FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks
نویسندگان
چکیده
The fifth-generation (5G) technology-enabled vehicular network has been widely used in intelligent transportation recent years. Since messages shared among vehicles are always broadcasted by openness environment’ nature, which is vulnerable to several privacy and security problems. To cope with this issue, researchers have proposed pseudonym authentication schemes for the 5G-enabled network. Nevertheless, these applied complected time-consumed operations. Therefore, paper proposes a fog computing-based (FC-PA) scheme decrease overhead of performance networks. FC-PA applies only one scalar multiplication operation elliptic curve cryptography prove information. A analysis our work explains that satisfies privacy-preserving authentication, resilient against common attacks. With efficiency, can obtain better trade-offs between efficiency than well-known works.
منابع مشابه
Context-based Pseudonym Changing Scheme for Vehicular Adhoc Networks
Vehicular adhoc networks allow vehicles to share their information for safety and traffic efficiency. However, sharing information may threaten the driver privacy because it includes spatiotemporal information and is broadcast publicly and periodically. In this paper, we propose a contextadaptive pseudonym changing scheme which lets a vehicle decide autonomously when to change its pseudonym and...
متن کاملFog Computing in 5G Networks: An Application Perspective
Fifth generation (5G) cellular network promises to offer to its users submillisecond latency and 1 gigabit per second transmission speed. However, the current cloud based computation and data delivery model do not allow these quality of service (QoS) guarantees to be efficiently harnessed, due to the number of hops of wired networks between the 5G base stations and the cloud, that leads to a si...
متن کاملProxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks
generally, authentication in vehicular adhoc net-works (VANETs) used Public Key Infrastructure to check the Message integrity and the of message senders. The problems considered in the authentication schemes are the level of security and computational efficiency in verification processes. Most of existing schemes focus mainly on the security and privacy of VANET information. However, these sche...
متن کاملPrivacy-Enabled Probabilistic Verification in Broadcast Authentication for Vehicular Networks
Vehicular Ad hoc Networks (VANETs) authentication schemes need to consider mobility and rapidly changing topologies in addition to an unreliable wireless channel communication. IEEE 1609.2, VANET security standard, suggests Elliptic Curve Digital Signature Algorithm (ECDSA) for the authentication of Vehicleto-Vehicle (V2V) messages. However, it has the drawback of expensive computations for ver...
متن کاملAn Anonymity Scheme Based on Pseudonym in P2P Networks
One of the fundamental challenges in P2P (Peer to Peer) networks is to protect peers’ identity privacy. Adopting anonymity scheme is a good choice in most of networks such as the Internet, computer and communication networks. In this paper, we proposed an anonymity scheme based on pseudonym in which peers are motivated not to share their identity. Compared with precious anonymous scheme such as...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3247222