EconPapers    
Economics at your fingertips  
 

ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing

Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda (), Selvakumar Manickam (), Zeyad Ghaleb Al-Mekhlafi, Abdulaziz M. Alayba and Amer A. Sallam
Additional contact information
Badiea Abdulkarem Mohammed: College of Computer Science and Engineering, University of Ha’il, Ha’il 81481, Saudi Arabia
Mahmood A. Al-Shareeda: National Advanced IPv6 Centre (NAv6), Sains Malaysia University, Penang 11800, Malaysia
Selvakumar Manickam: National Advanced IPv6 Centre (NAv6), Sains Malaysia University, Penang 11800, Malaysia
Zeyad Ghaleb Al-Mekhlafi: College of Computer Science and Engineering, University of Ha’il, Ha’il 81481, Saudi Arabia
Abdulaziz M. Alayba: College of Computer Science and Engineering, University of Ha’il, Ha’il 81481, Saudi Arabia
Amer A. Sallam: Engineering and Information Technology College, Taiz University, Taiz 6803, Yemen

Mathematics, 2023, vol. 11, issue 6, 1-19

Abstract: Vehicular fog computing enabled by the Fifth Generation (5G) has been on the rise recently, providing real-time services among automobiles in the field of smart transportation by improving road traffic safety and enhancing driver comfort. Due to the public nature of wireless communication channels, in which communications are conveyed in plain text, protecting the privacy and security of 5G-enabled vehicular fog computing is of the utmost importance. Several existing works have proposed an anonymous authentication technique to address this issue. However, these techniques have massive performance efficiency issues with authenticating and validating the exchanged messages. To face this problem, we propose a novel anonymous authentication scheme named ANAA-Fog for 5G-enabled vehicular fog computing. Each participating vehicle’s temporary secret key for verifying digital signatures is generated by a fog server under the proposed ANAA-Fog scheme. The signing step of the ANAA-Fog scheme is analyzed and proven secure with the use of the ProfVerif simulator. This research also satisfies privacy and security criteria, such as conditional privacy preservation, unlinkability, traceability, revocability, and resistance to security threats, as well as others (e.g., modify attacks, forgery attacks, replay attacks, and man-in-the-middle attacks). Finally, the result of the proposed ANAA-Fog scheme in terms of communication cost and single signature verification is 108 bytes and 2.0185 ms, respectively. Hence, the assessment metrics section demonstrates that our work incurs a little more cost in terms of communication and computing performance when compared to similar studies.

Keywords: fog computing; vehicular network; authentication and privacy; 5G technology; 5G-enabled vehicular fog computing (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2023
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/11/6/1446/pdf (application/pdf)
https://www.mdpi.com/2227-7390/11/6/1446/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:11:y:2023:i:6:p:1446-:d:1099427

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:11:y:2023:i:6:p:1446-:d:1099427