FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network

Emerging technology known as intelligent transportation systems allows for seamless two-way communication between moving vehicles and stationary infrastructure. Therefore, core security services in a vehicular network consist of encrypting and trusting information packets for intra- and inter-vehicl...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Internet of things (Amsterdam. Online) 2024-04, Vol.25, p.101096, Article 101096
Hauptverfasser: Almazroi, Abdulwahab Ali, Alqarni, Mohammed A., Al-Shareeda, Mahmood A., Alkinani, Monagi H., Almazroey, Alaa Atallah, Gaber, Tarek
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Emerging technology known as intelligent transportation systems allows for seamless two-way communication between moving vehicles and stationary infrastructure. Therefore, core security services in a vehicular network consist of encrypting and trusting information packets for intra- and inter-vehicle systems. However, conventional reconciliation methods incur high communication costs and security risks, and channel imperfection causes important extraction disparities. For a 5G-enabled vehicular blockchain network, we suggested a novel fog computing-based authentication approach for the 5G-assisted vehicular blockchain network (FCA-VBN) scheme, which incorporated fog computing and secure authentication to address these issues. The FCA-VBN scheme employs a channel stage response instituted private key extraction technique for terminal key agreement. Using the blockchain’s immutability and memorability, the novelty of this paper is that it shows how the intelligent contract could be utilized to build and issue the link among the fog server and the node’s data through a transaction. When it comes to message authenticity and integrity, conditional privacy protection, and unlinkability, we demonstrated that the proposed FCA-VBN system is safe and secure. We also spoke about how resistant the method is to various assaults. Ultimately, we theoretically analyzed the suggested FCA-VBN scheme’s achievement on a wide range of metrics, such as computation and communication costs and power usage, to arrive at a comprehensive evaluation.
ISSN:2542-6605
2542-6605
DOI:10.1016/j.iot.2024.101096