Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing

The driving experience in fifth-generation (5G)-assisted vehicular fog computing systems has improved thanks to recent advancements in intelligent transportation. However, in the present vehicular system setup, the phenomenon of providing low computation overhead with massive serving capability is c...

全面介绍

Saved in:
书目详细资料
Main Authors: Mohammed, Badiea Abdulkarem, Al-Shareeda, Mahmood A., Alsadhan, Abeer Abdullah, Al-Mekhlafi, Zeyad Ghaleb, Sallam, Amer A., Al-Qatab, Bassam Ali, Alshammari, Mohammad T., Alayba, Abdulaziz M.
格式: Article
出版: Institute of Electrical and Electronics Engineers 2024
主题:
在线阅读:http://eprints.um.edu.my/45882/
https://doi.org/10.1109/ACCESS.2024.3372390
标签: 添加标签
没有标签, 成为第一个标记此记录!
实物特征
总结:The driving experience in fifth-generation (5G)-assisted vehicular fog computing systems has improved thanks to recent advancements in intelligent transportation. However, in the present vehicular system setup, the phenomenon of providing low computation overhead with massive serving capability is crucial. In the existing scenario, the computational complexity rises when an authenticated driver travels from one roadside unit (RSU) area to another RSU region and must undergo re-authentication by the existing RSU. In this paper, an efficient blockchain-based pseudonym authentication scheme to address these issues and avoiding using RSU for 5G-assisted vehicular fog computing. The pseudonym identity generated for each vehicles and fog servers in order to exchange information about the road environment. The proposed scheme avoids re-authentication by the future fog server by utilising bilinear pairing of points on the elliptic curve and utilising blockchain technology without the need for a trusted authority. For fog computing, fog server obtains the verification key to authenticate the messages sent from vehicles for supporting revocation. The security analysis part of this work shows that the proposed scheme is not only satisfy requirements of security and privacy, but also resistance security attacks. Finally, the evaluation of the proposed scheme's performance shows that it is more efficient than existing schemes with regards to computation cost, verification speed, and energy consumption.