An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET

被引:0
|
作者
S.A.SOLEYMANI [1 ]
M.H.ANISI [2 ]
A.Hanan ABDULLAH [1 ]
M.Asri NGADI [1 ]
Sh.GOUDARZI [3 ]
M.Khurram KHAN [4 ]
M.Nazri KAMA [5 ]
机构
[1] School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia (UTM)
[2] School of Computer Science and Electronic Engineering, University of Essex
[3] Centre of Artificial Intelligence, National University of Malaysia (UKM)
[4] Center of Excellence in Information Assurance (CoEIA), King Saud University
[5] Advanced Informatics School, Menara Razak, Universiti Teknologi Malaysia (UTM)
关键词
D O I
暂无
中图分类号
TN929.5 [移动通信]; U463.6 [电气设备及附件];
学科分类号
080204 ; 080402 ; 080904 ; 0810 ; 081001 ; 082304 ;
摘要
The exchange of correct and reliable data among legitimate nodes is one of the most important challenges in vehicular ad hoc networks(VANETs). Malicious nodes and obstacles, by generating inaccurate information, have a negative impact on the security of 5G-VANET. The big data generated in the vehicular network is also an issue in the security of VANET. To this end, a security model based on authentication and plausibility is proposed to improve the safety of network named ‘AFPM’. In the first layer, an authentication mechanism using edge nodes along with 5G is proposed to deal with the illegitimate nodes who enter the network and broadcast wrong information. In the authentication mechanism, because of the growth of the connected vehicles to the edge nodes that lead to generating big data and hence the inappropriateness of the traditional data structures, cuckoo filter, as a space-efficient probabilistic data structure, is used. In the second layer, a plausibility model by performing fuzzy logic is presented to cope with inaccurate information. The plausibility model is based on detection of inconsistent data involved in the event message. The plausibility model not only tackles with inaccurate, incomplete, and inaccuracy data but also deals with misbehaviour nodes under both line-of-sight(LOS) and non-line-of-sight(NLOS) conditions. All obtained results are validated through well-known evaluation measures such as F-measure and communication overhead. The results presented in this paper demonstrate that the proposed security model possesses a better performance in comparison with the existing studies.
引用
收藏
页码:67 / 83
页数:17
相关论文
共 13 条
  • [1] An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET
    S. A. Soleymani
    M. H. Anisi
    A. Hanan Abdullah
    M. Asri Ngadi
    Sh. Goudarzi
    M. Khurram Khan
    M. Nazri Kama
    [J]. Science China Information Sciences, 2020, 63
  • [2] An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET
    Soleymani, S. A.
    Anisi, M. H.
    Abdullah, A. Hanan
    Ngadi, M. Asri
    Goudarzi, Sh
    Khan, M. Khurram
    Kama, M. Nazri
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (12)
  • [3] Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET
    Liu, Puguang
    Liu, Bo
    Sun, Yipin
    Zhao, Baokang
    You, Ilsun
    [J]. IEEE ACCESS, 2018, 6 : 20795 - 20806
  • [4] Software-Defined Cooperative Data Sharing in Edge Computing Assisted 5G-VANET
    Luo, Guiyang
    Zhou, Haibo
    Cheng, Nan
    Yuan, Quan
    Li, Jinglin
    Yang, Fangchun
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (03) : 1212 - 1229
  • [5] Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET
    Gupta, Nishu
    Manaswini, Ravikanti
    Saikrishna, Bongaram
    Silva, Francisco
    Teles, Ariel
    [J]. FUTURE INTERNET, 2020, 12 (04)
  • [6] A Big Data Enabled Channel Model for 5G Wireless Communication Systems
    Huang, Jie
    Wang, Cheng-Xiang
    Bai, Lu
    Sun, Jian
    Yang, Yang
    Li, Jie
    Tirkkonen, Olav
    Zhou, Ming-Tuo
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2020, 6 (02) : 211 - 222
  • [7] Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
    Mishra, Amit Kumar
    Wazid, Mohammad
    Singh, Devesh Pratap
    Das, Ashok Kumar
    Singh, Jaskaran
    Vasilakos, Athanasios V.
    [J]. DRONES, 2023, 7 (08)
  • [8] 5G Virtual Reality in the Design and Dissemination of Contemporary Urban Image System under the Background of Big Data
    Dong, Haoming
    Liang, Xiaodan
    Liu, Yalong
    Wang, Dan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [9] Analysis of Energy Conservation Big Data of Embedded Large Public Buildings and Construction of the Information Model by 5G
    Zhao, Xing
    Yan, Zengfeng
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [10] A novel self-healing model using precoding & big-data based approach for 5G networks
    Omar, Tamer
    Ketseoglou, Thomas
    Naffaa, Ibrahim
    [J]. Pervasive and Mobile Computing, 2021, 73