54
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing

      research-article

      Read this article at

      ScienceOpenPublisherPMC
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Fifth-generation (5G)-enabled vehicular fog computing technologies have always been at the forefront of innovation because they support smart transport like the sharing of traffic data and cooperative processing in the urban fabric. Nevertheless, the most important factors limiting progress are concerns over message protection and safety. To cope with these challenges, several scholars have proposed certificateless authentication schemes with pseudonyms and traceability. These schemes avoid complicated management of certificate and escrow of key in the public key infrastructure-based approaches in the identity-based approaches, respectively. Nevertheless, problems such as high communication costs, security holes, and computational complexity still exist. Therefore, this paper proposes an efficient certificateless authentication called the ECA-VFog scheme for fog computing with 5G-assisted vehicular systems. The proposed ECA-VFog scheme applied efficient operations based on elliptic curve cryptography that is supported by a fog server through a 5G-base station. This work conducts a safety analysis of the security designs to analysis the viability and value of the proposed ECA-VFog scheme. In the performance ovulation section, the computation costs for signing and verification process are 2.3539 ms and 1.5752 ms, respectively. While, the communication costs and energy consumption overhead of the ECA-VFog are 124 bytes and 25.610432 mJ, respectively. Moreover, comparing the ECA-VFog scheme to other existing schemes, the performance estimation reveals that it is more cost-effective with regard to computation cost, communication cost, and energy consumption.

          Related collections

          Most cited references31

          • Record: found
          • Abstract: not found
          • Article: not found

          On the security of public key protocols

          D Dolev, A. Yao (1983)
            • Record: found
            • Abstract: not found
            • Article: not found
            Is Open Access

            Automated Security Protocol Analysis With the AVISPA Tool

              • Record: found
              • Abstract: not found
              • Article: not found

              Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review

                Author and article information

                Contributors
                Role: Formal analysisRole: Funding acquisitionRole: Resources
                Role: Formal analysisRole: Funding acquisitionRole: SoftwareRole: Visualization
                Role: ConceptualizationRole: Project administrationRole: Writing – original draftRole: Writing – review & editing
                Role: Funding acquisitionRole: ResourcesRole: Software
                Role: Editor
                Journal
                PLoS One
                PLoS One
                plos
                PLOS ONE
                Public Library of Science (San Francisco, CA USA )
                1932-6203
                2023
                23 June 2023
                : 18
                : 6
                : e0287291
                Affiliations
                [1 ] Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah, Saudi Arabia
                [2 ] Department of Computer Science and Artificial Intelligence, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia
                [3 ] National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor, Penang, Malaysia
                Birmingham City University, Faculty of Computing, Engineering and the Built Environment, UNITED KINGDOM
                Author notes

                Competing Interests: The authors have declared that no competing interests exist.

                Author information
                https://orcid.org/0000-0002-2358-3785
                Article
                PONE-D-23-13861
                10.1371/journal.pone.0287291
                10289398
                37352258
                3cab1716-7ce7-4ace-a1f1-b0c4c16abf11
                © 2023 Almazroi et al

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

                History
                : 6 May 2023
                : 3 June 2023
                Page count
                Figures: 7, Tables: 3, Pages: 20
                Funding
                Funded by: Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia
                Award ID: MoE-IF-UJ-22-04100409-3
                Award Recipient :
                The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through project number MoE-IF-UJ-22-04100409-3.
                Categories
                Research Article
                Computer and Information Sciences
                Cryptography
                Physical Sciences
                Mathematics
                Cryptography
                Physical Sciences
                Mathematics
                Algebra
                Algebraic Geometry
                Computer and Information Sciences
                Computer Security
                Engineering and Technology
                Civil Engineering
                Transportation Infrastructure
                Roads
                Engineering and Technology
                Transportation
                Transportation Infrastructure
                Roads
                Engineering and Technology
                Civil Engineering
                Urban Infrastructure
                Computer and Information Sciences
                Computer Networks
                Internet
                Computer and Information Sciences
                Computer Networks
                Engineering and Technology
                Transportation
                Custom metadata
                All relevant data are within the paper.

                Uncategorized
                Uncategorized

                Comments

                Comment on this article

                Related Documents Log