A Privacy-Preserving Reliable Authentication Scheme for 6G-Enabled Internet of Vehicular Edge Computing Networks

Authors

Volume: 15 | Issue: 6 | Pages: 28810-28817 | December 2025 | https://doi.org/10.48084/etasr.11534

Abstract

To meet the delay-awareness and compute-intensive requirements of the Internet of Vehicles (IoV) for providing smart driving assistance systems, the computational process is offloaded to different vehicles, Roadside Units (RSUs), or Vehicular Edge Computing (VEC) servers enabled by 6G networks. However, the untrustworthiness of node behavior makes meeting the security requirements and privacy constraints of vehicles a challenging task in 6G-enabled IoV edge networks. Recently, trust metrics have been designed to authenticate vehicles; however, the reliability of offloading aggregation has not been considered during the authentication process. This work introduces a novel edge-based aggregation model to improve fusion accuracy with higher noise levels to enhance vehicle privacy. A new approach, namely the Privacy-Preserving Reliable Authentication (PPRA) scheme, is proposed to support smart driving assistance systems. The PPRA scheme introduces an effective aggregation mechanism with higher noise levels and an incentive-based reputation model. Furthermore, a reliable authentication model is proposed to identify malicious and trusted vehicles. In addition, a Nash equilibrium game-based model is introduced to reduce communication failures in 6G-enabled Internet-of-VEC (IoVEC) networks. The PPRA scheme improves throughput and communication efficiency with minimal communication failures compared with the existing Enhanced Privacy-Preserving Security (EPPS) method.

Keywords:

aggregation, delay, Internet of Vehicles (IoV), overhead, privacy, reputation metrics, Vehicle Ad Hoc Networks (VANETs), Vehicular Edge Computing (VEC)

Downloads

Download data is not yet available.

References

Y. Yigit, L. A. Maglaras, W. J. Buchanan, B. Canberk, H. Shin, and T. Q. Duong, "AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks," IEEE Internet of Things Journal, vol. 11, no. 22, pp. 36168–36181, Nov. 2024. DOI: https://doi.org/10.1109/JIOT.2024.3455089

Y. Yigit, I. Panitsas, L. Maglaras, L. Tassiulas, and B. Canberk, "Cyber-Twin: Digital Twin-Boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks," in ICC 2024 - IEEE International Conference on Communications, Denver, CO, USA, 2024, pp. 2167–2172. DOI: https://doi.org/10.1109/ICC51166.2024.10622784

L. U. Khan et al., "Federated Learning for Digital Twin-Based Vehicular Networks: Architecture and Challenges," IEEE Wireless Communications, vol. 31, no. 2, pp. 156–162, Apr. 2024. DOI: https://doi.org/10.1109/MWC.012.2200373

H. Guo, Y. Wang, J. Liu, and C. Liu, "Multi-UAV Cooperative Task Offloading and Resource Allocation in 5G Advanced and Beyond," IEEE Transactions on Wireless Communications, vol. 23, no. 1, pp. 347–359, Jan. 2024. DOI: https://doi.org/10.1109/TWC.2023.3277801

M. Deng et al., "Reconfigurable Intelligent Surfaces Enabled Vehicular Communications: A Comprehensive Survey of Recent Advances and Future Challenges," IEEE Transactions on Intelligent Vehicles, 2024. DOI: https://doi.org/10.1109/TIV.2024.3476934

H. N. Abishu, A. M. Seid, R. H. Jhaveri, T. R. Gadekallu, A. Erbad, and M. Guizani, "Blockchain-Empowered Resource Allocation in HAPS-assisted IoV Digital Twin Networks: A Federated DRL Approach," IEEE Transactions on Intelligent Vehicles, 2024. DOI: https://doi.org/10.1109/TIV.2024.3492015

Q. Xie, Z. Sun, Q. Xie, and Z. Ding, "A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain," IEEE Access, vol. 11, pp. 97840–97851, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3308601

H. Amari, Z. A. E. Houda, L. Khoukhi, and L. H. Belguith, "Trust Management in Vehicular Ad-Hoc Networks: Extensive Survey," IEEE Access, vol. 11, pp. 47659–47680, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3268991

I. U. Din, K. A. Awan, and A. Almogren, "Secure and Privacy-Preserving Trust Management System for Trustworthy Communications in Intelligent Transportation Systems," IEEE Access, vol. 11, pp. 65407–65417, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3290911

A. Bibi et al., "TR-Block: A Trustable Content Delivery Approach in VANET Through Blockchain," IEEE Access, vol. 12, pp. 60863–60875, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3386461

A. Malik, M. Z. Khan, S. M. Qaisar, M. Faisal, and G. Mehmood, "An Efficient Approach for the Detection and Prevention of Gray-Hole Attacks in VANETs," IEEE Access, vol. 11, pp. 46691–46706, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3274650

L. Xiong, Q. Li, L. Tang, F. Li, and X. Yang, "Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks," Future Generation Computer Systems, vol. 163, Feb. 2025, Art. no. 107530. DOI: https://doi.org/10.1016/j.future.2024.107530

H. Han, M. Zhang, Z. Xu, X. Dong, and Z. Wang, "Decentralized Trust Management and Incentive Mechanisms for Secure Information Sharing in VANET," IEEE Access, vol. 12, pp. 124414–124427, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3453368

M. A. Al Sibahee, V. O. Nyangaresi, Z. A. Abduljabbar, C. Luo, J. Zhang, and J. Ma, "Two-Factor Privacy-Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks," IEEE Internet of Things Journal, vol. 11, no. 8, pp. 14253–14266, Apr. 2024. DOI: https://doi.org/10.1109/JIOT.2023.3340259

Z. Zeng, Q. Zhou, K. Wei, N. Yang, and C. Tang, "BCS-CPP: A Blockchain and Collaborative Service-Based Conditional Privacy-Preserving Scheme for Internet of Vehicles," IEEE Transactions on Intelligent Vehicles, vol. 9, no. 2, pp. 4130–4144, Feb. 2024. DOI: https://doi.org/10.1109/TIV.2023.3327364

Z. Ma et al., "A Blockchain-Based Secure Distributed Authentication Scheme for Internet of Vehicles," IEEE Access, vol. 12, pp. 81471–81482, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3409361

C. Xu, P. Zhang, X. Xia, L. Kong, P. Zeng, and H. Yu, "Digital-Twin-Assisted Intelligent Secure Task Offloading and Caching in Blockchain-Based Vehicular Edge Computing Networks," IEEE Internet of Things Journal, vol. 12, no. 4, pp. 4128–4143, Feb. 2025. DOI: https://doi.org/10.1109/JIOT.2024.3482870

T. Nandy, R. Md Noor, R. Kolandaisamy, M. Y. I. Idris, and S. Bhattacharyya, "A review of security attacks and intrusion detection in the vehicular networks," Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 2, Feb. 2024, Art. no. 101945. DOI: https://doi.org/10.1016/j.jksuci.2024.101945

J. Akram, A. Anaissi, A. Akram, R. Singh Rathore, and R. H. Jhaveri, "Adversarial Label-Flipping Attack and Defense for Anomaly Detection in Spatial Crowdsourcing UAV Services," IEEE Transactions on Consumer Electronics, vol. 71, no. 1, pp. 2163–2174, Feb. 2025. DOI: https://doi.org/10.1109/TCE.2024.3448541

X. Lu et al., "Blockchain-Enabled Secure Offloading for VEC: A Multi-Agent Reinforcement Learning Approach," IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 3, pp. 2978–2995, May 2025. DOI: https://doi.org/10.1109/TDSC.2024.3523561

Z. Li, J. Gong, X. Xiong, and D. Wang, "Multi-Slot Secure Offloading and Resource Management in VEC Networks: A Deep Reinforcement Learning-Based Method," IEEE Access, vol. 13, pp. 4533–4546, 2025. DOI: https://doi.org/10.1109/ACCESS.2024.3524636

Y. Chen, J. Wu, S. Ye, W. Li, and Z. Xu, "Budget-Constrained Resource Allocation and Pricing in VEC: A MSMLMF Stackelberg Game With Contract Incentive Mechanism," IEEE Internet of Things Journal, vol. 12, no. 5, pp. 5050–5067, Mar. 2025. DOI: https://doi.org/10.1109/JIOT.2024.3486378

M. A. Al-Absi et al., "Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network," Sensors, vol. 21, no. 14, Jul. 2021, Art. no. 4935. DOI: https://doi.org/10.3390/s21144935

N. Gadde, R. Shivaswamy, R. B. H. Siddamal, G. Gowrishankar, G. T. Raju, and S. S. P. Vijay, "Hybrid resource optimization strategy in heterogeneous wireless networks," Indonesian Journal of Electrical Engineering and Computer Science, vol. 37, no. 2, pp. 829–838, Feb. 2025. DOI: https://doi.org/10.11591/ijeecs.v37.i2.pp829-838

E. C. P. Neto et al., "CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus," Internet of Things, vol. 26, Jul. 2024, Art. no. 101209. DOI: https://doi.org/10.1016/j.iot.2024.101209

Downloads

How to Cite

[1]
V. S. Sadlapur and N. Hegde, “A Privacy-Preserving Reliable Authentication Scheme for 6G-Enabled Internet of Vehicular Edge Computing Networks”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 6, pp. 28810–28817, Dec. 2025.

Metrics

Abstract Views: 296
PDF Downloads: 218

Metrics Information