| Literature DB >> 35808521 |
Mahmood A Al-Shareeda1, Selvakumar Manickam1, Badiea Abdulkarem Mohammed2, Zeyad Ghaleb Al-Mekhlafi2, Amjad Qtaish2, Abdullah J Alzahrani2, Gharbi Alshammari2, Amer A Sallam3, Khalil Almekhlafi4.
Abstract
The security and privacy concerns in vehicular communication are often faced with schemes depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the operations used by BP and EC are time-consuming and more complicated. None of the previous studies fittingly tackled the efficient performance of signing messages and verifying signatures. Therefore, a chaotic map-based conditional privacy-preserving authentication (CM-CPPA) scheme is proposed to provide communication security in 5G-enabled vehicular networks in this paper. The proposed CM-CPPA scheme employs a Chebyshev polynomial mapping operation and a hash function based on a chaotic map to sign and verify messages. Furthermore, by using the AVISPA simulator for security analysis, the results of the proposed CM-CPPA scheme are good and safe against general attacks. Since EC and BP operations do not employ the proposed CM-CPPA scheme, their performance evaluation in terms of overhead such as computation and communication outperforms other most recent related schemes. Ultimately, the proposed CM-CPPA scheme decreases the overhead of computation of verifying the signatures and signing the messages by 24.2% and 62.52%, respectively. Whilst, the proposed CM-CPPA scheme decreases the overhead of communication of the format tuple by 57.69%.Entities:
Keywords: 5G-enabled; Chebyshev polynomial; chaotic map; privacy and security; vehicular networks
Mesh:
Year: 2022 PMID: 35808521 PMCID: PMC9269849 DOI: 10.3390/s22135026
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1Network Structure of vehicular communication relying on 5G technology [44].
Figure 2The Proposed CM-CPPA Scheme Phases.
Figure 3Message Generation and Verification Phases.
Figure 4The simulation results under OFMC and CL-AtSe Back Ends. (a) OFMC back end; (b) CL-AtSe back end.
The Running Cost of Particular Cryptography Operations.
| Cryptography Operation | Running Cost (ms) |
|---|---|
|
| 1.537 |
|
| 0.937 |
|
| 0.715 |
|
| 0.341 |
|
| 0.061 |
Comparison of Computation Overhead.
| Schemes | Message Signing | Message Verification | Operations Based |
|---|---|---|---|
| Pournaghi et al. [ | Bilnear Pair | ||
| Zhang et al. [ | Elliptic Curve | ||
| Cui et al. [ | Elliptic Curve | ||
| CM-CPPA | Chaotic Map |
Figure 5Computation Overhead for Message Signing and Message Verification Steps.
Improvement of the Proposed CM-CPPA Over Three CPPA schemes.
| Schemes | Message Signing | Message Verification |
|---|---|---|
| Pournaghi et al. [ | ||
| Zhang et al. [ | ||
| Cui et al. [ |
Comparison of Communication Overhead.
| Schemes | Message Tuple | Size of Tuple | Operations Based |
|---|---|---|---|
| Pournaghi et al. [ | { | 2528 bits | Bilnear Pair |
| Zhang et al. [ | { | 832 bits | Elliptic Curve |
| Cui et al. [ | { | 1152 bits | Elliptic Curve |
| CM-CPPA | { | 352 bits | Chaotic Map |
Figure 6Communication Overhead for Message Tuple.