{"id":"https://openalex.org/W4408805382","doi":"https://doi.org/10.1109/tdsc.2025.3553868","title":"Chebyshev Polynomial Based Emergency Conditions With Authentication Scheme for 5G-Assisted Vehicular Fog Computing","display_name":"Chebyshev Polynomial Based Emergency Conditions With Authentication Scheme for 5G-Assisted Vehicular Fog Computing","publication_year":2025,"publication_date":"2025-03-24","ids":{"openalex":"https://openalex.org/W4408805382","doi":"https://doi.org/10.1109/tdsc.2025.3553868"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3553868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3553868","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079673360","display_name":"\u202aMahmood A. Al-Shareeda\u202c\u200f","orcid":"https://orcid.org/0000-0002-2358-3785"},"institutions":[{"id":"https://openalex.org/I4210145266","display_name":"Southern Technical University","ror":"https://ror.org/03sax3264","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210145266"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Mahmood A. Al-Shareeda","raw_affiliation_strings":["Department of Electronic Technologies, Basra Technical Institute, Southern Technical University, Basra, Iraq"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technologies, Basra Technical Institute, Southern Technical University, Basra, Iraq","institution_ids":["https://openalex.org/I4210145266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016711703","display_name":"Tarek Gaber","orcid":"https://orcid.org/0000-0003-4065-4191"},"institutions":[{"id":"https://openalex.org/I54459138","display_name":"University of Salford","ror":"https://ror.org/01tmqtf75","country_code":"GB","type":"education","lineage":["https://openalex.org/I54459138"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tarek Gaber","raw_affiliation_strings":["School of Science, Engineering and Environment University Salford, Salford, U.K","School of Science, Engineering and Environment University Salford, Manchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Science, Engineering and Environment University Salford, Salford, U.K","institution_ids":["https://openalex.org/I54459138"]},{"raw_affiliation_string":"School of Science, Engineering and Environment University Salford, Manchester, United Kingdom","institution_ids":["https://openalex.org/I54459138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046419777","display_name":"Mohammed A. Alqarni","orcid":"https://orcid.org/0000-0002-3284-537X"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed A. Alqarni","raw_affiliation_strings":["College of Computer Science and Engineering, of Software Engineering, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, of Software Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003550104","display_name":"Monagi H. Alkinani","orcid":"https://orcid.org/0000-0002-7658-7085"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Monagi H. Alkinani","raw_affiliation_strings":["Department of Computer Science and Artificial Intelligence, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","College of Computer Science and Engineering, Department of Computer Science and Artificial Intelligence, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Artificial Intelligence, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]},{"raw_affiliation_string":"College of Computer Science and Engineering, Department of Computer Science and Artificial Intelligence, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010892060","display_name":"Alaa Atallah Almazroey","orcid":"https://orcid.org/0000-0003-4571-4165"},"institutions":[{"id":"https://openalex.org/I4210095940","display_name":"Aljazeera Hospital","ror":"https://ror.org/00zn0ha79","country_code":"SA","type":"healthcare","lineage":["https://openalex.org/I4210095940"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Alaa Atallah Almazroey","raw_affiliation_strings":["Modern Aljazeera Company, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Modern Aljazeera Company, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210095940"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058352305","display_name":"Abdulwahab Ali Almazroi","orcid":"https://orcid.org/0000-0001-7181-2100"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdulwahab Ali Almazroi","raw_affiliation_strings":["Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah, Saudi Arabia","College of Computing and Information Technology at Khulais, Department of Information Technology, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]},{"raw_affiliation_string":"College of Computing and Information Technology at Khulais, Department of Information Technology, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5079673360"],"corresponding_institution_ids":["https://openalex.org/I4210145266"],"apc_list":null,"apc_paid":null,"fwci":78.0192,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.99930122,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"22","issue":"5","first_page":"4795","last_page":"4812"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9639000296592712,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9639000296592712,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9240000247955322,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7315259575843811},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6304931640625},{"id":"https://openalex.org/keywords/chebyshev-polynomials","display_name":"Chebyshev polynomials","score":0.5941681861877441},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.4835955500602722},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44191572070121765},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3289124369621277},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28814131021499634},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14101609587669373}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7315259575843811},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6304931640625},{"id":"https://openalex.org/C129785596","wikidata":"https://www.wikidata.org/wiki/Q619511","display_name":"Chebyshev polynomials","level":2,"score":0.5941681861877441},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.4835955500602722},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44191572070121765},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3289124369621277},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28814131021499634},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14101609587669373},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3553868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3553868","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.4000000059604645,"id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W368566718","https://openalex.org/W2009765199","https://openalex.org/W2029693536","https://openalex.org/W2088558155","https://openalex.org/W2782688689","https://openalex.org/W2786879337","https://openalex.org/W2792887462","https://openalex.org/W2804658645","https://openalex.org/W2891202560","https://openalex.org/W2903407922","https://openalex.org/W2904479389","https://openalex.org/W2911558817","https://openalex.org/W2921960465","https://openalex.org/W2946237653","https://openalex.org/W2967415590","https://openalex.org/W2971617045","https://openalex.org/W2972467038","https://openalex.org/W2978278112","https://openalex.org/W2990829610","https://openalex.org/W2997246639","https://openalex.org/W3006891966","https://openalex.org/W3029861272","https://openalex.org/W3032780047","https://openalex.org/W3036305871","https://openalex.org/W3042527829","https://openalex.org/W3088751792","https://openalex.org/W3089303131","https://openalex.org/W3091569964","https://openalex.org/W3092485457","https://openalex.org/W3102573974","https://openalex.org/W3120179717","https://openalex.org/W3161784205","https://openalex.org/W3165400837","https://openalex.org/W3172959128","https://openalex.org/W3173591386","https://openalex.org/W3174976953","https://openalex.org/W3198080154","https://openalex.org/W4210775671","https://openalex.org/W4225927418","https://openalex.org/W4226149406","https://openalex.org/W4244616932","https://openalex.org/W4283655240","https://openalex.org/W4309335628","https://openalex.org/W4312766342","https://openalex.org/W4313406716","https://openalex.org/W4381838940","https://openalex.org/W4396965804"],"related_works":["https://openalex.org/W1975289146","https://openalex.org/W2105887828","https://openalex.org/W2122599759","https://openalex.org/W4236520801","https://openalex.org/W4387995034","https://openalex.org/W2111375262","https://openalex.org/W1537234410","https://openalex.org/W2317728013","https://openalex.org/W189436435","https://openalex.org/W2242172122"],"abstract_inverted_index":{"Supporting":[0],"vehicular":[1],"emergency":[2,56,126,130,167],"applications":[3],"requires":[4],"fast":[5],"access":[6],"to":[7,32,78,94,129],"infrastructure":[8,23],"so":[9],"vehicles":[10],"can":[11],"call":[12],"for":[13],"help.":[14],"Because":[15],"of":[16,39],"their":[17],"environment's":[18],"poor":[19],"wireless":[20],"qualities,":[21],"vehicle":[22],"communication":[24],"paths":[25],"lack":[26],"security.":[27],"Modern":[28],"authentication":[29,68],"systems":[30],"used":[31],"close":[33],"security":[34,147],"vulnerabilities":[35],"require":[36],"a":[37,49,88,96],"lot":[38],"computing":[40,66],"and":[41,67,92,99,125,157,166,194],"storage":[42,195],"power":[43],"from":[44],"the":[45,75,108,132,151,175],"vehicle's":[46],"OBU.":[47],"Thus,":[48],"<bold":[50,58,71,84,115,144,169,185],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[51,59,72,85,116,145,170,186],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">novel</b>":[52],"5G":[53],"automobile":[54],"network":[55],"situations":[57],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">based":[60],"on</b>":[61],"Chebyshev":[62,80],"polynomial":[63],"using":[64],"fog":[65],"is":[69,74],"proposed.":[70],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">This":[73],"first":[76],"study":[77],"use</b>":[79],"chaotic":[81,89],"mapping":[82],"algorithm":[83],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">that</b>":[86],"uses":[87],"map,":[90],"rotation,":[91],"XOR":[93],"generate":[95],"one-way":[97],"hash":[98],"eliminate":[100],"modular":[101],"multiplication":[102,106],"index":[103],"or":[104,182],"scalar":[105],"on":[107],"elliptic":[109],"curve.":[110],"The":[111,143],"proposed":[112,176,188],"scheme":[113],"has":[114,190],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">five</b>":[117],"stages:":[118],"installation":[119],"system,":[120],"initialization,":[121],"enrollment,":[122],"mutual":[123],"authentication,":[124],"request.":[127],"Critical":[128],"services,":[131],"suggested":[133,152],"protocol":[134],"works":[135],"better":[136],"in":[137],"resource-limited":[138],"settings":[139],"like":[140],"car":[141],"systems.":[142],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">formal</b>":[146],"analysis":[148],"reveals":[149],"that":[150],"approach":[153],"guarantees":[154],"message":[155],"authenticity":[156],"integrity,":[158],"non-repudiation,":[159],"traceability,":[160],"unlinkability,":[161],"identity":[162],"privacy,":[163],"certificate":[164],"independence,":[165],"response.":[168],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">The":[171],"evaluation":[172],"showed":[173],"that</b>":[174],"method":[177,189],"cannot":[178],"execute":[179],"forgery,":[180],"impersonation,":[181],"replay":[183],"attacks.":[184],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">The</b>":[187],"lower":[191],"computational,":[192],"communication,":[193],"overhead":[196],"than":[197],"earlier":[198],"efforts.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":19}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
