FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks

BA Mohammed, MA Al-Shareeda, S Manickam… - IEEE …, 2023 - ieeexplore.ieee.org
The fifth-generation (5G) technology-enabled vehicular network has been widely used in
intelligent transportation in recent years. Since messages shared among vehicles are …

MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption

SM Pournaghi, M Bayat, Y Farjami - Journal of Ambient Intelligence and …, 2020 - Springer
Abstract The development of Electronic Information Technology has made the Electronic
Medical Record a commonly used approach to recording and categorizing medical patient …

Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam - IEEE Access, 2022 - ieeexplore.ieee.org
Traffic safety and efficiency are extremely significant in both private and public
transportation. The fifth-generation (5G)-enabled vehicular networks works wirelessly to …

Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks

ZG Al-Mekhlafi, MA Al-Shareeda, S Manickam… - Electronics, 2023 - mdpi.com
The privacy and security of the information exchanged between automobiles in 5G-enabled
vehicular networks is at risk. Several academics have offered a solution to these problems in …

L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system

AA Almazroi, MA Alqarni, MA Al-Shareeda… - Plos one, 2023 - journals.plos.org
The role that vehicular fog computing based on the Fifth Generation (5G) can play in
improving traffic management and motorist safety is growing quickly. The use of wireless …

Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks

MA Al-Shareeda, S Manickam, BA Mohammed… - Sensors, 2022 - mdpi.com
The security and privacy concerns in vehicular communication are often faced with schemes
depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the …

ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing

AA Almazroi, EA Aldhahri, MA Al-Shareeda… - Plos one, 2023 - journals.plos.org
Fifth-generation (5G)-enabled vehicular fog computing technologies have always been at
the forefront of innovation because they support smart transport like the sharing of traffic data …

Password-guessing attack-aware authentication scheme based on chinese remainder theorem for 5g-enabled vehicular networks

MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah - Applied Sciences, 2022 - mdpi.com
The new fifth-generation (5G) cellular networks dramatically improve the speed of message
transmissions. Most existing authentication schemes that secure 5G communication rely …

Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey

MA Al-Shareeda, M Anbar, S Manickam, A Khalil… - IEEE …, 2021 - ieeexplore.ieee.org
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and
environmental conditions. Due to its design, VANET inadvertently introduced security and …

FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network

AA Almazroi, MA Alqarni, MA Al-Shareeda… - Internet of Things, 2024 - Elsevier
Emerging technology known as intelligent transportation systems allows for seamless two-
way communication between moving vehicles and stationary infrastructure. Therefore, core …