Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication

IF 3.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Peer-To-Peer Networking and Applications Pub Date : 2024-08-31 DOI:10.1007/s12083-024-01778-9
Zeyad Ghaleb Al-Mekhlafi, Hussam Dheaa Kamel Al-Janabi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Jalawi Sulaiman Alshudukhi, Kawther A. Al-Dhlan
{"title":"Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication","authors":"Zeyad Ghaleb Al-Mekhlafi, Hussam Dheaa Kamel Al-Janabi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Jalawi Sulaiman Alshudukhi, Kawther A. Al-Dhlan","doi":"10.1007/s12083-024-01778-9","DOIUrl":null,"url":null,"abstract":"<p>With the goal of enhancing traffic flow and decreasing road accidents, fifth-generation (5G)-assisted vehicular fog computing was developed through innovative studies in wireless network connection technologies. But, with such high speeds and open wireless networks built into the system, privacy and security are major issues. To ensure the safety of vehicular fog computing with 5G assistance, it is essential to verify vehicle-to-vehicle traffic communication. Numerous conditional privacy-preserving authentications (CPPA) solutions have been created to safeguard communications connected to traffic in systems. Nevertheless, utilising these CPPA approaches to validate signatures is computationally costly. Elliptic curve cryptography provides authentication and conditional privacy in this certificateless authentication method for 5G-assisted vehicular fog computing, which streamlines the process of verifying vehicle signatures. In contrast, the certificateless CPPA method rapidly authenticates a signature using blockchain technology, eliminating the need for any prior identification or validation of its legitimacy. According to our experiment carried out the AVISPA tool, there are no vulnerabilities in the system that could be exploited by a Doley-Yao threat. In comparison to older approaches, the proposed solution significantly reduces the computational, communication, and energy consumption expenses.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"19 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01778-9","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

With the goal of enhancing traffic flow and decreasing road accidents, fifth-generation (5G)-assisted vehicular fog computing was developed through innovative studies in wireless network connection technologies. But, with such high speeds and open wireless networks built into the system, privacy and security are major issues. To ensure the safety of vehicular fog computing with 5G assistance, it is essential to verify vehicle-to-vehicle traffic communication. Numerous conditional privacy-preserving authentications (CPPA) solutions have been created to safeguard communications connected to traffic in systems. Nevertheless, utilising these CPPA approaches to validate signatures is computationally costly. Elliptic curve cryptography provides authentication and conditional privacy in this certificateless authentication method for 5G-assisted vehicular fog computing, which streamlines the process of verifying vehicle signatures. In contrast, the certificateless CPPA method rapidly authenticates a signature using blockchain technology, eliminating the need for any prior identification or validation of its legitimacy. According to our experiment carried out the AVISPA tool, there are no vulnerabilities in the system that could be exploited by a Doley-Yao threat. In comparison to older approaches, the proposed solution significantly reduces the computational, communication, and energy consumption expenses.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
5G 辅助车载通信中基于雾计算和区块链技术的无证书认证方案
第五代(5G)辅助车载雾计算以提高交通流量和减少道路事故为目标,通过对无线网络连接技术的创新研究而发展起来。但是,由于系统具有如此高的速度和开放的无线网络,隐私和安全成为主要问题。为了确保 5G 辅助车载雾计算的安全性,必须验证车对车交通通信。为了保护与系统中的交通连接的通信,人们创造了许多有条件的隐私保护认证(CPPA)解决方案。然而,利用这些 CPPA 方法验证签名的计算成本很高。椭圆曲线加密技术为 5G 辅助车载雾计算的无证书认证方法提供了认证和条件隐私,简化了验证车辆签名的过程。相比之下,无证书 CPPA 方法利用区块链技术快速验证签名,无需事先对其合法性进行任何识别或验证。根据我们使用 AVISPA 工具进行的实验,系统中不存在可被 Doley-Yao 威胁利用的漏洞。与旧方法相比,所提出的解决方案大大减少了计算、通信和能源消耗。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Peer-To-Peer Networking and Applications
Peer-To-Peer Networking and Applications COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
8.00
自引率
7.10%
发文量
145
审稿时长
12 months
期刊介绍: The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security. The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain. Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.
期刊最新文献
Are neck pain, disability, and deep neck flexor performance the same for the different types of temporomandibular disorders? Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach Towards real-time non-preemptive multicast scheduling in reconfigurable data center networks Homomorphic multi-party computation for Internet of Medical Things BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1