Artificial Intelligence-Driven and Secure 5G-VANET Architectures for Future Transportation Systems
DOI:
https://doi.org/10.18196/jrc.v6i4.26295Keywords:
Artificial Intelligence in VANETs, 5G-Enabled Vehicular Networks, Secure VANET Architectures, Intelligent Transportation Systems (ITS), Edge-Assisted AI Computing, Software-Defined Networking (SDN), Blockchain-based Trust ManagementAbstract
The advent of 5G has opened a new era of intelligent, adaptive and secure VANETs that is envisaged to serve as the backbone network architecture for next generation of vehicular transportation systems. In this work, we present a connected 5G VANETs-to-Edge Computing systems with Artificial Intelligence (AI) infrastructure to improve system adaptability, anomaly detection, trust management, and real-time decisionmaking. Crucial enabling technologies like Software-Defined Networking (SDN). Mobile Edge Computing (MEC), and millimeterwave communication are investigated in detail. We examine key security threats such as identity forgery, data interception, and denial-of-service attacks, and assess the AI-enhanced defense measures such as intrusion detection systems and blockchainbased trust models. Applications, like autonomous platooning, and collaborative vehicle authentication provide additional examples of AI technologies’ added value in the context of vehicular communications and safety. The paper concludes by providing open issues and future directions, including quantum-resistant protocols, lightweight AI models and cognitive networking in the context AI-driven 5G-VANET ecosystems.
References
J. B. Kenney, “Dedicated Short-Range Communications (DSRC) Standards in the United States,” in Proceedings of the IEEE, vol. 99, no. 7, pp. 1162-1182, 2011, doi: 10.1109/JPROC.2011.2132790.
M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “Unmanned aerial vehicle: a review and future directions,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 2, pp. 778–786, 2023, doi: 10.11591/ijeecs.v30.i2.pp778-786.
M. R. Alboalebrah and S. Al-augby, “Unveiling the causes of fatal road accidents in iraq: An association rule mining approach using the apriori algorithm,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 1–11, 2025, doi: 10.63180/jcsra.thestap.2025.2.1.
J. Clancy et al., “Wireless Access for V2X Communications: Research, Challenges and Opportunities,” in IEEE Communications Surveys & Tutorials, vol. 26, no. 3, pp. 2082-2119, 2024, doi: 10.1109/COMST.2024.3384132.
K. Herman Muraro Gularte et al., “Integrating Cybersecurity in V2X: A Review of Simulation Environments,” in IEEE Access, vol. 12, pp. 177946-177985, 2024, doi: 10.1109/ACCESS.2024.3504404.
H. Zhong, L. Wang, J. Cui, J. Zhang and I. Bolodurina, “Secure Edge Computing-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks,” in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3774-3786, 2023, doi: 10.1109/TIFS.2023.3287731.
M. A. Al-Shareeda, A. M. Ali, M. A. Hammoud, Z. H. M. Kazem, and M. A. Hussein, “Secure iot-based real-time water level monitoring system using esp32 for critical infrastructure,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 43–52, 2025, doi: 10.63180/jcsra.thestap.2025.2.4.
B. N. Alhasnawi, S. M. M. Almutoki, F. F. K. Hussain, A. Harrison, B. Bazooyar, M. Zanker, and V. Bures, “A new methodology for ˇ reducing carbon emissions using multi-renewable energy systems and artificial intelligence,” Sustainable Cities and Society, vol. 114, 2024, doi: 10.1016/j.scs.2024.105721.
B. N. Alhasnawi, M. Zanker, and V. Bures, “A smart electricity markets ˇ for a decarbonized microgrid system,” Electrical Engineering, pp. 1–21, 2024, doi: 10.1007/s00202-024-02699-9.
O. Aljumaiah, W. Jiang, S. R. Addula, and M. A. Almaiah, “Analyzing cybersecurity risks and threats in it infrastructure based on nist framework,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 12–26, 2025, doi: 10.63180/jcsra.thestap.2025.2.2.
S. Chen, J. Hu, Y. Shi and L. Zhao, “LTE-V: A TD-LTE-Based V2X Solution for Future Vehicular Network,” in IEEE Internet of Things Journal, vol. 3, no. 6, pp. 997-1005, 2016, doi: 10.1109/JIOT.2016.2611605.
A. Hussain, M. A. Saare, O. M. Jasim, and A. A. Mahdi, “A heuristic evaluation of iraq e-portal,” Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 10, no. 1-10, pp. 103–107, 2018.
A. A. A. Almazroi, M. A. Alqarni, M. A. Al-Shareeda, M. H. Alkinani, A. A. Almazroey, and T. Gaber, “Fca-vbn: Fog computing-based authentication scheme for 5g-assisted vehicular blockchain network,” Internet Things, vol. 25, 2024, doi: 10.1016/j.iot.2024.101096.
M. A. AbouElaz, B. N. Alhasnawi, B. E. Sedhom, and V. Bures, “Anfis- ˇ optimized control for resilient and efficient supply chain performance in smart manufacturing,” Results in Engineering vol. 25, 2025, doi: 10.1016/j.rineng.2025.104262.
M. Saare, A. Hussain, and W. S. Yue, “Investigating the effectiveness of mobile peer support to enhance the quality of life of older adults: A systematic literature review,” International Journal of Interactive Mobile Technologies, vol. 13, no. 4, pp. 130–139, 2019, doi: 10.3991/ijim.v13i04.10525.
S. Chen et al., “Vehicle-to-Everything (v2x) Services Supported by LTEBased Systems and 5G,” in IEEE Communications Standards Magazine, vol. 1, no. 2, pp. 70-76, 2017, doi: 10.1109/MCOMSTD.2017.1700015.
R. Almanasir, D. Al-solomon, S. Indrawes, M. A. Almaiah, U. Islam, and M. Alshar’e, “Classification of threats and countermeasures of cloud computing,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 27–42, 2025. doi: 10.63180/jcsra.thestap.2025.2.3.
B. N. Alhasnawi and B. H. Jasim, “SCADA controlled smart home using Raspberry Pi3,” 2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), pp. 1-6, 2018, doi: 10.1109/ICASEA.2018.8370946.
B. N. Alhasnawi, M. Zanker, and V. Bures, “A new smart charging ˇ electric vehicle and optimal dg placement in active distribution networks with optimal operation of batteries,” Results in Engineering, vol. 25, 2025, doi: 10.1016/j.rineng.2025.104521.
S. Otoom, “Risk auditing for digital twins in cyber physical systems: A systematic review,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 1, pp. 22–35, 2025, doi: 10.63180/jcsra.thestap.2025.1.3.
M. Shafi et al., “5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice,” in IEEE Journal on Selected Areas in Communications, vol. 35, no. 6, pp. 1201-1221, 2017, doi: 10.1109/JSAC.2017.2692307.
R. Viterbo et al., “Evaluating the V2X Latency for Vehicle Positioning: A Comparison Between 5G-V2X and ITS-G5,” 2024 IEEE 8th Forum on Research and Technologies for Society and Industry Innovation (RTSI), pp. 271-276, 2024, doi: 10.1109/RTSI61910.2024.10761733.
B. N. Alhasnawi et al., “A novel efficient energy optimization in smart urban buildings based on optimal demand side management,” Energy Strategy Reviews, vol. 54, 2024, doi: 10.1016/j.esr.2024.101461.
M. Jamil, M. Farhan, F. Ullah and G. Srivastava, “A Lightweight Zero Trust Framework for Secure 5G VANET Vehicular Communication,” in IEEE Wireless Communications, vol. 31, no. 6, pp. 136-141, 2024, doi: 10.1109/MWC.015.2300418.
D. Soldani and A. Manzalini, “Horizon 2020 and Beyond: On the 5G Operating System for a True Digital Society,” in IEEE Vehicular Technology Magazine, vol. 10, no. 1, pp. 32-42, 2015, doi: 10.1109/MVT.2014.2380581.
B. A. Mohammed, M. A. Al-Shareeda, Z. G. Al-Mekhlafi, J. S. Alshudukhi and K. A. Al-Dhlan, “HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks,” in IEEE Access, vol. 12, pp. 6251-6261, 2024, doi: 10.1109/ACCESS.2024.3351278.
N. H. B. Jemaludin, A. J. A. Al-Gburi, R. H. Elabd, T. Saeidi, M. F. Akbar, I. M. Ibrahim, and Z. Zakaria, “A comprehensive review on mimo antennas for 5g smartphones: mutual coupling techniques, comparative studies, sar analysis, and future directions,” Results in Engineering, vol. 23, 2024, doi: 10.1016/j.rineng.2024.102712.
T. S. Rappaport et al., “Millimeter Wave Mobile Communications for 5G Cellular: It Will Work!,” in IEEE Access, vol. 1, pp. 335-349, 2013, doi: 10.1109/ACCESS.2013.2260813.
R. A. Uzcategui, A. J. De Sucre and G. Acosta-Marum, “Wave: A tutorial,” in IEEE Communications Magazine, vol. 47, no. 5, pp. 126- 133, 2009, doi: 10.1109/MCOM.2009.4939288.
A. A. A. Almazroi, M. A. Alqarni, M. A. Al-Shareeda, and S. Manickam, “L-cppa: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5g-enabled vehicular system,” PLOS ONE, vol. 18, no. 10, 2023, doi: 10.1371/journal.pone.0292690.
A. Bazzi, S. Bartoletti, A. Zanella, and V. Martinez, “Performance analysis of ieee 802.11 p preamble insertion in c-v2x sidelink signals for co-channel coexistence,” Vehicular Communications, vol. 45, 2024, doi: 10.1016/j.vehcom.2023.100710.
J. Harri, F. Filali, C. Bonnet, and M. Fiore, “Vanetmobisim: generating ¨ realistic mobility patterns for vanets,” in Proceedings of the 3rd international workshop on Vehicular ad hoc networks, pp. 96–97, 2006, doi: 10.1145/1161064.1161084.
A. A. A. Almazroi, M. H. Alkinani, M. A. Al-Shareeda, and S. Manickam, “A novel ddos mitigation strategy in 5g-based vehicular networks using chebyshev polynomials,” Arabian Journal for Science and Engineering, vol. 49, pp. 11991–12004, 2023, doi: 10.1007/s13369-023- 08535-9.
K. Zheng, Q. Zheng, P. Chatzimisios, W. Xiang and Y. Zhou, “Heterogeneous Vehicular Networking: A Survey on Architecture, Challenges, and Solutions,” in IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2377-2396, 2015, doi: 10.1109/COMST.2015.2440103.
Z. Ghaleb Al-Mekhlafi et al., “Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing,” in IEEE Access, vol. 12, pp. 100152-100166, 2024, doi: 10.1109/ACCESS.2024.3429179.
C. -K. Toh, “Future Application Scenarios for MANET-Based Intelligent Transportation Systems,” Future Generation Communication and Networking (FGCN 2007), pp. 414-417, 2007, doi: 10.1109/FGCN.2007.131.
A. S. Akhter, M. Ahmed, A. Anwar, A. S. Shah, A.-S. K. Pathan, and A. Zengin, “Blockchain in vehicular ad hoc networks: Applications, challenges and solutions,” International Journal of Sensor Networks, vol. 40, no. 2, pp. 94–130, 2022.
M. A. Karabulut, A. F. M. Shahen Shah and H. Ilhan, “Performance Optimization by Using Artificial Neural Network Algorithms in VANETs,” 2019 42nd International Conference on Telecommunications and Signal Processing (TSP), pp. 633-636, 2019, doi: 10.1109/TSP.2019.8768830.
M. A. Al-Shareeda, T. Gaber, M. A. Alqarni, M. H. Alkinani, A. A. Almazroey and A. A. Almazroi, “Chebyshev Polynomial Based Emergency Conditions with Authentication Scheme for 5G-Assisted Vehicular Fog Computing,” in IEEE Transactions on Dependable and Secure Computing, 2025, doi: 10.1109/TDSC.2025.3553868.
M. A. Al-Shareeda, T. Gaber, M. A. Alqarni, M. H. Alkinani, A. A. Almazroey and A. A. Almazroi, “Chebyshev Polynomial Based Emergency Conditions with Authentication Scheme for 5G-Assisted Vehicular Fog Computing,” in IEEE Transactions on Dependable and Secure Computing, 2025, doi: 10.1109/TDSC.2025.3553868.
S. M. Hatim et al., “Vanets and internet of things (iot): A discussion,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 12, no. 1, pp. 218–224, 2018, doi: 0.11591/ ijeecs.v12.i1.pp218-224.
L. Wischhof and H. Rohling, “Congestion control in vehicular ad hoc networks,” IEEE International Conference on Vehicular Electronics and Safety, pp. 58-63, 2005, doi: 10.1109/ICVES.2005.1563614.
E. C. Eze, S.-J. Zhang, E.-J. Liu, and J. C. Eze, “Advances in vehicular ad-hoc networks (vanets): Challenges and road-map for future development,” International Journal of Automation and Computing, vol. 13, pp. 1–18, 2016, doi: 10.1007/s11633-015-0913-y.
B. A. Mohammed et al., “Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing,” in IEEE Access, vol. 12, pp. 33089-33099, 2024, doi: 10.1109/ACCESS.2024.3372390.
U. Mane and S. A. Kulkarni, “QoS realization for routing protocol on VANETs using combinatorial optimization,” 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1-5, 2013, doi: 10.1109/ICCCNT.2013.6726763.
Z. G. Al-Mekhlafi et al., “Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications,” in IEEE Access, vol. 12, pp. 71232-71247, 2024, doi: 10.1109/ACCESS.2024.3402336.
Shigang Chen and K. Nahrstedt, “Distributed quality-of-service routing in ad hoc networks,” in IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, pp. 1488-1505, 1999, doi: 10.1109/49.780354.
Chenxi Zhu and M. S. Corson, “QoS routing for mobile ad hoc networks,” Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 958-967, 2002, doi: 10.1109/INFCOM.2002.1019343.
A. Dua, N. Kumar, and S. Bawa, “A systematic review on routing protocols for vehicular ad hoc networks,” Vehicular Communications, vol. 1, no. 1, pp. 33–52, 2014, doi: 10.1016/j.vehcom.2014.01.001.
S. Bitam, A. Mellouk and S. Zeadally, “Bio-Inspired Routing Algorithms Survey for Vehicular Ad Hoc Networks,” in IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 843-867, 2015, doi: 10.1109/COMST.2014.2371828.
S. Kaur, T. C. Aseri, and S. Rani, “Qos aware routing in vehicular ad hoc networks: A survey,” International Journal of Computer & Mathematical Sciences, vol. 6, no. 4, pp. 1–6, 2017.
M. Muhammad and G. A. Safdar, “Survey on existing authentication issues for cellular-assisted v2x communication,” Vehicular Communications, vol. 12, pp. 50–65, 2018, doi: 10.1016/j.vehcom.2018.01.008.
Z. Ghaleb Al-Mekhlafi et al., “Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review,” in IEEE Sensors Journal, vol. 24, no. 19, pp. 29575-29602, 2024, doi: 10.1109/JSEN.2024.3436612.
M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, and H. Janicke, “Security for 4g and 5g cellular networks: A survey of existing authentication and privacy-preserving schemes,” Journal of Network and Computer Applications, vol. 101, pp. 55–82, 2018, doi: 10.1016/j.jnca.2017.10.017.
D. Kombate and Wanglina, “The Internet of Vehicles Based on 5G Communications,” 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 445-448, 2016, doi: 10.1109/iThingsGreenCom-CPSCom-SmartData.2016.105.
S. A. A. Shah, E. Ahmed, M. Imran and S. Zeadally, “5G for Vehicular Communications,” in IEEE Communications Magazine, vol. 56, no. 1, pp. 111-117, 2018, doi: 10.1109/MCOM.2018.1700467.
F. Jameel, Z. Hamid, F. Jabeen, S. Zeadally and M. A. Javed, “A Survey of Device-to-Device Communications: Research Issues and Challenges,” in IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2133- 2168, 2018, doi: 10.1109/COMST.2018.2828120.
M. Gholibeigi, N. Sarrionandia, M. Karimzadeh, M. Baratchi, H. van den Berg and G. Heijenk, “Reliable vehicular broadcast using 5G device-to-device communication,” 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC), pp. 1-8, 2017, doi: 10.1109/WMNC.2017.8248846.
M. Liyanage, I. Ahmad, A. B. Abro, A. Gurtov, and M. Ylianttila, A comprehensive guide to 5G security, 2018, doi: 10.1002/9781119293071.
K. Katsaros and M. Dianati, “A conceptual 5g vehicular networking architecture,” in 5G Mobile Communications, pp. 595–623, 2017, doi: 10.1007/978-3-319-34208-5_22.
C. Lai, R. Lu, D. Zheng and X. Shen, “Security and Privacy Challenges in 5G-Enabled Vehicular Networks,” in IEEE Network, vol. 34, no. 2, pp. 37-45, 2020, doi: 10.1109/MNET.001.1900220.
M. J. N. Mahi et al., “A Review on VANET Research: Perspective of Recent Emerging Technologies,” in IEEE Access, vol. 10, pp. 65760- 65783, 2022, doi: 10.1109/ACCESS.2022.3183605.
J. Qin, H. Zhu, Y. Zhu, L. Lu, G. Xue and M. Li, “POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks,” in IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 6, pp. 1770-1782, 2016, doi: 10.1109/TPDS.2015.2467392.
F. Lv et al., “An Empirical Study on Urban IEEE 802.11p Vehicle-toVehicle Communication,” 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1-9, 2016, doi: 10.1109/SAHCN.2016.7732969.
H. Zhou, W. Xu, J. Chen and W. Wang, “Evolutionary V2X Technologies Toward the Internet of Vehicles: Challenges and Opportunities,” in Proceedings of the IEEE, vol. 108, no. 2, pp. 308-323, 2020, doi: 10.1109/JPROC.2019.2961937.
W. Xu, H. A. Omar, W. Zhuang and X. S. Shen, “Delay Analysis of InVehicle Internet Access Via On-Road WiFi Access Points,” in IEEE Access, vol. 5, pp. 2736-2746, 2017, doi: 10.1109/ACCESS.2017.2669178.
N. Aung, W. Zhang, K. Sultan, S. Dhelim, and Y. Ai, “Dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in smart cities,” Digital Communications and Networks, vol. 7, no. 4, pp. 492–504, 2021, doi: 10.1016/j.dcan.2021.01.002.
L. Lv, Y. Shi, and W. Shen, “Mobility-as-a-service research trends of 5g-based vehicle platooning,” Service Oriented Computing and Applications, vol. 15, pp. 1–3, 2021, doi: 10.1007/s11761-020-00309-7.
A. Balador, A. Bazzi, U. Hernandez-Jayo, I. de la Iglesia, and H. Ahmadvand, “A survey on vehicular communication for cooperative truck platooning application,” Vehicular Communications, vol. 35, 2022, doi: 10.1016/j.vehcom.2022.100460s.
K. Li, W. Ni, E. Tovar and M. Guizani, “LCD: Low Latency Command Dissemination for a Platoon of Vehicles,” 2018 IEEE International Conference on Communications (ICC), pp. 1-6, 2018, doi: 10.1109/ICC.2018.8422933.
T. H. Luan, R. Lu, X. Shen and F. Bai, “Social on the road: enabling secure and efficient social networking on highways,” in IEEE Wireless Communications, vol. 22, no. 1, pp. 44-51, 2015, doi: 10.1109/MWC.2015.7054718.
Z. Yang, K. Yang, L. Lei, K. Zheng and V. C. M. Leung, “BlockchainBased Decentralized Trust Management in Vehicular Networks,” in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1495-1505, 2019, doi: 10.1109/JIOT.2018.2836144.
V. Kolesnikov, N. Matania, B. Pinkas, M. Rosulek, and N. Trieu, “Practical multi-party private set intersection from symmetric-key techniques,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1257–1272, 2017, doi: 10.1145/3133956.3134065.
C. Lai, D. Zheng, Q. Zhao, and X. Jiang, “Segm: A secure group management framework in integrated vanet-cellular networks,” Vehicular Communications, vol. 11, pp. 33–45, 2018, doi: 10.1016/j.vehcom.2018.01.004.
H. J. Jo, I. S. Kim and D. H. Lee, “Reliable Cooperative Authentication for Vehicular Networks,” in IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 4, pp. 1065-1079, 2018, doi: 10.1109/TITS.2017.2712772.
E. Fujisaki, “Sub-linear size traceable ring signatures without random oracles,” IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, vol. 95, no. 1, pp. 151–166, 2012.
X. Duan, Y. Liu and X. Wang, “SDN Enabled 5G-VANET: Adaptive Vehicle Clustering and Beamformed Transmission for Aggregated Traffic,” in IEEE Communications Magazine, vol. 55, no. 7, pp. 120-127, 2017, doi: 10.1109/MCOM.2017.1601160.
R. Kachhoria, S. Jaiswal, R. S. Kharat, S. Pede, S. D. Kale, R. A. Mahajan, P. Sharma, and C. B. Khadse, “Adaptive sdn-based network architecture for vehicle to vehicle communication using flexible optical networks for 5g,” Optical and Quantum Electronics, vol. 55, no. 1041, 2023, doi: 10.1007/s11082-023-05303-9.
S. N. Saleh and C. Fathy, “A novel deep-learning model for remote driver monitoring in sdn-based internet of autonomous vehicles using 5g technologies,” Applied Sciences, vol. 13, no. 2, 2023, doi: 10.3390/app13020875.
S. M. Karim, A. Habbal, S. A. Chaudhry and A. Irshad, “BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment,” in IEEE Access, vol. 11, pp. 36158-36175, 2023, doi: 10.1109/ACCESS.2023.3265959.
S. K. Dwivedi, R. Amin, S. Vollala and M. K. Khan, “B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs,” in IEEE Transactions on Network Science and Engineering, vol. 10, no. 6, pp. 3491-3504, 2023, doi: 10.1109/TNSE.2023.3264829.
A. M. Farooqi, M. A. Alam, S. I. Hassan, and S. M. Idrees, “A fog computing model for vanet to reduce latency and delay using 5g network in smart city transportation,” Applied Sciences, vol. 12, no. 4, 2022, doi: 10.3390/app12042083.
L. Nkenyereye, C. H. Liu, and J. Song, “Towards secure and privacy preserving collision avoidance system in 5g fog based internet of vehicles,” Future Generation Computer Systems, vol. 95, pp. 488–499, 2019, doi: 10.1016/j.future.2018.12.031.
U. Maan and Y. Chaba, “Deep q-network based fog node offloading strategy for 5 g vehicular adhoc network,” Ad Hoc Networks, vol. 120, 2021, doi: 10.1016/j.adhoc.2021.102565.
T. Perarasi, S. Vidhya, L. Moses M. and P. Ramya, “Malicious Vehicles Identifying and Trust Management Algorithm for Enhance the Security in 5G-VANET,” 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 269-275, 2020, doi: 10.1109/ICIRCA48905.2020.9183184.
P. Das, S. Ray, D. Sadhukhan and M. C. Govil, “5G Enabled VANET Architecture Incorporating Security and Trust Management Mechanism,” 2022 IEEE 6th Conference on Information and Communication Technology (CICT), pp. 1-6, 2022, doi: 10.1109/CICT56698.2022.9997842.
A. Gaurav, B. Gupta, F. J. G. Penalvo, N. Nedjah, and K. Psannis, “Ddos ˜ attack detection in vehicular ad-hoc network (vanet) for 5g networks,” Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions, pp. 263–278, 2022, doi: 10.1007/978- 3-030-85428-7_11.
S. Khan Tayyaba et al., “5G Vehicular Network Resource Management for Improving Radio Access Through Machine Learning,” in IEEE Access, vol. 8, pp. 6792-6800, 2020, doi: 10.1109/ACCESS.2020.2964697.
A. Selvakumar, S. Ramesh, T. Manikandan, G. Michael, U. Arul, and R. Gnanajeyaraman, “Microgrid based vanet monitoring and energy management in 5g networks by reinforcement deep learning techniques,” Computers and Electrical Engineering, vol. 111, 2023, doi: 10.1016/j.compeleceng.2023.108933.
V. K. Sharma, S. K. Mohapatra, S. Shitharth, S. Yonbawi, A. Yafoz, and S. Alahmari, “An optimization-based machine learning technique for smart home security using 5g,” Computers and Electrical Engineering, vol. 104, 2022, doi: 10.1016/j.compeleceng.2022.108434.
A. Zhang, L. Wang, X. Ye and X. Lin, “Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems,” in IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 662-675, 2017, doi: 10.1109/TIFS.2016.2631950. [
L. Buttyan, T. Holczer, A. Weimerskirch and W. Whyte, “SLOW: A ´ Practical pseudonym changing scheme for location privacy in VANETs,” 2009 IEEE Vehicular Networking Conference (VNC), pp. 1-8, 2009, doi: 10.1109/VNC.2009.5416380.
R. Hussain, Z. Rezaeifar, Y.-H. Lee, and H. Oh, “Secure and privacyaware traffic information as a service in vanet-based clouds,” Pervasive and Mobile Computing, vol. 24, pp. 194–209, 2015, doi: 10.1016/j.pmcj.2015.07.007.
J. Petit, F. Schaub, M. Feiri and F. Kargl, “Pseudonym Schemes in Vehicular Networks: A Survey,” in IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 228-255, 2015, doi: 10.1109/COMST.2014.2345420.
D. He, S. Zeadally, B. Xu and X. Huang, “An Efficient IdentityBased Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks,” in IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2681-2691, 2015, doi: 10.1109/TIFS.2015.2473820.
X. Pan, X. Cai, K. Song, T. Baker, T. R. Gadekallu and X. Yuan, “Location Recommendation Based on Mobility Graph With Individual and Group Influences,” in IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 8, pp. 8409-8420, 2023, doi: 10.1109/TITS.2022.3149869.
A. van Cleeff, W. Pieters and R. J. Wieringa, “Security Implications of Virtualization: A Literature Study,” 2009 International Conference on Computational Science and Engineering, pp. 353-358, 2009, doi: 10.1109/CSE.2009.267.
M. Hashem Eiza, Q. Ni and Q. Shi, “Secure and Privacy-Aware CloudAssisted Video Reporting Service in 5G-Enabled Vehicular Networks,” in IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 7868- 7881, 2016, doi: 10.1109/TVT.2016.2541862.
K. Mershad and H. Artail, “A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks,” in IEEE Transactions on Vehicular Technology, vol. 62, no. 2, pp. 536-551, 2013, doi: 10.1109/TVT.2012.2226613.
X. Feng and L. Wang, “S2PD: A Selective Sharing Scheme for Privacy Data in Vehicular Social Networks,” in IEEE Access, vol. 6, pp. 55139- 55148, 2018, doi: 10.1109/ACCESS.2018.2872789.
K. Boakye-Boateng, E. Kuada, E. Antwi-Boasiako and E. Djaba, “Encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads,” in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3925-3933, 2019, doi: 10.1109/JIOT.2019.2893172.
P. Andres-Maldonado, P. Ameigeiras, J. Prados-Garzon, J. J. RamosMunoz and J. M. Lopez-Soler, “Reduced M2M signaling communications in 3GPP LTE and future 5G cellular networks,” 2016 Wireless Days (WD), pp. 1-3, 2016, doi: 10.1109/WD.2016.7461499.
R. Jin, X. Zhong and S. Zhou, “The Access Procedure Design for Low Latency in 5G Cellular Network,” 2016 IEEE Globecom Workshops (GC Wkshps), pp. 1-6, 2016, doi: 10.1109/GLOCOMW.2016.7849058.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Murtaja Ali Saare, Mohamed Abdulrahman Abdulhamed, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, Rami Shehab

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is based on the work at https://journal.umy.ac.id/index.php/jrc under license from Creative Commons Attribution-ShareAlike 4.0 International License. You are free to:
- Share – copy and redistribute the material in any medium or format.
- Adapt – remix, transform, and build upon the material for any purpose, even comercially.
The licensor cannot revoke these freedoms as long as you follow the license terms, which include the following:
- Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions. You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
• Creative Commons Attribution-ShareAlike (CC BY-SA)
JRC is licensed under an International License