ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing
نویسندگان
چکیده
Vehicular fog computing enabled by the Fifth Generation (5G) has been on rise recently, providing real-time services among automobiles in field of smart transportation improving road traffic safety and enhancing driver comfort. Due to public nature wireless communication channels, which communications are conveyed plain text, protecting privacy security 5G-enabled vehicular is utmost importance. Several existing works have proposed an anonymous authentication technique address this issue. However, these techniques massive performance efficiency issues with authenticating validating exchanged messages. To face problem, we propose a novel scheme named ANAA-Fog for computing. Each participating vehicle’s temporary secret key verifying digital signatures generated server under scheme. The signing step analyzed proven secure use ProfVerif simulator. This research also satisfies criteria, such as conditional preservation, unlinkability, traceability, revocability, resistance threats, well others (e.g., modify attacks, forgery replay man-in-the-middle attacks). Finally, result terms cost single signature verification 108 bytes 2.0185 ms, respectively. Hence, assessment metrics section demonstrates that our work incurs little more when compared similar studies.
منابع مشابه
Task Scheduling in Fog Computing: A Survey
Recently, fog computing has been introducedto solve the challenges of cloud computing regarding Internet objects. One of the challenges in the field of fog computing is the scheduling of tasks requested by Internet objects. In this study, a review of articles related to task scheduling in fog computing has been done. At first, the research questions and goals will be introduced, an...
متن کاملA Pmipv6-Fog Scheme for Vehicular Mobility Support
Vehicular Ad-hoc Networks (VANETs) and the rapid development of communicationand computation technologies are one of the main next generation wireless networks which are envisaged to be an integration of homogeneous and heterogeneous wireless networks. Although VANETs are deployed in reality offering several services, a seamless handover mechanism with negligible handover delay is required to m...
متن کاملOctopus: An Edge-fog Mutual Authentication Scheme
Authentication is an important and challenging issue for the security of Fog computing since, services are offered to massive-scale end users (Fog users or Edge) by front Fog servers (or Fog nodes). In this paper, we propose a secure and efficient mutual authentication scheme for the EdgeFog-Cloud network architecture, to mutually authenticate Fog users at the Edge of the network, with the Fog ...
متن کاملSecurity Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملFog Computing in 5G Networks: An Application Perspective
Fifth generation (5G) cellular network promises to offer to its users submillisecond latency and 1 gigabit per second transmission speed. However, the current cloud based computation and data delivery model do not allow these quality of service (QoS) guarantees to be efficiently harnessed, due to the number of hops of wired networks between the 5G base stations and the cloud, that leads to a si...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2023
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math11061446