Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing

The fast development of vehicle technology and the appearance of 5G networks have brought new opportunities as well as challenges for vehicular fog computing. On the one hand, these advances would bring a safer, more efficient, and comfortable car onto our roads; but on the other, they open up huge...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Mekhlafi, Zeyad Ghaleb, Lashari, Saima Anwar, Altmemi, Jalal Mohammed Hachim, Al-Shareeda, Mahmood A., Mohammed, Badiea Abdulkarem, Sallam, Amer A., Al-Qatab, Bassam Ali, Alshammari, Mohammad T., Alayba, Abdulaziz M.
Format: Article
Published: Institute of Electrical and Electronics Engineers 2024
Subjects:
Online Access:http://eprints.um.edu.my/47067/
https://doi.org/10.1109/ACCESS.2024.3429179
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaya
id my.um.eprints.47067
record_format eprints
spelling my.um.eprints.470672025-01-06T01:05:35Z http://eprints.um.edu.my/47067/ Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing Al-Mekhlafi, Zeyad Ghaleb Lashari, Saima Anwar Altmemi, Jalal Mohammed Hachim Al-Shareeda, Mahmood A. Mohammed, Badiea Abdulkarem Sallam, Amer A. Al-Qatab, Bassam Ali Alshammari, Mohammad T. Alayba, Abdulaziz M. QA75 Electronic computers. Computer science The fast development of vehicle technology and the appearance of 5G networks have brought new opportunities as well as challenges for vehicular fog computing. On the one hand, these advances would bring a safer, more efficient, and comfortable car onto our roads; but on the other, they open up huge security and privacy vulnerabilities. Current solutions typically offer inadequate security coverage, rendering vehicular networks susceptible to diverse attacks. We present a first holistic solution that combines entity authentication with privacy preservation in 5G-enabled vehicular fog computing. A novel feature obfuscation involves the vehicle request messages at an early stage and employs advanced cryptographic methods, rendering any potential attacks much more challenging while preventing even a Trusted Authority (TA) from inferring their underlying purpose. This scheme not only maximizes request communication, reduces interaction and computational overhead but also lessens the dependency on TA thus making it more scalable as well as resilient. Theoretical and simulation results show the merits of this protocol in reducing verification latency, and packet loss rate along with computation overheads as well as communication overhead. Experimental results demonstrate the effectiveness of our proposed protocol against existing approaches to provide privacy and security for vehicular communications. The work thus adds to the body of knowledge taking vehicular communication in 5G capable networks a step forward enhancing secured and efficient operation ensuring more secure roads that deliver their contextual alerts setting new standards for safety levels within any existing vehicular network as well. Institute of Electrical and Electronics Engineers 2024 Article PeerReviewed Al-Mekhlafi, Zeyad Ghaleb and Lashari, Saima Anwar and Altmemi, Jalal Mohammed Hachim and Al-Shareeda, Mahmood A. and Mohammed, Badiea Abdulkarem and Sallam, Amer A. and Al-Qatab, Bassam Ali and Alshammari, Mohammad T. and Alayba, Abdulaziz M. (2024) Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing. IEEE Access, 12. pp. 100152-100166. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2024.3429179 <https://doi.org/10.1109/ACCESS.2024.3429179>. https://doi.org/10.1109/ACCESS.2024.3429179 10.1109/ACCESS.2024.3429179
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Al-Mekhlafi, Zeyad Ghaleb
Lashari, Saima Anwar
Altmemi, Jalal Mohammed Hachim
Al-Shareeda, Mahmood A.
Mohammed, Badiea Abdulkarem
Sallam, Amer A.
Al-Qatab, Bassam Ali
Alshammari, Mohammad T.
Alayba, Abdulaziz M.
Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
description The fast development of vehicle technology and the appearance of 5G networks have brought new opportunities as well as challenges for vehicular fog computing. On the one hand, these advances would bring a safer, more efficient, and comfortable car onto our roads; but on the other, they open up huge security and privacy vulnerabilities. Current solutions typically offer inadequate security coverage, rendering vehicular networks susceptible to diverse attacks. We present a first holistic solution that combines entity authentication with privacy preservation in 5G-enabled vehicular fog computing. A novel feature obfuscation involves the vehicle request messages at an early stage and employs advanced cryptographic methods, rendering any potential attacks much more challenging while preventing even a Trusted Authority (TA) from inferring their underlying purpose. This scheme not only maximizes request communication, reduces interaction and computational overhead but also lessens the dependency on TA thus making it more scalable as well as resilient. Theoretical and simulation results show the merits of this protocol in reducing verification latency, and packet loss rate along with computation overheads as well as communication overhead. Experimental results demonstrate the effectiveness of our proposed protocol against existing approaches to provide privacy and security for vehicular communications. The work thus adds to the body of knowledge taking vehicular communication in 5G capable networks a step forward enhancing secured and efficient operation ensuring more secure roads that deliver their contextual alerts setting new standards for safety levels within any existing vehicular network as well.
format Article
author Al-Mekhlafi, Zeyad Ghaleb
Lashari, Saima Anwar
Altmemi, Jalal Mohammed Hachim
Al-Shareeda, Mahmood A.
Mohammed, Badiea Abdulkarem
Sallam, Amer A.
Al-Qatab, Bassam Ali
Alshammari, Mohammad T.
Alayba, Abdulaziz M.
author_facet Al-Mekhlafi, Zeyad Ghaleb
Lashari, Saima Anwar
Altmemi, Jalal Mohammed Hachim
Al-Shareeda, Mahmood A.
Mohammed, Badiea Abdulkarem
Sallam, Amer A.
Al-Qatab, Bassam Ali
Alshammari, Mohammad T.
Alayba, Abdulaziz M.
author_sort Al-Mekhlafi, Zeyad Ghaleb
title Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
title_short Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
title_full Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
title_fullStr Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
title_full_unstemmed Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
title_sort oblivious transfer-based authentication and privacy-preserving protocol for 5g-enabled vehicular fog computing
publisher Institute of Electrical and Electronics Engineers
publishDate 2024
url http://eprints.um.edu.my/47067/
https://doi.org/10.1109/ACCESS.2024.3429179
_version_ 1821001883690467328