A HMAC-Based Token Authentication Protocol with Bloom Filter Revocation for Fog-Assisted Vehicular Networks
Abstract
In this paper, we propose five round HMAC-based token authentication protocol with Bloom filter revocation for Fog-assisted Vehicular Networks (FAVN). The proposed concept includes (i) secure bootstrap, (ii) light-weight mutual authentication; (iii) dynamic session key establishment, (iv) Bloom filter-based revocation token distribution, and; v) key refresh and pseudonym rebinding. Utilizing only lightweight symmetric cryptographic operations (e.g., HMAC and hash) this system achieves mutual authentication, unlinkability and fine grained revocability without requiring the usual asymmetric primitives or any certificates. Formal verification with the help of AVISPA tool show resistance against impersonation, replay and man-in-themiddleattack under Dolev–Yao model. Experimental results show that each session incur the average cryptographic processing delay with 2.10 ms, communication cost is only 512 bytes, and storage overhead is with 1.8 KB per vehicle. The optimal solution is compared to the state-of-the-art ECC and pairing-based methods and there it is observed that the proposed framework minimizes more than 35 % of computational cost, 42.5 % communication overhead, which can be scalable as well a privacy preserving manner in an enormous real-time automotive authentication for 5G-enabled vehicular fog architecture.References
S. Abirami, M. Pethuraj, M. Uthayakumar, and
P. Chitra, “A systematic survey on big data
and artificial intelligence algorithms for intelligent
transportation system,” Case Studies on Trans-
port Policy, vol. 17, p. 101247, 2024.
M. Elassy, M. Al-Hattab, M. Takruri, and
S. Badawi, “Intelligent transportation systems for
sustainable smart cities,” Transportation Engi-
neering, vol. 16, p. 100252, 2024.
A. Raza, S. H. R. Bukhari, F. Aadil, and Z. Iqbal,
“An uav-assisted vanet architecture for intelligent
transportation system in smart cities,” Interna-
tional Journal of Distributed Sensor Networks,
vol. 17, no. 7, p. 15501477211031750, 2021.
S. A. Rashid, L. Audah, and M. M. Hamdi, “In-
telligent transportation systems (itss) in vanet
and manet,” in Biologically Inspired Techniques
in Many Criteria Decision Making: Proceedings
of BITMDM 2021. Springer, 2022, pp. 667–675.
M. Ramya Devi, I. Selvakumari Jeya, and
S. Lokesh, “Adaptive scheduled partitioning tech-
nique for reliable emergency message broad-
casting in vanet for intelligent transporta-
tion systems,” Automatika: ˇcasopis za au-
tomatiku, mjerenje, elektroniku, raˇcunarstvo i ko-
munikacije, vol. 64, no. 2, pp. 341–354, 2023.
J. Cynthia, G. Sakthipriya, J. C. Sudhahar, and
M. Suguna, “Intelligent transportation system:
A review of vanet applications for urban areas,
technologies, and protocols,” Sustainable Digital
Technologies for Smart Cities, pp. 99–112, 2023.
DOI:
https://doi.org/10.31449/inf.v49i35.12009Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







