Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs DOI

Wael Khalafalla,

Wen‐Xing Zhu,

Ahmed Elkhalil

et al.

Cluster Computing, Journal Year: 2024, Volume and Issue: 27(7), P. 9851 - 9871

Published: April 30, 2024

Language: Английский

FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks DOI Creative Commons

Badiea Abdulkarem Mohammed,

‪Mahmood A. Al-Shareeda‬‏,

Selvakumar Manickam

et al.

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 18571 - 18581

Published: Jan. 1, 2023

The fifth-generation (5G) technology-enabled vehicular network has been widely used in intelligent transportation recent years. Since messages shared among vehicles are always broadcasted by openness environment’ nature, which is vulnerable to several privacy and security problems. To cope with this issue, researchers have proposed pseudonym authentication schemes for the 5G-enabled network. Nevertheless, these applied complected time-consumed operations. Therefore, paper proposes a fog computing-based (FC-PA) scheme decrease overhead of performance networks. FC-PA applies only one scalar multiplication operation elliptic curve cryptography prove information. A analysis our work explains that satisfies privacy-preserving authentication, resilient against common attacks. With efficiency, can obtain better trade-offs between efficiency than well-known works.

Language: Английский

Citations

55

A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework DOI Creative Commons
‪Mahmood A. Al-Shareeda‬‏,

Selvakumar Manickam

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 46218 - 46228

Published: Jan. 1, 2023

Innovative framework on Vehicles in Network Simulation (VEINS) for Vehicular Ad-hoc (VANET) that use security aspect is mainly limited and dispersed. In order to offer valuable visions technical settings researchers, the study looked into trends gaps were currently present. As a result, this systematic literature review was carried out develop comprehensive taxonomy of research landscape. A thorough done papers about (a) VANET, (b) VEINS, (C) aspects. This used three databases, namely IEEE Xplore, ScienceDirect, Scopus. These databases included in-depth focused VANET based VEINS framework. Then, basis aspect, filtering accomplished. The first class includes threats vulnerabilities evaluate effects VANETs by using suggest ways mitigate or lessen their effects. second category articles solution technology uses blockchain, machine learning, Software-Defined Networking (SDN) techniques VEINS-based applications. third comprises requirements satisfy privacy, authentication, trust management, reliability, revocation security-based Finally, paper reviews architecture bidirectional coupling

Language: Английский

Citations

52

Fog Computing-Based Framework and Solutions for Intelligent Systems DOI

Shashi Shashi,

M. Dhanalakshmi,

K. Tamilarasi

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 330 - 356

Published: Feb. 27, 2024

The automotive industry is increasingly focusing on autonomous vehicles, leading to a need for intelligent systems that enable safe and efficient self-driving. Fog computing promising paradigm real-time data processing communication in vehicles. This chapter presents comprehensive framework solutions integrating fog into vehicle systems, enabling features, low-latency processing, reliable communication, enhanced decision-making capabilities. By offloading computational tasks nearby nodes, this optimizes resource utilization, reduces network congestion, enhances autonomy. discusses various use cases, architectures, protocols, security considerations within computing, ultimately contributing the evolution of

Language: Английский

Citations

22

Chebyshev Polynomial-Based Fog Computing Scheme Supporting Pseudonym Revocation for 5G-Enabled Vehicular Networks DOI Open Access
Zeyad Ghaleb Al-Mekhlafi, ‪Mahmood A. Al-Shareeda‬‏,

Selvakumar Manickam

et al.

Electronics, Journal Year: 2023, Volume and Issue: 12(4), P. 872 - 872

Published: Feb. 8, 2023

The privacy and security of the information exchanged between automobiles in 5G-enabled vehicular networks is at risk. Several academics have offered a solution to these problems form an authentication technique that uses elliptic curve or bilinear pair sign messages verify signature. problem tasks are lengthy difficult execute effectively. Further, needs for revoking pseudonym network not met by approaches. Thus, this research offers fog computing strategy automotive based on Chebyshev polynomial allows revocation pseudonyms. Our eliminates threat insider attack making use computing. In particular, server does renew signature key when validity period pseudonym-ID about end. addition meeting requirements, our proposal also resistant wide range potential breaches. Finally, used work message signature, resulting greater performance cost efficiency than would otherwise be possible if operation had been employed.

Language: Английский

Citations

39

Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing DOI Creative Commons
Zeyad Ghaleb Al-Mekhlafi, ‪Mahmood A. Al-Shareeda‬‏,

Selvakumar Manickam

et al.

Sensors, Journal Year: 2023, Volume and Issue: 23(7), P. 3543 - 3543

Published: March 28, 2023

Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. To verify vehicles, however, these conditional privacy-preserving (CPPA) systems required a roadside unit, an expensive component of vehicular Moreover, CPPA incur exceptionally high communication processing costs. This study proposes method based on fog computing (FC), as solution issues 5G-enabled In our FC-CPPA method, server is used to establish set public anonymity identities their corresponding signature keys, which are then preloaded into each authentic vehicle. We guarantee context random oracle. Our solutions not only compliant with confidentiality standards, but also resistant variety threats. The costs proposal 84 bytes, while computation 0.0031, 2.0185 sign messages. Comparing strategy similar ones reveals that it saves time money during performance evaluation phase.

Language: Английский

Citations

37

Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks DOI Creative Commons
Zeyad Ghaleb Al-Mekhlafi, ‪Mahmood A. Al-Shareeda‬‏,

Selvakumar Manickam

et al.

Mathematics, Journal Year: 2023, Volume and Issue: 11(2), P. 399 - 399

Published: Jan. 12, 2023

Both security and privacy are central issues need to be properly handled because communications shared among vehicles in open channel environments of 5G-enabled vehicular networks. Several researchers have proposed authentication schemes address these issues. Nevertheless, not only vulnerable quantum attacks but also use heavy operations generate verify signatures messages. Additionally, an expensive component RoadSide Unit (RSU)-aided scheme during the joining phase. To issues, we propose a lightweight quantum-resistant according lattice method Our proposal uses matrix multiplication instead operations-based bilinear pair cryptography or elliptic curve messages vehicles. satisfies significant reduction performance, which makes it enough handle attacks. is based on 5G technology without using any RSU-aided scheme. Security analysis showed that our properties as well resists Finally, shows favorable performance compared other related work.

Language: Английский

Citations

32

Unmanned aerial vehicle: a review and future directions DOI Open Access
‪Mahmood A. Al-Shareeda‬‏, Murtaja Ali Saare,

Selvakumar Manickam

et al.

Indonesian Journal of Electrical Engineering and Computer Science, Journal Year: 2023, Volume and Issue: 30(2), P. 778 - 778

Published: Feb. 18, 2023

The use of unmanned aerial vehicles (UAVs) will be crucial in the next generation wireless communications infrastructure. When compared to traditional ground-based solutions, it is expected that their a variety communication-based applications increase coverage and spectrum efficiency. In this paper, we provide detailed review all relevant research works as follows. This paper presents types UAVs (e.g., coverage, military, agriculture, medical applications, environment, climate, delivery transportation), characteristics node density, altering system topology, mobility, radio broadcasting mode, frequency band, localization, power consumption network lifetime), application Multi-UAV cooperation, UAV-to-VANET collaborations, UAV-to-ground tasks). Additionally, reviews routing protocols topology-based, position-based, heterogeneous, delay-tolerant networks (DTNs), swarm-Based, cluster-based) simulation tools OMNeT++, AVENS, MATLAB, NS3, SUMO, OPNET). design development any new methods for may work guide reference.

Language: Английский

Citations

21

Artificial Neural Network and Latent Semantic Analysis for Adverse Drug Reaction Detection DOI Creative Commons
Ahmed Adil Nafea, Nazlia Omar,

Zohaa Mubarak Al-qfail

et al.

Baghdad Science Journal, Journal Year: 2023, Volume and Issue: unknown

Published: May 20, 2023

Adverse drug reactions (ADR) are important information for verifying the view of patient on a particular drug. Regular user comments and reviews have been considered during data collection process to extract ADR mentions, when reported side effect after taking specific medication. In literature, most researchers focused machine learning techniques detect ADR. These methods train classification model using annotated medical review data. Yet, there still many challenging issues that face extraction, especially accuracy detection. The main aim this study is propose LSA with ANN classifiers findings show effectiveness utilizing in extracting

Language: Английский

Citations

16

Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning DOI Open Access
Ahmad A. Alzahrani, Mohammed Alshehri, Rayed AlGhamdi

et al.

Healthcare, Journal Year: 2023, Volume and Issue: 11(3), P. 384 - 384

Published: Jan. 29, 2023

Medical cyber-physical systems (MCPS) represent a platform through which patient health data are acquired by emergent Internet of Things (IoT) sensors, preprocessed locally, and managed improved machine intelligence algorithms. Wireless medical extensively adopted in the daily practices medicine, where vast amounts sampled using wireless devices sensors passed to decision support (DSSs). With development physical incorporating cyber frameworks, threats have far more acute effects, as they reproduced environment. Patients’ personal information must be shielded against intrusions preserve their privacy confidentiality. Therefore, every bit stored database needs kept safe from intrusion attempts. The IWMCPS proposed this work takes into account all relevant security concerns. This paper summarizes three years fieldwork presenting an framework consisting several components subsystems. architecture is developed, evidenced scenario including applications sector. Cyber-physical essential healthcare sector, life-critical context-aware vulnerable theft cyber-okayattacks. Reliability, confidence, security, transparency some issues that addressed growing field MCPS research. To overcome abovementioned problems, we present system (IWMCPS) based on learning techniques. heterogeneity included these (such mobile body sensor nodes) makes them prone many attacks. necessitates effective solutions for environments deep neural networks attack detection classification. core elements communication monitoring core, computational safety real-time planning administration resources. In study, evaluated our design with actual various attacks, modification, denial service (DoS), injection. method patient-centric preserves end-user’s smartphone device control exchange accessibility. used WMCPSs well protected secure order threats. Our experimental findings showed model attained high accuracy 92% lower time 13 sec fewer error analyses.

Language: Английский

Citations

15

Vector Autoregression Model-Based Forecasting of Reference Evapotranspiration in Malaysia DOI Open Access

Phon Sheng Hou,

Lokman Mohd Fadzil,

Selvakumar Manickam

et al.

Sustainability, Journal Year: 2023, Volume and Issue: 15(4), P. 3675 - 3675

Published: Feb. 16, 2023

Evapotranspiration is one of the hydrological cycle’s most important elements in water management across economic sectors. Critical applications agriculture domain include irrigation practice improvement and efficiency, as well resource preservation. The main objective this research to forecast reference evapotranspiration using vector autoregression (VAR) model investigate meteorological variables’ causal relationship with a statistical approach. acquired 20-year, 1-year, 2-month climate datasets from Penang, Malaysia, were split into 80% training data 20% validation data. Public weather are used train initial VAR model. A Raspberry Pi IoT device connected DHT11 temperature sensor was outfitted at designated experimental crop site. In situ acquisition done sensors measure ambient humidity. collected humidity conjunction calculate forecast. results demonstrated that 20-year dataset showed better performance consistent forecasting general evapotranspiration, derived root mean square error (RMSE) correlation coefficient (CORR) 1.1663 −0.0048, respectively. As for 1-year model, RMSE CORR recorded 1.571 −0.3932, However, both positive negative due seasonal effects Penang. ranged between 0.5297 2.3562 2020, 0.8022 1.8539 2019, 2.0921 2018. CORR, it −0.5803 0.2825 −0.3817 0.2714 conclusion, tested estimating (ET0) based on smaller RMSEs demonstrates predicting true values, producing variations

Language: Английский

Citations

13