Design and Evaluation of Secure Software Architectures for 5G-Enabled Vehicular Driving System

Authors

  • Murtaja Ali Saare University of Basrah
  • Ali K. Mattar Shatt Al-Arab University College
  • Sari Ali Sari University of Basrah
  • Seng Yue Wong Universiti Malaya

DOI:

https://doi.org/10.18196/jrc.v6i4.26032

Keywords:

Post-Quantum Cryptography, Vehicular Ad-hoc Networks (VANETs), Fog Computing, Software Architectures, Mutual Authentication, 5G Network Security

Abstract

Vehicular Ad-hoc Networks (VANETs) represent support for Intelligent Transport Systems (ITS) that allow vehicles and infrastructures to exchange real-time information. Nevertheless, the introduction of the 5G technology for the VANETs poses new security challenges, especially considering the emerging quantum computing threats. In response to this problem, we present a secure software architecture, Lattice Efficient Mutual Authentication (LEMA), designed to improve vehicular communication in 5G supported environments. The research novelty is the construction of LEMA—a lightweight and scalable framework for robust authentication in the fog, based on lattice-based postquantum cryptography, which is also resilient to classical and quantum-based attacks and provides low latency. The framework operates based on three core phases: initialization by a Trusted Authority, secure private key generation, and mutual authentication via LWE-based schemes. A testbed which is built on a Raspberry Pi is used for simulating OBUs to verify LEMA performance in a resource-constrained environment. We compare LEMA with the state of art and get the performance numbers for the computational overhead, communication cost and storage efficiency. Simulation results show that with LEMA, the computational time, the communication amount and the storage consumed can be decreased by at least 25%, 30% and 20% than the benchmark protocols, respectively, and it is secure against the man-in-themiddle and the key-compromise attacks. The authors’ use of fog servers for deployment of the system also significantly boosts real-time responsiveness. Finally, the LEMA model presents a promising quantum-secure authentication technique for 5G-based vehicular networks. In the future we plan to combine it with AIbased anomaly detection and blockchain, for better scalability, privacy and decentralization.

References

B. Saoud et al., “Artificial intelligence, internet of things and 6g methodologies in the context of vehicular ad-hoc networks (vanets): Survey,” ICT Express, vol. 10, no. 4, pp. 959–980, 2024, doi: 10.1016/j.icte.2024.05.008.

M. A. Al-Shareeda et al., “Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks,” Sensors, vol. 22, no. 13, 2022, doi: 10.3390/s22135026.

J. Stodola, P. Stodola, and J. Furch, “Intelligent transport systems,” Challenges to national defence in contemporary geopolitical situation, 2022.

A. Gholamhosseinian and J. Seitz, “Vehicle Classification in Intelligent Transport Systems: An Overview, Methods and Software Perspective,” in IEEE Open Journal of Intelligent Transportation Systems, vol. 2, pp. 173-194, 2021, doi: 10.1109/OJITS.2021.3096756.

M. A. Al-Shareeda, M. A. Saare, S. Manickam, and S. Karuppayah, “Bluetooth low energy for internet of things: review, challenges, and open issues,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 31, no. 2, pp. 1182–1189, 2023, doi: 10.11591/ijeecs.v31.i2.pp1182-1189.

M. A. Al-Shareeda, M. Anbar, S. Manickam, A. Khalil and I. H. Hasbullah, “Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey,” in IEEE Access, vol. 9, pp. 121522-121531, 2021, doi: 10.1109/ACCESS.2021.3109264.

R. G. Engoulou, M. Bella¨ıche, S. Pierre, and A. Quintero, “Vanet security surveys,” Computer Communications, vol. 44, pp. 1–13, 2014, doi: 10.1016/j.comcom.2014.02.020.

B. A. Mohammed et al., “Service based veins framework for vehicular ad-hoc network (vanet): A systematic review of state-of-the-art,” Peer-toPeer Networking and Applications, vol. 17, pp. 2259–2281, 2024, doi: 10.1007/s12083-024-01692-0.

A. H. A. Alattas, M. A. Al-Shareeda, S. Manickam, and M. A. Saare, “Enhancement of ntsa secure communication with one-time pad (otp) in iot,” Informatica, vol. 47, no. 1, 2023, doi: 10.31449/inf.v47i1.4463.

M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “The blockchain internet of things: review, opportunities, challenges, and recommendations,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 31, no. 3, pp. 1673–1683, 2023, doi: 10.11591/ijeecs.v31.i3.pp1673-1683.

M. J. N. Mahi et al., “A Review on VANET Research: Perspective of Recent Emerging Technologies,” in IEEE Access, vol. 10, pp. 65760- 65783, 2022, doi: 10.1109/ACCESS.2022.3183605.

M. M. Elsayed, K. M. Hosny, M. M. Fouda, and M. M. Khashaba, “Vehicles communications handover in 5g: A survey,” ICT Express, vol. 9, no. 3, pp. 366–378, 2023, doi: 10.1016/j.icte.2022.01.005.

M. M. Hamdi, A. S. Mustafa, H. F. Mahd, M. S. Abood, C. Kumar and M. A. Al-shareeda, “Performance Analysis of QoS in MANET based on IEEE 802.11b,” 2020 IEEE International Conference for Innovation in Technology (INOCON), pp. 1-5, 2020, doi: 10.1109/INOCON50539.2020.9298362.

B. N. Alhasnawi and B. H. Jasim, “SCADA controlled smart home using Raspberry Pi3,” 2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), pp. 1-6, 2018, doi: 10.1109/ICASEA.2018.8370946.

M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “Unmanned aerial vehicle: a review and future directions,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 30, no. 2, pp. 778–786, 2023, doi: 10.11591/ijeecs.v30.i2.pp778-786.

B. N. Alhasnawi, M. Zanker, and V. Bures, “A new smart charging electric ˇ vehicle and optimal dg placement in active distribution networks with optimal operation of batteries,” Results in Engineering, vol. 25, 2025, doi: 10.1016/j.rineng.2025.104521.

B. N. Alhasnawi et al., “A novel efficient energy optimization in smart urban buildings based on optimal demand side management,” Energy Strategy Reviews, vol. 54, 2024, doi: 10.1016/j.esr.2024.101461.

C. R. Storck and F. Duarte-Figueiredo, “A Survey of 5G Technology Evolution, Standards, and Infrastructure Associated With Vehicle-toEverything Communications by Internet of Vehicles,” in IEEE Access, vol. 8, pp. 117593-117614, 2020, doi: 10.1109/ACCESS.2020.3004779.

B. N. Alhasnawi, S. M. M. Almutoki, F. F. K. Hussain, A. Harrison, B. Bazooyar, M. Zanker, and V. Bures, “A new methodology for ˇ reducing carbon emissions using multi-renewable energy systems and artificial intelligence,” Sustainable Cities and Society, vol. 114, 2024, doi: 10.1016/j.scs.2024.105721.

B. N. Alhasnawi, M. Zanker, and V. Bures, “A smart electricity markets ˇ for a decarbonized microgrid system,” Electrical Engineering, pp. 1–21, 2024, doi: 10.1007/s00202-024-02699-9.

M. A. Saare, A. Hussain, and W. S. Yue, “Relationships between the older adult’s cognitive decline and quality of life: The mediating role of the assistive mobile health applications,” International Journal of Interactive Mobile Technologies, vol. 13, no. 10, pp. 42–55, 2019.

M. A. AbouElaz, B. N. Alhasnawi, B. E. Sedhom, and V. Bures, “Anfis- ˇ optimized control for resilient and efficient supply chain performance in smart manufacturing,” Results in Engineering, vol. 25, 2025, doi: 10.1016/j.rineng.2025.104262.

N. Gaouar and M. Lehsaini, “Toward vehicular cloud/fog communication: A survey on data dissemination in vehicular ad hoc networks using vehicular cloud/fog computing,” International Journal of Communication Systems, vol. 34, no. 13, 2021, doi: 10.1002/dac.4906.

Z. Ghaleb Al-Mekhlafi et al., “Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review,” in IEEE Sensors Journal, vol. 24, no. 19, pp. 29575-29602, 2024, doi: 10.1109/JSEN.2024.3436612.

R. Rezapour, P. Asghari, H. H. S. Javadi, and S. Ghanbari, “Security in fog computing: A systematic review on issues, challenges and solutions,” Computer Science Review, vol. 41, 2021, doi: 10.1016/j.cosrev.2021.100421.

K. Behravan, N. Farzaneh, M. Jahanshahi, and S. A. H. Seno, “A comprehensive survey on using fog computing in vehicular networks,” Vehicular Communications, vol. 42, 2023, doi: 10.1016/j.vehcom.2023.100604.

B. Cao, Z. Sun, J. Zhang and Y. Gu, “Resource Allocation in 5G IoV Architecture Based on SDN and Fog-Cloud Computing,” in IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 6, pp. 3832-3840, 2021, doi: 10.1109/TITS.2020.3048844.

S. Hakak, T. R. Gadekallu, P. K. R. Maddikunta, S. P. Ramu, M. Parimala, C. De Alwis, and M. Liyanage, “Autonomous vehicles in 5g and beyond: A survey,” Vehicular Communications, vol. 39, 2023, doi: 10.1016/j.vehcom.2022.100551.

H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, “Vanet security challenges and solutions: A survey,” Vehicular Communications, vol. 7, pp. 7–20, 2017, doi: 10.1016/j.vehcom.2017.01.002.

M. Lee and T. Atkison, “Vanet applications: Past, present, and future,” Vehicular Communications, vol. 28, 2021, doi: 10.1016/j.vehcom.2020.100310.

Z. G. Al-Mekhlafi et al., “Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications,” in IEEE Access, vol. 12, pp. 71232-71247, 2024, doi: 10.1109/ACCESS.2024.3402336.

S. H. Islam and S. Zeadally, “Provably secure identity-based two-party authenticated key agreement protocol based on cbi-isis and bi-isis problems on lattices,” Journal of Information Security and Applications, vol. 54, 2020, doi: 10.1016/j.jisa.2020.102540.

S. Rana and D. Mishra, “Lattice-based key agreement protocol under ringlwe problem for iot-enabled smart devices,” Sadhan ¯ a¯, vol. 46, no. 84, 2021, doi: 10.1007/s12046-021-01607-2.

A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology, pp. 47–53, 2000, doi: 10.1007/3-540-39568-7_5.

D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology—CRYPTO 2001, pp. 213–229, 2001, 10.1007/3-540-44647-8_13.

J. Zhang, J. Cui, H. Zhong, I. Bolodurina and L. Liu, “Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks,” in IEEE Transactions on Network Science and Engineering, vol. 8, no. 4, pp. 2982-2994, 2021, doi: 10.1109/TNSE.2020.3029784.

I. Ali, M. Gervais, E. Ahene, and F. Li, “A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in vanets,” Journal of Systems Architecture, vol. 99, 2019, doi: 10.1016/j.sysarc.2019.101636.

S. M. Pournaghi, B. Zahednejad, M. Bayat, and Y. Farjami, “Necppa: A novel and efficient conditional privacy-preserving authentication scheme for vanet,” Computer Networks, vol. 134, pp. 78–92, 2018, doi: 10.1016/j.comnet.2018.01.015.

M. Bayat, M. Pournaghi, M. Rahimi, and M. Barmshoory, “Nera: A new and efficient rsu based authentication scheme for vanets,” Wireless networks, vol. 26, pp. 3083–3098, 2020, doi: 10.1007/s11276-019-02039-x.

J. Cui, J. Chen, H. Zhong, J. Zhang and L. Liu, “Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks,” in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 2, pp. 1247-1259, 2022, doi: 10.1109/TITS.2020.3023797.

J. Zhang, H. Zhong, J. Cui, M. Tian, Y. Xu and L. Liu, “Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks,” in IEEE Transactions on Vehicular Technology, vol. 69, no. 7, pp. 7940-7954, 2020, doi: 10.1109/TVT.2020.2994144.

F. Li, Y. Cui, J. Wang, H. Zhou, X. Wang, and Q. Yang, “Lattice-based batch authentication scheme with dynamic identity revocation in vanet,” International Journal of Intelligent Systems, vol. 37, no. 11, pp. 9442– 9460, 2022, doi: 10.1002/int.23004.

B. Chen, Z. Wang, T. Xiang, J. Yang, D. He, and K.-K. R. Choo, “Bcgs: Blockchain-assisted privacy-preserving cross-domain authentication for vanets,” Vehicular Communications, vol. 41, 2023, doi: 10.1016/j.vehcom.2023.100602.

J. Zhang, H. Fang, H. Zhong, J. Cui and D. He, “BlockchainAssisted Privacy-Preserving Traffic Route Management Scheme for FogBased Vehicular Ad-Hoc Networks,” in IEEE Transactions on Network and Service Management, vol. 20, no. 3, pp. 2854-2868, 2023, doi: 10.1109/TNSM.2023.3238307.

P. Mundhe, V. K. Yadav, S. Verma and S. Venkatesan, “Efficient Lattice-Based Ring Signature for Message Authentication in VANETs,” in IEEE Systems Journal, vol. 14, no. 4, pp. 5463-5474, 2020, doi: 10.1109/JSYST.2020.2980297.

H. Liu, Y. Sun, Y. Xu, R. Xu, and Z. Wei, “A secure lattice-based anonymous authentication scheme for vanets,” Journal of the Chinese Institute of Engineers, vol. 42, no. 1, pp. 66–73, 2019, doi: 10.1080/02533839.2018.1537804.

D. Dharminder and D. Mishra, “Lcppa: Lattice-based conditional privacy preserving authentication in vehicular communication,” Transactions on Emerging Telecommunications Technologies, vol. 31, no. 2, 2020, doi: 10.1002/ett.3810.

Q. Li, D. He, Z. Yang, Q. Xie and K. -K. R. Choo, “Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network,” in IEEE Transactions on Vehicular Technology, vol. 71, no. 4, pp. 4336-4347, 2022, doi: 10.1109/TVT.2022.3147875.

S. K. Basha and T. Shankar, “Fuzzy based multi-hop broadcasting in high-mobility vanets,” International Journal of Computer Science & Network Security, vol. 21, no. 3, pp. 165–171, 2021, doi: 10.22937/IJCSNS.2021.21.3.22.

J. Naskath, B. Paramasivan, and H. Aldabbas, “A study on modeling vehicles mobility with mlc for enhancing vehicle-to-vehicle connectivity in vanet,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 8255–8264, 2021, doi: 10.1007/s12652-020-02559-x.

P. Sehrawat and M. Chawla, “Interpretation and investigations of topology based routing protocols applied in dynamic system of vanet,” Wireless Personal Communications, vol. 128, no. 3, pp. 2259–2285, 2023, doi: 10.1007/s11277-022-10042-3.

H. Wang, “Dynamic Topology Evolution and Multi-Objective Routing Optimization for Efficient VANET Communication,” in IEEE Access, vol. 13, pp. 36124-36134, 2025, doi: 10.1109/ACCESS.2025.3541003.

X. Wang, Y. Weng and H. Gao, “A Low-Latency and EnergyEfficient Multimetric Routing Protocol Based on Network Connectivity in VANET Communication,” in IEEE Transactions on Green Communications and Networking, vol. 5, no. 4, pp. 1761-1776, 2021, doi: 10.1109/TGCN.2021.3100526.

M. Wang, J. Mao, W. Zhao, X. Han, M. Li, C. Liao, H. Sun, and K. Wang, “Smart city transportation: A vanet edge computing model to minimize latency and delay utilizing 5g network,” Journal of Grid Computing, vol. 22, no. 25, 2024, doi: 10.1007/s10723-024-09747-5.

M. Al Shareeda, A. Khalil and W. Fahs, “Towards the Optimization of Road Side Unit Placement Using Genetic Algorithm,” 2018 International Arab Conference on Information Technology (ACIT), pp. 1-5, 2018, doi: 10.1109/ACIT.2018.8672687.

F. Shang and X. Deng, “A data sharing scheme based on blockchain for privacy protection certification of internet of vehicles,” Vehicular Communications, vol. 51, 2025, doi: 10.1016/j.vehcom.2024.100864.

M. A. Al-Shareeda, S. Manickam, M. A. Saare, and N. C. Arjuman, “Proposed security mechanism for preventing fake router advertisement attack in ipv6 link-local network,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 29, no. 1, pp. 518–526, 2022, doi: 10.11591/ijeecs.v29.i1.pp518-526.

N. H. Tawfeeq, M. Yousif, M. A. Al-Shareeda, M. A. Almaiah, and R. Shehab, “Lightweight and quantum-resistant authentication for the internet of drones (iod) using dilithium signatures.” International Journal of Innovative Research and Scientific Studies, vol. 8, no. 2, pp. 2842– 2853, 2025.

X. Zhang, H. Zhong, J. Cui, I. Bolodurina, C. Gu and D. He, “LSHSC: Lightweight and Secure Handover Scheme With Conditional PrivacyPreserving for Group-Based SDVN,” in IEEE Transactions on Dependable and Secure Computing, 2025, doi: 10.1109/TDSC.2025.3542105.

M. A. Al-Shareeda, M. Anbar, S. Manickam, I. H. Hasbullah, N. Abdullah, and M. M. Hamdi, “Ne-cppa: A new and efficient conditional privacypreserving authentication scheme for vehicular ad hoc networks (vanets),” Applied Mathematics & Information Sciences, vol. 14, pp. 957–966, 2020, doi: 10.18576/amis/140602.

Z. S. Alzaidi, A. A. Yassin, Z. A. Abduljabbar, and V. O. Nyangaresi, “A fog computing and blockchain-based anonymous authentication scheme to enhance security in vanet environments,” Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19143–19153, 2025, doi: 10.48084/etasr.8663.

A. A. Almazroi, E. A. Aldhahri, M. A. Al-Shareeda, and S. Manickam, “Eca-vfog: An efficient certificateless authentication scheme for 5gassisted vehicular fog computing,” Plos one, vol. 18, no. 6, 2023, doi: 10.1371/journal.pone.0287291.

J. Lai, X. Zhang, S. Liu, S. Zhong, and A. J. Moshayedi, “Blockchainbased vanet edge computing-assisted cross-vehicle enterprise authentication scheme,” Computer Communications, vol. 231, 2025, doi: 10.1016/j.comcom.2024.108040.

S. Chinnaperumal et al., “Decentralized energy optimization using blockchain with battery storage and electric vehicle networks,” Scientific Reports, vol. 15, no. 1, 2025, doi: 10.1038/s41598-025-86775-5.

M. A. Al-Shareeda, M. Anbar, S. Manickam, and I. H. Hasbullah, “Password-guessing attack-aware authentication scheme based on chinese remainder theorem for 5g-enabled vehicular networks,” Applied Sciences, vol. 12, no. 3, 2022, doi: 10.3390/app12031383.

J. Zhang, C. Luo, Y. Jiang and G. Min, “Security in 6G-Based Autonomous Vehicular Networks: Detecting Network Anomalies With Decentralized Federated Learning,” in IEEE Vehicular Technology Magazine, vol. 20, no. 1, pp. 83-93, 2025, doi: 10.1109/MVT.2024.3520907.

V. Rajkumar, E. Kavitha, E. Ranjith, and R. Aruna Kirithika, “Apcoblockchain integration for data trust and congestion control in vehicular networks,” Telecommunication Systems, vol. 88, no. 15, 2025, doi: 10.1007/s11235-024-01233-3.

M. A. A. Shareeda et al., “Proposed efficient conditional privacypreserving authentication scheme for v2v and v2i communications based on elliptic curve cryptography in vehicular ad hoc networks,” in International Conference on Advances in Cybersecurity, pp. 588–603, 2021, doi: 10.1007/978-981-33-6835-4_39.

W. Wang, B. Yan, B. Chai, R. Shen, A. Dong, and J. Yu, “Ebias: Ecc-enabled blockchain-based identity authentication scheme for iot device,” High-Confidence Computing, vol. 5, no. 1, 2025, doi: 10.1016/j.hcc.2024.100240.

A. A. A. Almazroi, M. A. Alqarni, M. A. Al-Shareeda, and S. Manickam, “L-cppa: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5g-enabled vehicular system,” PLOS ONE, vol. 18, 2023, doi: 10.1371/journal.pone.0292690.

A. Manasrah, Q. Yaseen, H. Al-Aqrabi and L. Liu, “Identity-Based Authentication in VANETs: A Review,” in IEEE Transactions on Intelligent Transportation Systems, vol. 26, no. 4, pp. 4260-4282, 2025, doi: 10.1109/TITS.2025.3528932.

D. Zhu and Y. Guan, “Secure and Lightweight Conditional PrivacyPreserving Identity Authentication Scheme for VANET,” in IEEE Sensors Journal, vol. 24, no. 21, pp. 35743-35756, 2024, doi: 10.1109/JSEN.2024.3431557.

H. Sun, J. Wang, J. Weng and W. Tan, “KG-ID: Knowledge Graph-Based Intrusion Detection on In-Vehicle Network,” in IEEE Transactions on Intelligent Transportation Systems, vol. 26, no. 4, pp. 4988-5000, 2025, doi: 10.1109/TITS.2025.3530155.

A. A. A. Almazroi, M. H. Alkinani, M. A. Al-Shareeda, and S. Manickam, “A novel ddos mitigation strategy in 5g-based vehicular networks using chebyshev polynomials,” Arabian Journal for Science and Engineering, vol. 49, pp. 11991–12004, 2024, doi: 10.1007/s13369-023-08535-9.

Y. Zhou et al., “An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs,” in IEEE Internet of Things Journal, vol. 10, no. 11, pp. 10052-10065, 2023, doi: 10.1109/JIOT.2023.3236699.

T. Nandy et al., “A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs,” in IEEE Sensors Journal, vol. 21, no. 18, pp. 20998-21011, 2021, doi: 10.1109/JSEN.2021.3097172.

Z. Ghaleb Al-Mekhlafi et al., “Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing,” in IEEE Access, vol. 12, pp. 100152-100166, 2024, doi: 10.1109/ACCESS.2024.3429179.

S. Zhang, Y. Liu, Y. Xiao, and R. He, “A trust based adaptive privacy preserving authentication scheme for vanets,” Vehicular Communications, vol. 37, 2022, doi: 10.1016/j.vehcom.2022.100516.

B. A. Mohammed et al., “Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing,” in IEEE Access, vol. 12, pp. 33089-33099, 2024, doi: 10.1109/ACCESS.2024.3372390.

M. A. Al-Shareeda, T. Gaber, M. A. Alqarni, M. H. Alkinani, A. A. Almazroey and A. A. Almazroi, “Chebyshev Polynomial Based Emergency Conditions with Authentication Scheme for 5G-Assisted Vehicular Fog Computing,” in IEEE Transactions on Dependable and Secure Computing, 2025, doi: 10.1109/TDSC.2025.3553868.

F. Ahmad, A. Adnane, V. N. Franqueira, F. Kurugollu, and L. Liu, “Man-in-the-middle attacks in vehicular ad-hoc networks: Evaluating the impact of attackers’ strategies,” Sensors, vol. 18, no. 11, 2018, doi: 10.3390/s18114040.

B. A. Mohammed, M. A. Al-Shareeda, Z. G. Al-Mekhlafi, J. S. Alshudukhi and K. A. Al-Dhlan, “HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks,” in IEEE Access, vol. 12, pp. 6251-6261, 2024, doi: 10.1109/ACCESS.2024.3351278.

D. Javeed, U. MohammedBadamasi, C. O. Ndubuisi, F. Soomro, and M. Asif, “Man in the middle attacks: Analysis, motivation and prevention,” International Journal of Computer Networks and Communications Security, vol. 8, no. 7, pp. 52–58, 2020.

A. A. A. Almazroi, M. A. Alqarni, M. A. Al-Shareeda, M. H. Alkinani, A. A. Almazroey, and T. Gaber, “Fca-vbn: Fog computing-based authentication scheme for 5g-assisted vehicular blockchain network,” Internet Things, vol. 25, 2024, doi: 10.1016/j.iot.2024.101096.

A. Ahmad and S. Jagatheswari, “LBA-PAKE: Lattice-Based Anonymous Password Based Authentication Key Exchange Scheme for VANET,” 2023 12th International Conference on Advanced Computing (ICoAC), pp. 1-8, 2023, doi: 10.1109/ICoAC59537.2023.10249969.

M. Ge, S. Kumari, and C.-M. Chen, “Authpfs: A method to verify perfect forward secrecy in authentication protocols,” Journal of Network Intelligence, vol. 7, no. 3, pp. 734–750, 2022.

Downloads

Published

2025-06-25

How to Cite

[1]
M. A. Saare, A. K. Mattar, S. A. Sari, and S. Y. Wong, “Design and Evaluation of Secure Software Architectures for 5G-Enabled Vehicular Driving System”, J Robot Control (JRC), vol. 6, no. 4, pp. 1665–1680, Jun. 2025.

Issue

Section

Articles

Most read articles by the same author(s)