4.6 Article

BAIV: An Efficient Blockchain-Based Anonymous Authentication and Integrity Preservation Scheme for Secure Communication in VANETs

Journal

ELECTRONICS
Volume 11, Issue 3, Pages -

Publisher

MDPI
DOI: 10.3390/electronics11030488

Keywords

authentication; blockchain; integrity; security; revocation

Ask authors/readers for more resources

This paper proposes a blockchain-based authentication protocol for intelligent transport systems (VANET), which achieves anonymous authentication, privacy, and integrity preservation while introducing conditional privacy. The scheme is of great significance in improving the efficiency and security of VANET systems.
Recent development in intelligent transport systems (ITS) has led to the improvement of driving experience in vehicular ad-hoc network (VANET) systems. Providing a low computational cost with high serving capability, however, is a critical phenomenon in the current VANET system. In the existing scenario, when the authenticated vehicle user moves from one roadside unit (RSU) to another RSU region, re-authentication of the vehicle user is required by the current RSU, which increases the computational complexity. To overcome the above-mentioned challenge, a blockchain-based authentication protocol is developed in this work. In this suggested process, blockchain is integrated with VANET, which enables the authentication of the vehicle user without the involvement of a trusted authority. Moreover, the integrity of the message and privacy of vehicle users are preserved in the blockchain network. Even though many blockchain-based schemes have been proposed recently, the existing schemes were not focused on conditional anonymity. However, in our proposed scheme, conditional privacy is introduced to revoke the malicious vehicles in the case of disputes and to avoid further damage to the VANET system. As a result, the proposed scheme provides an efficient mechanism for anonymous authentication, privacy, and integrity preservation with conditional tracking. Finally, the defense against different security threats is explained in the security analysis section, and the performance investigation section shows the competence and efficacy of our method with similar related methods.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Secure-user sign-in authentication for IoT-based eHealth systems

B. D. Deebak, Fadi Al-Turjman

Summary: This paper introduces the application of S-USI in cloud-based healthcare systems and proposes a robust secure-based S-USI mechanism and a coexistence protocol proof for pervasive services in the cloud.

COMPLEX & INTELLIGENT SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

A conceptual framework for blockchain smart contract adoption to manage real estate deals in smart cities

Fahim Ullah, Fadi Al-Turjman

Summary: Blockchain-based smart contracts are transforming the smart real estate sector in smart cities. This study explores the literature on blockchain smart contracts in smart real estate and proposes a conceptual framework for their adoption in smart cities. Through a systematic review of literature published between 2000 and 2020, ten key aspects of blockchain smart contracts are identified and organized into six layers. The study presents a decentralized application and its interactions with Ethereum Virtual Machine (EVM), along with a detailed design and interaction mechanism for real estate owners and users as parties to a smart contract. It also provides a stepwise procedure for establishing and terminating smart contracts, along with a list of functions for initiating, creating, modifying, or terminating a smart contract. The study has the potential to enhance the contracting process for users and create new business opportunities for real estate owners, property technologies companies, and real estate agents.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Software Engineering

Lightweight privacy-aware secure authentication scheme for cyber-physical systems in the edge intelligence era

Deebak Bakkiam Deebak, Fadi AL-Turjman

Summary: Proper real-time data processing and analysis are essential for Internet of Things (IoT) and cyber-physical systems, with the evolution of mobile edge computing addressing security and privacy issues. The integration of computing methods and communication technologies in healthcare systems improves medical services. A lightweight privacy-aware secure authentication (LPASA) scheme is proposed to protect vulnerable medical data, achieving better quality of services in resource-constrained environments.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Artificial Intelligence

An intelligent IoMT enabled feature extraction method for early detection of knee arthritis

Aditya Khamparia, Babita Pandey, Fadi Al-Turjman, Prajoy Podder

Summary: This article presents a computer aided detection system for early knee osteoarthritis and rheumatoid detection using X-ray images and machine learning classifiers. The CAD system can be used remotely to assist medical practitioners in treatments of knee arthritis. The presented results show commendable improvement over different existing feature extractors in combination with different classifiers.

EXPERT SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Crispr biosensing and Ai driven tools for detection and prediction of Covid-19

Abdullahi Umar Ibrahim, Pwadubashiyi Coston Pwavodi, Mehmet Ozsoz, Fadi Al-Turjman, Tirah Galaya, Joy Johnson Agbo

Summary: This article provides an overview of the characteristics, historical pandemics, and diagnostic methods of coronaviruses. It emphasizes the need for rapid, sensitive, simple, and affordable diagnostic tools for the virus, and introduces AI-driven and CRISPR-based approaches for diagnosis and treatment. The article also highlights limitations of laboratory techniques and open research issues in the field.

JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE (2023)

Article Automation & Control Systems

A comprehensive survey on security issues in vehicle-to-grid networks

Arun Sekar Rajasekaran, Maria Azees, Fadi Al-Turjman

Summary: This paper provides a summary of V2G network characteristics, significance, security services, and challenges. It also offers an overview of various security attacks and related countermeasures to make V2G communications more secure.

JOURNAL OF CONTROL AND DECISION (2023)

Article Computer Science, Information Systems

A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation

Arun Sekar Rajasekaran, M. Azees

Summary: In Healthcare 4.0, Wireless Body Area Networks (WBAN) play a crucial role in collecting real-time patient data. This study proposes a lightweight secure anonymous authentication scheme to protect the security of the data, and implements a WBAN system using a cadence tool. The methodology addresses key challenges such as integrity, privacy, security, and non-repudiation.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2023)

Article Clinical Neurology

Accuracy, precision, and safety of stereotactic, frame-based, intraoperative MRI-guided and MRI-verified deep brain stimulation in 650 consecutive procedures

Ali Rajabian, Saman Vinke, Joseph Candelario-Mckeown, Catherine Milabo, Maricel Salazar, Abdul Karim Nizam, Nadia Salloum, Jonathan Hyam, Harith Akram, Eileen Joyce, Thomas Foltynie, Patricia Limousin, Marwan Hariz, Ludvic Zrinzo

Summary: A study examined the use of intraoperative MRI (iMRI) to guide and verify lead placement during deep brain stimulation (DBS) surgery. The results showed that iMRI offers a high level of accuracy and safety in confirming lead placement. This is the largest series reporting the use of iMRI in DBS surgery, demonstrating its precision and safety.

JOURNAL OF NEUROSURGERY (2023)

Article Computer Science, Information Systems

Blockchain-Based Physically Secure and Privacy-Aware Anonymous Authentication Scheme for Fog-Based Vanets

Jegadeesan Subramani, Azees Maria, Arun Sekar Rajasekaran, Fadi Al-Turjman, Mahesh Gopal

Summary: Vehicular Ad-hoc Networks (VANETs) have potential for improving traffic management and driver safety, but there are security and privacy concerns in vehicle communication. This study proposes a blockchain-based physically secure and privacy-aware anonymous authentication technique to address these issues.

IEEE ACCESS (2023)

Article Engineering, Multidisciplinary

IoMT-Cloud Task Scheduling Using AI

Adedoyin A. Hussain, Fadi Al-Turjman

Summary: The internet of medical things allows patients to access flexible and virtualized devices over the internet, but task scheduling is a fundamental issue. A hybrid genetic algorithm AI method is proposed to improve task scheduling efficiency and reduce cost and time. This research can enhance the operational efficiency of the internet of medical things.

CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES (2023)

Article Mathematical & Computational Biology

Effect of Gaussian filtered images on Mask RCNN in detection and segmentation of potholes in smart cities

Auwalu Saleh Mubarak, Zubaida Said Ameen, Fadi Al-Turjman

Summary: This article discusses the importance of identifying potholes on vehicles and introduces the method of developing object detection models using deep learning and computer vision techniques. The research results show that the model trained on images filtered using Gaussian smoothing performs the best.

MATHEMATICAL BIOSCIENCES AND ENGINEERING (2023)

No Data Available