ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing

被引:16
|
作者
Mohammed, Badiea Abdulkarem [1 ]
Al-Shareeda, Mahmood A. [2 ]
Manickam, Selvakumar [2 ]
Al-Mekhlafi, Zeyad Ghaleb [1 ]
Alayba, Abdulaziz M. [1 ]
Sallam, Amer A. [3 ]
机构
[1] Univ Hail, Coll Comp Sci & Engn, Hail 81481, Saudi Arabia
[2] Sains Malaysia Univ, Natl Adv Ctr IPv6 NAv6, George Town 11800, Malaysia
[3] Taiz Univ, Engn & Informat Technol Coll, Taizi 6803, Yemen
关键词
fog computing; vehicular network; authentication and privacy; 5G technology; 5G-enabled vehicular fog computing; SECURE; EFFICIENT;
D O I
10.3390/math11061446
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Vehicular fog computing enabled by the Fifth Generation (5G) has been on the rise recently, providing real-time services among automobiles in the field of smart transportation by improving road traffic safety and enhancing driver comfort. Due to the public nature of wireless communication channels, in which communications are conveyed in plain text, protecting the privacy and security of 5G-enabled vehicular fog computing is of the utmost importance. Several existing works have proposed an anonymous authentication technique to address this issue. However, these techniques have massive performance efficiency issues with authenticating and validating the exchanged messages. To face this problem, we propose a novel anonymous authentication scheme named ANAA-Fog for 5G-enabled vehicular fog computing. Each participating vehicle's temporary secret key for verifying digital signatures is generated by a fog server under the proposed ANAA-Fog scheme. The signing step of the ANAA-Fog scheme is analyzed and proven secure with the use of the ProfVerif simulator. This research also satisfies privacy and security criteria, such as conditional privacy preservation, unlinkability, traceability, revocability, and resistance to security threats, as well as others (e.g., modify attacks, forgery attacks, replay attacks, and man-in-the-middle attacks). Finally, the result of the proposed ANAA-Fog scheme in terms of communication cost and single signature verification is 108 bytes and 2.0185 ms, respectively. Hence, the assessment metrics section demonstrates that our work incurs a little more cost in terms of communication and computing performance when compared to similar studies.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] A Task Offloading Scheme in Vehicular Fog and Cloud Computing System
    Wu, Qiong
    Ge, Hongmei
    Liu, Hanxu
    Fan, Qiang
    Li, Zhengquan
    Wang, Ziyang
    IEEE ACCESS, 2020, 8 : 1173 - 1184
  • [42] EXPLORING MOBILE EDGE COMPUTING FOR 5G-ENABLED SOFTWARE DEFINED VEHICULAR NETWORKS
    Huang, Xumin
    Yu, Rong
    Kang, Jiawen
    He, Yejun
    Zhang, Yan
    IEEE WIRELESS COMMUNICATIONS, 2017, 24 (06) : 55 - 63
  • [43] Intelligent Data-Enabled Task Offloading for Vehicular Fog Computing
    Alfakeeh, Ahmed S.
    Javed, Muhammad Awais
    APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [44] OCVC: An Overlapping-Enabled Cooperative Vehicular Fog Computing Protocol
    Wei, Zhiwei
    Li, Bing
    Zhang, Rongqing
    Cheng, Xiang
    Yang, Liuqing
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (12) : 7406 - 7419
  • [45] EMERGING TECHNOLOGY FOR 5G-ENABLED VEHICULAR NETWORKS
    Vinel, Alexey
    Breu, Jakob
    Luan, Tom H.
    Hu, Honglin
    IEEE WIRELESS COMMUNICATIONS, 2017, 24 (06) : 12 - 12
  • [46] A blockchain authentication scheme for UAV-aided fog computing
    Du, Xiaoyu
    Tao, Song
    Yuan, Ke
    Li, Yinyin
    Zhou, Yi
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (02) : 1689 - 1702
  • [47] Computation Offloading in NOMA-enabled Vehicular Fog Computing Networks
    Lin, Zhijian
    Lin, Yonghang
    Zhang, Qingsong
    Chen, Pingping
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 6120 - 6125
  • [48] MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture
    Imine, Youcef
    Kouicem, Djamel-eddine
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 608 - 613
  • [49] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [50] Mutual authentication scheme of IoT devices in fog computing environment
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    Cluster Computing, 2021, 24 : 1643 - 1657