2022
DOI: 10.3390/ijerph192315618
|View full text |Cite
|
Sign up to set email alerts
|

COVID-19 Vehicle Based on an Efficient Mutual Authentication Scheme for 5G-Enabled Vehicular Fog Computing

Abstract: The COVID-19 pandemic is currently having disastrous effects on every part of human life everywhere in the world. There have been terrible losses for the entire human race in all nations and areas. It is crucial to take good precautions and prevent COVID-19 because of its high infectiousness and fatality rate. One of the key spreading routes has been identified to be transportation systems. Therefore, improving infection tracking and healthcare monitoring for high-mobility transportation systems is impractical… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 40 publications
(13 citation statements)
references
References 38 publications
0
13
0
Order By: Relevance
“…The proposed solution lets vehicles authenticate each other without a group of signers, an active road side unit (RSU) network, a secret key, or other protections. For 5G-assisted vehicular fog computing, Al-Shareeda and Manickam [25] offered a COVID-19 vehicle built on an efficient mutual authentication system. The suggested system employs two different values for the special flag: SF=0 for typical vehicles and SF=1 for COVID-19 vehicles.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The proposed solution lets vehicles authenticate each other without a group of signers, an active road side unit (RSU) network, a secret key, or other protections. For 5G-assisted vehicular fog computing, Al-Shareeda and Manickam [25] offered a COVID-19 vehicle built on an efficient mutual authentication system. The suggested system employs two different values for the special flag: SF=0 for typical vehicles and SF=1 for COVID-19 vehicles.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These security functions, which can all be secured using widely accepted cryptographic algorithms, include source authentication, data integrity, and information confidentiality 7 . Moreover, Lightweight ciphers are relevant in wireless communication, as evidence such as the works in [8][9][10] .…”
Section: Introductionmentioning
confidence: 99%
“…Upon the arrival of the 5G era, all vehicles inside the vehicular network were required to have a wireless communication device installed, known as an onboard unit (OBU), for vehicle-to-everything (V2X) connectivity. Using the OBU gadget, the vehicles could send and receive messages with one another [ 5 , 6 , 7 ].…”
Section: Introductionmentioning
confidence: 99%