Chebyshev Polynomial-Based Fog Computing Scheme Supporting Pseudonym Revocation for 5G-Enabled Vehicular Networks

Al-Mekhlafi, Zeyad and Al-Shareeda, Mahmood and Manickam, Selvakumar and Mohammed, Badiea and Alreshidi, Abdulrahman and Alazmi, Meshari and Alshudukhi, Jalawi Sulaiman and Alsaffar, Mohammad and Alsewari, AbdulRahman (2023) Chebyshev Polynomial-Based Fog Computing Scheme Supporting Pseudonym Revocation for 5G-Enabled Vehicular Networks. Electronics, 12 (4). ISSN 2079-9292

[img]
Preview
Text
electronics-12-00872.pdf - Published Version
Available under License Creative Commons Attribution.

Download (779kB)

Abstract

he privacy and security of the information exchanged between automobiles in 5G-enabled vehicular networks is at risk. Several academics have offered a solution to these problems in the form of an authentication technique that uses an elliptic curve or bilinear pair to sign messages and verify the signature. The problem is that these tasks are lengthy and difficult to execute effectively. Further, the needs for revoking a pseudonym in a vehicular network are not met by these approaches. Thus, this research offers a fog computing strategy for 5G-enabled automotive networks that is based on the Chebyshev polynomial and allows for the revocation of pseudonyms. Our solution eliminates the threat of an insider attack by making use of fog computing. In particular, the fog server does not renew the signature key when the validity period of a pseudonym-ID is about to end. In addition to meeting privacy and security requirements, our proposal is also resistant to a wide range of potential security breaches. Finally, the Chebyshev polynomial is used in our work to sign the message and verify the signature, resulting in a greater performance cost efficiency than would otherwise be possible if an elliptic curve or bilinear pair operation had been employed.

Item Type: Article
Identification Number: https://doi.org/10.3390/electronics12040872
Dates:
DateEvent
7 February 2023Accepted
8 February 2023Published Online
Uncontrolled Keywords: privacy and security, Chebyshev polynomial, insider attacker, fog computing, fog server, fifth generation (5G), vehicular networks, pseudonym revocation
Subjects: CAH11 - computing > CAH11-01 - computing > CAH11-01-01 - computer science
CAH11 - computing > CAH11-01 - computing > CAH11-01-03 - information systems
CAH11 - computing > CAH11-01 - computing > CAH11-01-05 - artificial intelligence
Divisions: Faculty of Computing, Engineering and the Built Environment > School of Computing and Digital Technology
Depositing User: Abdulrahman Alsewari
Date Deposited: 10 Feb 2023 11:33
Last Modified: 10 Feb 2023 11:33
URI: https://www.open-access.bcu.ac.uk/id/eprint/14177

Actions (login required)

View Item View Item

Research

In this section...