A Secure Batch Authentication Scheme for Multiaccess Edge Computing in 5G-Enabled Intelligent Transportation System

被引:4
|
作者
Kim, Myeonghyun [1 ]
Lee, Joonyoung [1 ]
Oh, Jihyeon [1 ]
Kwon, Deokkyu [1 ]
Park, Kisung [2 ]
Park, Youngho [1 ,3 ]
Park, Kil Houm [1 ,3 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Blockchain Technol Res Ctr, Daejeon 34129, South Korea
[3] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
来源
IEEE ACCESS | 2022年 / 10卷
基金
新加坡国家研究基金会;
关键词
Authentication; Servers; Security; Handover; Privacy; Wireless communication; Elliptic curve cryptography; Edge computing; Intelligent transportation systems; Multi-access edge computing; authentication and key agreement; intelligent transportation system; security; KEY AGREEMENT PROTOCOL; EFFICIENT; FRAMEWORK; VEHICLES;
D O I
10.1109/ACCESS.2022.3205001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the introduction of 5G technology in the intelligent transportation system (ITS), data bandwidth over communication channel is significantly increased. In the existing cloud-based ITS, a large-scale data is collected, stored, and analyzed to provide precise services to vehicle user, which creates a burden on the cloud service provider that can cause service delays or the inability to provide complex services. Multi-access edge computing (MEC) technology, which extends cloud capabilities to edge servers, is attracting attention in order to reduce the constraint of the cloud-based infrastructure. However, in ITS constructed on MEC, since vehicles exchange information through a wireless communication channel. It is vulnerable to various security attacks. This paper proposes a secure batch authentication scheme for multi-access edge computing in 5G-enabled ITS. The proposed scheme withstands common security attacks including impersonation, replay, man-in-the-middle, physical capture, offline password guessing attacks, and provides secure batch authentication, anonymity and confidentiality. We also consider the vehicle can cross the boundary between MEC servers for continuity of service. We analyze the security of the proposed scheme to show that the proposed scheme is secure against various security attacks, and performance analysis. Lastly, we conduct comparison with other related works.
引用
收藏
页码:96224 / 96238
页数:15
相关论文
共 50 条
  • [11] Safe-Passe: Dynamic Handoff Scheme for Provisioning Safety-as-a-Service in 5G-Enabled Intelligent Transportation System
    Roy, Chandana
    Misra, Sudip
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (08) : 5415 - 5425
  • [12] Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks
    Zhang, Jing
    Zhong, Hong
    Cui, Jie
    Tian, Miaomiao
    Xu, Yan
    Liu, Lu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (07) : 7940 - 7954
  • [13] COVID-19 Vehicle Based on an Efficient Mutual Authentication Scheme for 5G-Enabled Vehicular Fog Computing
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2022, 19 (23)
  • [14] FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks
    Mohammed, Badiea Abdulkarem
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    Al-Mekhlafi, Zeyad Ghaleb
    Alreshidi, Abdulrahman
    Alazmi, Meshari
    Alshudukhi, Jalawi Sulaiman
    Alsaffar, Mohammad
    IEEE ACCESS, 2023, 11 : 18571 - 18581
  • [15] An Intelligent Intrusion Detection System for 5G-Enabled Internet of Vehicles
    Sousa, Breno
    Magaia, Naercio
    Silva, Sara
    ELECTRONICS, 2023, 12 (08)
  • [16] Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET
    Gupta, Nishu
    Manaswini, Ravikanti
    Saikrishna, Bongaram
    Silva, Francisco
    Teles, Ariel
    FUTURE INTERNET, 2020, 12 (04)
  • [17] EXPLORING MOBILE EDGE COMPUTING FOR 5G-ENABLED SOFTWARE DEFINED VEHICULAR NETWORKS
    Huang, Xumin
    Yu, Rong
    Kang, Jiawen
    He, Yejun
    Zhang, Yan
    IEEE WIRELESS COMMUNICATIONS, 2017, 24 (06) : 55 - 63
  • [18] Provably Secure Authentication Scheme for Fog Computing-Enabled Intelligent Social Internet of Vehicles
    Chen, Chien-Ming
    Li, Zhen
    Das, Ashok Kumar
    Chaudhry, Shehzad Ashraf
    Lorenz, Pascal
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) : 13600 - 13610
  • [19] L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system
    Almazroi, Abdulwahab Ali
    Alqarni, Mohammed A.
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    PLOS ONE, 2023, 18 (10):
  • [20] Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT
    Ni, Jianbing
    Lin, Xiaodong
    Shen, Xuemin Sherman
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (03) : 644 - 657