Search for a command to run...
Supporting vehicular emergency applications requires fast access to infrastructure so vehicles can call for help. Because of their environment's poor wireless qualities, vehicle infrastructure communication paths lack security. Modern authentication systems used to close security vulnerabilities require a lot of computing and storage power from the vehicle's OBU. Thus, a <bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">novel</b> 5G automobile network emergency situations <bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">based on</b> Chebyshev polynomial using fog computing and authentication is proposed. <bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">This is the first study to use</b> Chebyshev chaotic mapping algorithm <bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">that</b> uses a chaotic map, rotation, and XOR to generate a one-way hash and eliminate modular multiplication index or scalar multiplication on the elliptic curve. The proposed scheme has <bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">five</b> stages: installation system, initialization, enrollment, mutual authentication, and emergency request. Critical to emergency services, the suggested protocol works better in resource-limited settings like car systems. The <bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">formal</b> security analysis reveals that the suggested approach guarantees message authenticity and integrity, non-repudiation, traceability, unlinkability, identity privacy, certificate independence, and emergency response. <bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">The evaluation showed that</b> the proposed method cannot execute forgery, impersonation, or replay attacks. <bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">The</b> proposed method has lower computational, communication, and storage overhead than earlier efforts.
Published in: IEEE Transactions on Dependable and Secure Computing
Volume 22, Issue 5, pp. 4795-4812