A Secure Batch Authentication Scheme for Multiaccess Edge Computing in 5G-Enabled Intelligent Transportation System


The amount of data that can be transmitted over a Communication channel has dramatically increased as a result of the incorporation of 5G technology into the intelligent transportation system (ITS). The current cloud-based ITS collects, stores, and analyzes a large amount of data in order to provide precise services to vehicle users. This places a burden on the cloud service provider, which can result in delays in service or the inability to provide complex services. Multi-access edge computing (MEC), a technology that extends cloud capabilities to edge servers, is gaining attention as a means of lowering the constraints of cloud-based infrastructure. MEC brings cloud capabilities closer to the edge of the network. On the other hand, in ITS built on MEC, since vehicles share information over a wireless Communication channel, this limitation does not apply. It is susceptible to a wide variety of security breaches. A secure batch authentication scheme for multi-access edge computing in 5G-enabled ITS is proposed in this paper. The proposed method is resistant to common security attacks such as impersonation, replay, man-in-the-middle, physical capture, and offline password guessing attacks. Additionally, the method offers secure batch authentication, anonymity, and confidentiality. In order to maintain continuity of service, we take into account whether or not the vehicle can pass through the boundary between MEC servers. We perform a performance analysis as well as an analysis of the security of the proposed scheme in order to demonstrate that the proposed scheme is secure against a variety of security attacks. In the final step, we compare our findings to those of other related works.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Fast and Secure Distributed Nonnegative Matrix Factorization ABSTRACT: The nonnegative matrix factorization (NMF) technique has been utilized effectively in a number of different data mining activities. Because
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Secure Cloud Data Deduplication with Efficient Re-encryption ABSTRACT: The data deduplication technique has seen widespread adoption among commercial cloud storage providers, which is both important and necessary
PROJECT TITLE : Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus ABSTRACT: In the fields of cryptography and algorithmic number theory, modular inversion is regarded as one of the operations that
PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry