A Privacy-Preserving Reliable Authentication Scheme for 6G-Enabled Internet of Vehicular Edge Computing Networks
Received: 16 April 2025 | Revised: 18 July 2025 and 4 September 2025 | Accepted: 6 September 2025 | Online: 25 November 2025
Corresponding author: Vijayalaxmi S. Sadlapur
Abstract
To meet the delay-awareness and compute-intensive requirements of the Internet of Vehicles (IoV) for providing smart driving assistance systems, the computational process is offloaded to different vehicles, Roadside Units (RSUs), or Vehicular Edge Computing (VEC) servers enabled by 6G networks. However, the untrustworthiness of node behavior makes meeting the security requirements and privacy constraints of vehicles a challenging task in 6G-enabled IoV edge networks. Recently, trust metrics have been designed to authenticate vehicles; however, the reliability of offloading aggregation has not been considered during the authentication process. This work introduces a novel edge-based aggregation model to improve fusion accuracy with higher noise levels to enhance vehicle privacy. A new approach, namely the Privacy-Preserving Reliable Authentication (PPRA) scheme, is proposed to support smart driving assistance systems. The PPRA scheme introduces an effective aggregation mechanism with higher noise levels and an incentive-based reputation model. Furthermore, a reliable authentication model is proposed to identify malicious and trusted vehicles. In addition, a Nash equilibrium game-based model is introduced to reduce communication failures in 6G-enabled Internet-of-VEC (IoVEC) networks. The PPRA scheme improves throughput and communication efficiency with minimal communication failures compared with the existing Enhanced Privacy-Preserving Security (EPPS) method.
Keywords:
aggregation, delay, Internet of Vehicles (IoV), overhead, privacy, reputation metrics, Vehicle Ad Hoc Networks (VANETs), Vehicular Edge Computing (VEC)Downloads
References
Y. Yigit, L. A. Maglaras, W. J. Buchanan, B. Canberk, H. Shin, and T. Q. Duong, "AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks," IEEE Internet of Things Journal, vol. 11, no. 22, pp. 36168–36181, Nov. 2024. DOI: https://doi.org/10.1109/JIOT.2024.3455089
Y. Yigit, I. Panitsas, L. Maglaras, L. Tassiulas, and B. Canberk, "Cyber-Twin: Digital Twin-Boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks," in ICC 2024 - IEEE International Conference on Communications, Denver, CO, USA, 2024, pp. 2167–2172. DOI: https://doi.org/10.1109/ICC51166.2024.10622784
L. U. Khan et al., "Federated Learning for Digital Twin-Based Vehicular Networks: Architecture and Challenges," IEEE Wireless Communications, vol. 31, no. 2, pp. 156–162, Apr. 2024. DOI: https://doi.org/10.1109/MWC.012.2200373
H. Guo, Y. Wang, J. Liu, and C. Liu, "Multi-UAV Cooperative Task Offloading and Resource Allocation in 5G Advanced and Beyond," IEEE Transactions on Wireless Communications, vol. 23, no. 1, pp. 347–359, Jan. 2024. DOI: https://doi.org/10.1109/TWC.2023.3277801
M. Deng et al., "Reconfigurable Intelligent Surfaces Enabled Vehicular Communications: A Comprehensive Survey of Recent Advances and Future Challenges," IEEE Transactions on Intelligent Vehicles, 2024. DOI: https://doi.org/10.1109/TIV.2024.3476934
H. N. Abishu, A. M. Seid, R. H. Jhaveri, T. R. Gadekallu, A. Erbad, and M. Guizani, "Blockchain-Empowered Resource Allocation in HAPS-assisted IoV Digital Twin Networks: A Federated DRL Approach," IEEE Transactions on Intelligent Vehicles, 2024. DOI: https://doi.org/10.1109/TIV.2024.3492015
Q. Xie, Z. Sun, Q. Xie, and Z. Ding, "A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain," IEEE Access, vol. 11, pp. 97840–97851, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3308601
H. Amari, Z. A. E. Houda, L. Khoukhi, and L. H. Belguith, "Trust Management in Vehicular Ad-Hoc Networks: Extensive Survey," IEEE Access, vol. 11, pp. 47659–47680, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3268991
I. U. Din, K. A. Awan, and A. Almogren, "Secure and Privacy-Preserving Trust Management System for Trustworthy Communications in Intelligent Transportation Systems," IEEE Access, vol. 11, pp. 65407–65417, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3290911
A. Bibi et al., "TR-Block: A Trustable Content Delivery Approach in VANET Through Blockchain," IEEE Access, vol. 12, pp. 60863–60875, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3386461
A. Malik, M. Z. Khan, S. M. Qaisar, M. Faisal, and G. Mehmood, "An Efficient Approach for the Detection and Prevention of Gray-Hole Attacks in VANETs," IEEE Access, vol. 11, pp. 46691–46706, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3274650
L. Xiong, Q. Li, L. Tang, F. Li, and X. Yang, "Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks," Future Generation Computer Systems, vol. 163, Feb. 2025, Art. no. 107530. DOI: https://doi.org/10.1016/j.future.2024.107530
H. Han, M. Zhang, Z. Xu, X. Dong, and Z. Wang, "Decentralized Trust Management and Incentive Mechanisms for Secure Information Sharing in VANET," IEEE Access, vol. 12, pp. 124414–124427, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3453368
M. A. Al Sibahee, V. O. Nyangaresi, Z. A. Abduljabbar, C. Luo, J. Zhang, and J. Ma, "Two-Factor Privacy-Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks," IEEE Internet of Things Journal, vol. 11, no. 8, pp. 14253–14266, Apr. 2024. DOI: https://doi.org/10.1109/JIOT.2023.3340259
Z. Zeng, Q. Zhou, K. Wei, N. Yang, and C. Tang, "BCS-CPP: A Blockchain and Collaborative Service-Based Conditional Privacy-Preserving Scheme for Internet of Vehicles," IEEE Transactions on Intelligent Vehicles, vol. 9, no. 2, pp. 4130–4144, Feb. 2024. DOI: https://doi.org/10.1109/TIV.2023.3327364
Z. Ma et al., "A Blockchain-Based Secure Distributed Authentication Scheme for Internet of Vehicles," IEEE Access, vol. 12, pp. 81471–81482, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3409361
C. Xu, P. Zhang, X. Xia, L. Kong, P. Zeng, and H. Yu, "Digital-Twin-Assisted Intelligent Secure Task Offloading and Caching in Blockchain-Based Vehicular Edge Computing Networks," IEEE Internet of Things Journal, vol. 12, no. 4, pp. 4128–4143, Feb. 2025. DOI: https://doi.org/10.1109/JIOT.2024.3482870
T. Nandy, R. Md Noor, R. Kolandaisamy, M. Y. I. Idris, and S. Bhattacharyya, "A review of security attacks and intrusion detection in the vehicular networks," Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 2, Feb. 2024, Art. no. 101945. DOI: https://doi.org/10.1016/j.jksuci.2024.101945
J. Akram, A. Anaissi, A. Akram, R. Singh Rathore, and R. H. Jhaveri, "Adversarial Label-Flipping Attack and Defense for Anomaly Detection in Spatial Crowdsourcing UAV Services," IEEE Transactions on Consumer Electronics, vol. 71, no. 1, pp. 2163–2174, Feb. 2025. DOI: https://doi.org/10.1109/TCE.2024.3448541
X. Lu et al., "Blockchain-Enabled Secure Offloading for VEC: A Multi-Agent Reinforcement Learning Approach," IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 2978–2995, May 2025. DOI: https://doi.org/10.1109/TDSC.2024.3523561
Z. Li, J. Gong, X. Xiong, and D. Wang, "Multi-Slot Secure Offloading and Resource Management in VEC Networks: A Deep Reinforcement Learning-Based Method," IEEE Access, vol. 13, pp. 4533–4546, 2025. DOI: https://doi.org/10.1109/ACCESS.2024.3524636
Y. Chen, J. Wu, S. Ye, W. Li, and Z. Xu, "Budget-Constrained Resource Allocation and Pricing in VEC: A MSMLMF Stackelberg Game With Contract Incentive Mechanism," IEEE Internet of Things Journal, vol. 12, no. 5, pp. 5050–5067, Mar. 2025. DOI: https://doi.org/10.1109/JIOT.2024.3486378
M. A. Al-Absi et al., "Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network," Sensors, vol. 21, no. 14, Jul. 2021, Art. no. 4935. DOI: https://doi.org/10.3390/s21144935
N. Gadde, R. Shivaswamy, R. B. H. Siddamal, G. Gowrishankar, G. T. Raju, and S. S. P. Vijay, "Hybrid resource optimization strategy in heterogeneous wireless networks," Indonesian Journal of Electrical Engineering and Computer Science, vol. 37, no. 2, pp. 829–838, Feb. 2025. DOI: https://doi.org/10.11591/ijeecs.v37.i2.pp829-838
E. C. P. Neto et al., "CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus," Internet of Things, vol. 26, Jul. 2024, Art. no. 101209. DOI: https://doi.org/10.1016/j.iot.2024.101209
Downloads
How to Cite
License
Copyright (c) 2025 Vijayalaxmi S. Sadlapur, Nayana Hegde

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
