FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks

نویسندگان

چکیده

The fifth-generation (5G) technology-enabled vehicular network has been widely used in intelligent transportation recent years. Since messages shared among vehicles are always broadcasted by openness environment’ nature, which is vulnerable to several privacy and security problems. To cope with this issue, researchers have proposed pseudonym authentication schemes for the 5G-enabled network. Nevertheless, these applied complected time-consumed operations. Therefore, paper proposes a fog computing-based (FC-PA) scheme decrease overhead of performance networks. FC-PA applies only one scalar multiplication operation elliptic curve cryptography prove information. A analysis our work explains that satisfies privacy-preserving authentication, resilient against common attacks. With efficiency, can obtain better trade-offs between efficiency than well-known works.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Context-based Pseudonym Changing Scheme for Vehicular Adhoc Networks

Vehicular adhoc networks allow vehicles to share their information for safety and traffic efficiency. However, sharing information may threaten the driver privacy because it includes spatiotemporal information and is broadcast publicly and periodically. In this paper, we propose a contextadaptive pseudonym changing scheme which lets a vehicle decide autonomously when to change its pseudonym and...

متن کامل

Fog Computing in 5G Networks: An Application Perspective

Fifth generation (5G) cellular network promises to offer to its users submillisecond latency and 1 gigabit per second transmission speed. However, the current cloud based computation and data delivery model do not allow these quality of service (QoS) guarantees to be efficiently harnessed, due to the number of hops of wired networks between the 5G base stations and the cloud, that leads to a si...

متن کامل

Proxy Based Authentication Scheme Using Distributed Computing in Vehicular Ad Hoc Networks

generally, authentication in vehicular adhoc net-works (VANETs) used Public Key Infrastructure to check the Message integrity and the of message senders. The problems considered in the authentication schemes are the level of security and computational efficiency in verification processes. Most of existing schemes focus mainly on the security and privacy of VANET information. However, these sche...

متن کامل

Privacy-Enabled Probabilistic Verification in Broadcast Authentication for Vehicular Networks

Vehicular Ad hoc Networks (VANETs) authentication schemes need to consider mobility and rapidly changing topologies in addition to an unreliable wireless channel communication. IEEE 1609.2, VANET security standard, suggests Elliptic Curve Digital Signature Algorithm (ECDSA) for the authentication of Vehicleto-Vehicle (V2V) messages. However, it has the drawback of expensive computations for ver...

متن کامل

An Anonymity Scheme Based on Pseudonym in P2P Networks

One of the fundamental challenges in P2P (Peer to Peer) networks is to protect peers’ identity privacy. Adopting anonymity scheme is a good choice in most of networks such as the Internet, computer and communication networks. In this paper, we proposed an anonymity scheme based on pseudonym in which peers are motivated not to share their identity. Compared with precious anonymous scheme such as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3247222