Abstract:Existing conditional privacy-preserving authentication schemes utilized in Vehicular Ad-hoc Networks (VANETs) to satisfy security and privacy requirements essentially depend on point multiplication operations. Achieving repaid verification method of the message is commonly suffer performance efficiency from resulting overheads. We propose a conditional privacy-preserving authentication scheme to secure communication and perform better performance efficiency in this paper. The proposed scheme only depends on an… Show more
“…To avoid using time-consuming operations associated with bilinear pair and Point-to-Map hashing function, He et al [40] constructed an IDfounded system applying lightweight operations associated with ECC for message signature verification. Additionally, several researchers [41][42][43][44][45][46][47] have proposed an authentication schemes based on ECC. Al-Shareeda et al [45] use ECC without the road-side unit (RSU) to secure communications among vehicles in a 5G-enabled vehicular network.…”
The role that vehicular fog computing based on the Fifth Generation (5G) can play in improving traffic management and motorist safety is growing quickly. The use of wireless technology within a vehicle raises issues of confidentiality and safety. Such concerns are optimal targets for conditional privacy-preserving authentication (CPPA) methods. However, current CPPA-based systems face a challenge when subjected to attacks from quantum computers. Because of the need for security and anti-piracy features in fog computing when using a 5G-enabled vehicle system, the L-CPPA scheme is proposed in this article. Using a fog server, secret keys are generated and transmitted to each registered car via a 5G-Base Station (5G-BS) in the proposed L-CPPA system. In the proposed L-CPPA method, the trusted authority, rather than the vehicle’s Onboard Unit (OBU), stores the vehicle’s master secret data to each fog server. Finally, the computation cost of the suggested L-CPPA system regards message signing, single verification and batch verification is 694.161 ms, 60.118 ms, and 1348.218 ms, respectively. Meanwhile, the communication cost is 7757 bytes.
“…To avoid using time-consuming operations associated with bilinear pair and Point-to-Map hashing function, He et al [40] constructed an IDfounded system applying lightweight operations associated with ECC for message signature verification. Additionally, several researchers [41][42][43][44][45][46][47] have proposed an authentication schemes based on ECC. Al-Shareeda et al [45] use ECC without the road-side unit (RSU) to secure communications among vehicles in a 5G-enabled vehicular network.…”
The role that vehicular fog computing based on the Fifth Generation (5G) can play in improving traffic management and motorist safety is growing quickly. The use of wireless technology within a vehicle raises issues of confidentiality and safety. Such concerns are optimal targets for conditional privacy-preserving authentication (CPPA) methods. However, current CPPA-based systems face a challenge when subjected to attacks from quantum computers. Because of the need for security and anti-piracy features in fog computing when using a 5G-enabled vehicle system, the L-CPPA scheme is proposed in this article. Using a fog server, secret keys are generated and transmitted to each registered car via a 5G-Base Station (5G-BS) in the proposed L-CPPA system. In the proposed L-CPPA method, the trusted authority, rather than the vehicle’s Onboard Unit (OBU), stores the vehicle’s master secret data to each fog server. Finally, the computation cost of the suggested L-CPPA system regards message signing, single verification and batch verification is 694.161 ms, 60.118 ms, and 1348.218 ms, respectively. Meanwhile, the communication cost is 7757 bytes.
“…Accidents, traffic flow, the quickest routes, alternate routes, petrol stations, motels, and hospitals are all examples of critical information that is transmitted for safety and general needs (Lin et al, 2022;Alshudukhi et al, 2020). Routing is very critical and essential in VANET (Table 2) for vehicles to communicate with one another and RSUs.…”
The vehicle manufacturing hub has evolved over the last decade with the emergence of self-driving vehicles and human-driven vehicles that use the concept of Artificial Intelligence (AI). Vehicular Ad Hoc Network (VANET) is a subset of Mobile Ad Hoc Network (MANET) that allows vehicles to communicate with one another and the Road Side Unit (RSU). VANET has been a game changer with features such as accident prevention, real-time traffic, route predictions, discovering an alternate route, alert notifications, safety, and security. VANET systems are distinguished by their ability to transmit critical safety information in real-time, even when the network's topology is constantly changing. With the lifesaving features of VANET comes a disadvantage that can risk the drivers' security and privacy through various attacks on the network. Intruders can steal data, drop data packets and modify, insert, or delete data when it is transmitted between vehicles. To address the mentioned data communication issues as well as various attacks in the VANET network, the authors propose an Intrusion Detection System (IDS) Rushing Attack Intrusion Detection (RAID), a novel framework that performs the detection of rushing attacks in vehicular networks. According to the performance analysis, the proposed framework RAID meets a wide range of security requirements while requiring less communication and storage. The study's findings were found to be more efficient.
“…Existing schemes in the fourth group aim to minimize the system costs of the ID-based BP approach by utilizing an identity (ID) approach based on elliptic curve cryptography (ECC) [31][32][33][34][35][36][37], which are more efficient.…”
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs) to store the system’s master key. However, it only takes a single compromised TPD to render the whole system insecure. We propose a password-guessing attack-aware authentication scheme based on the Chinese Remainder Theorem (CRT) to secure inter-vehicle communication on 5G-enabled vehicular networks to address this issue. The trusted authorities (TAs) in the proposed scheme generate and broadcast new group keys to the vehicles assisted by CRT. Moreover, since the system’s master key does not need to be preloaded, the proposed scheme only requires realistic TPDs. The proposed scheme overcomes password-guessing attacks and guarantees top-level security for entire 5G-enabled vehicular networks. The security analysis indicates that the proposed scheme is secure against adaptive chosen-message attacks under the random oracle model and meets the security requirements of a 5G-enabled vehicular network. Since cryptographic operations based on elliptic curve cryptography are employed, the performance evaluation shows that the proposed scheme outperforms the eight existing schemes in terms of computation and communication costs.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.