Author
Listed:
- Abdulaziz Zaid A Aljarwan
- Md Asri Bin Ngadi
Abstract
With the advancement of automotive telematics and communication technologies, intelligent transportation systems (ITS) have gradually come on stage, which enables the blooming of vehicular networks. The emerging fifth-generation (5G) mobile communication technology stands to deliver highly secure, low-latency wireless communication services. Furthermore, through fog computing architecture, 5G facilitates the collection of data on a global scale and controlling the entire network from a central location. However, this wireless communication model brings important difficulties for cross-domain authentication, privacy, and in turn monitoring harmful domains for the heterogeneous domains of a 5G-assisted vehicular network. To this end, this paper introduces a new cross-domain authentication solution employing blockchain and fog computing to mitigate these negative effects. The FCCA Protocol: This fog computing-enabled cross-domain authentication (FCCA) protocol establishes a secure authentication framework between vehicles and back-end fog servers, which guarantees accountability for possibly dangerous vehicles while protecting the private information of vehicle users. The FCCA protocol minimizes reliance on trusted authorities while offering a variety of important functions like cross-domain communication, single registration, authenticity of messages, privacy protection, anonymity, unlinkability, and traceability. We further proved that the FCCA protocol is resilient to hijacking, birthday collision, and man-in-the-middle attacks, which render other protocols vulnerable. Moreover, it is proven that, when including the costs of security, computation, communication, and energy, the FCCA protocol is the most cost-performance effective protocol.
Suggested Citation
Abdulaziz Zaid A Aljarwan & Md Asri Bin Ngadi, 2025.
"Securing cross-domain authentication in vehicular ad hoc networks,"
International Journal of Innovative Research and Scientific Studies, Innovative Research Publishing, vol. 8(2), pages 2865-2879.
Handle:
RePEc:aac:ijirss:v:8:y:2025:i:2:p:2865-2879:id:5828
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aac:ijirss:v:8:y:2025:i:2:p:2865-2879:id:5828. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Natalie Jean (email available below). General contact details of provider: https://ijirss.com/index.php/ijirss/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.