JOURNAL ARTICLE

An Edge Computing-Enabled Decentralized Authentication Scheme for Vehicular Networks

Abstract

The problem of security and privacy in vehicular networks is a vital issue and it attracts increasing attention to address the security vulnerability of vehicular networks. Authentication solutions are introduced in vehicular networks to ensure that network access only comes from authorized users. Particularly, group signature not only offers authentication services in vehicular networks, but also provides conditional privacy preservation. However, the current group signature solution for authentication in vehicular networks exhibits time-consuming signature verification, which is attributed to the centralized certificate revocation list (CRL) management. To overcome this shortcoming, we propose utilizing edge computing approach and design a flexible and efficient decentralized authentication scheme (FEDAS). In the proposed architecture, a decentralized CRL management method is developed to reduce verification delay in the authentication process. In addition, transition zone is proposed to solve reliable authentication problem in border area of the group caused by decentralized architecture. We also conduct extensive simulations to show the effectiveness of our proposed scheme.

Keywords:
Computer science Authentication (law) Computer network Vehicular ad hoc network Computer security Revocation Scheme (mathematics) Group signature Certificate authority Vulnerability (computing) Public-key cryptography Distributed computing Wireless ad hoc network Wireless Encryption Overhead (engineering) Telecommunications

Metrics

6
Cited By
0.39
FWCI (Field Weighted Citation Impact)
23
Refs
0.61
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Vehicular Ad Hoc Networks (VANETs)
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems

Related Documents

© 2026 ScienceGate Book Chapters — All rights reserved.