secret key for verifying digital signatures is generated by a fog server under the proposed ANAA-Fog scheme. The signing step of the ANAA-Fog scheme is analyzed and proven secure with the use of the ProfVerif simulator. This research also satisfies privacy and security criteria, such as conditional privacy preservation, unlinkability, traceability, revocability, and resistance to security threats, as well as others (e.g., modify attacks, forgery attacks, replay attacks, and man-in-the-middle attacks). Finally, the result of the proposed ANAA-Fog scheme in terms of communication cost and single signature verification is 108 bytes and 2.0185 ms, respectively. Hence, the assessment metrics section demonstrates that our work incurs a little more cost in terms of communication and computing performance when compared to similar studies.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Fog Computing for 5G-Enabled Tactile Internet: Research Issues, Challenges, and Future Research Directions
    Aggarwal, Shubhani
    Kumar, Neeraj
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (02): : 690 - 717
  • [22] Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing
    Mohammed, Badiea Abdulkarem
    Al-Shareeda, Mahmood A.
    Alsadhan, Abeer Abdullah
    Al-Mekhlafi, Zeyad Ghaleb
    Sallam, Amer A.
    Al-Qatab, Bassam Ali
    Alshammari, Mohammad T.
    Alayba, Abdulaziz M.
    IEEE ACCESS, 2024, 12 : 33089 - 33099
  • [23] FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network
    Almazroi, Abdulwahab Ali
    Alqarni, Mohammed A.
    Al-Shareeda, Mahmood A.
    Alkinani, Monagi H.
    Almazroey, Alaa Atallah
    Gaber, Tarek
    INTERNET OF THINGS, 2024, 25
  • [24] D-BlockAuth: An Authentication Scheme-Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing
    Al-Janabi, Hussam Dheaa Kamel
    Lashari, Saima Anwar
    Al-Shareeda, Mahmood A.
    Khalil, Ayman
    Alsadhan, Abeer Abdullah
    Almaiah, Mohammed Amin
    Alkhdour, Tayseer
    IEEE ACCESS, 2024, 12 : 99321 - 99332
  • [25] Mutual Authentication Security Scheme in Fog Computing
    Rahman, Gohar
    Wen, Chuah Chai
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 443 - 451
  • [26] A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
    Dewanta, Favian
    Mambo, Masahiro
    IEEE ACCESS, 2019, 7 : 103095 - 103114
  • [27] A Blockchain-Based Authentication Scheme for 5G-Enabled IoT
    Goswami, Bidisha
    Choudhury, Hiten
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (04)
  • [28] A Secure Batch Authentication Scheme for Multiaccess Edge Computing in 5G-Enabled Intelligent Transportation System
    Kim, Myeonghyun
    Lee, Joonyoung
    Oh, Jihyeon
    Kwon, Deokkyu
    Park, Kisung
    Park, Youngho
    Park, Kil Houm
    IEEE ACCESS, 2022, 10 : 96224 - 96238
  • [29] Foud: Integrating Fog and Cloud for 5G-Enabled V2G Networks
    Tao, Ming
    Ota, Kaoru
    Dong, Mianxiong
    IEEE NETWORK, 2017, 31 (02): : 8 - 13
  • [30] A Blockchain-Based Authentication Scheme for 5G-Enabled IoT
    Bidisha Goswami
    Hiten Choudhury
    Journal of Network and Systems Management, 2022, 30