Tamper-Resilient and Sensor-Spoofing-Resistant Authentication for 5G-Connected Vehicular Edge Systems
Received: 15 July 2025 | Revised: 15 August 2025 and 26 August 2025 | Accepted: 30 August 2025 | Online: 8 December 2025
Corresponding author: Mahmood A. Al-Shareeda
Abstract
From the perspective of vehicular fog computing enabled by 5G, fast and secure authentication between Onboard Units (OBUs) and Fog Servers (FSs) is crucial. Threats such as combined physical tampering and sensor spoofing, along with emergency message forgery, can be devastating in practice, causing traffic accidents, privacy breaches, or service interruptions. This paper presents a six-phase, tamper-resilient authentication protocol tailored for 5G vehicular networks. It integrates entropy-based sensor verification and real-time tamper detection into a unified trust mechanism, alongside emergency-aware session handling. To ensure post-quantum resilience, forward secrecy, and lightweight performance, we employ Chebyshev polynomial cryptography and hash chains. The proposed scheme reduces computational time by 32% and communication overhead by 27% compared to existing protocols, demonstrating its effectiveness and robustness for real-time vehicular edge environments.
Keywords:
5G vehicular networks, fog computing, secure authentication, tamper detection, sensor spoofing, Chebyshev polynomial cryptography, emergency message integrity, post-quantum security, Trusted Execution Environment (TEE), vehicular edge computingDownloads
References
A. Behura, A. Kumar, and P. K. Jain, "A comparative performance analysis of vehicular routing protocols in intelligent transportation systems: A comparative performance analysis of vehicular routing protocols...," Telecommunication Systems, vol. 88, no. 1, Mar. 2025, Art. no. 26. DOI: https://doi.org/10.1007/s11235-024-01243-1
H. Al-Maliki, H. A. A. AL-Asadi, Z. A. Abduljabbar, and V. O. Nyangaresi, "Reliable Vehicular Ad Hoc Networks for Intelligent Transportation Systems based on the Snake Optimization Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18631–18639, Dec. 2024. DOI: https://doi.org/10.48084/etasr.8851
Z. G. Al-Mekhlaf et al., "A quantum-resilient lattice-based security framework for internet of medical things in healthcare systems," Journal of King Saud University Computer and Information Sciences, vol. 37, no. 6, Jul. 2025, Art. no. 126. DOI: https://doi.org/10.1007/s44443-025-00140-0
K. S. El Gayyar, A. I. Saleh, and L. M. Labib, "A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks," Peer-to-Peer Networking and Applications, vol. 15, no. 1, pp. 386–407, Jan. 2022. DOI: https://doi.org/10.1007/s12083-021-01197-0
O. Nazih, N. Benamar, H. Lamaazi, and H. Chaoui, "Toward Secure and Trustworthy Vehicular Fog Computing: A Survey," IEEE Access, vol. 12, pp. 35154–35171, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3371488
B. A. Mohammed et al., "Taxonomy-Based Lightweight Cryptographic Frameworks for Secure Industrial IoT: A Survey," IEEE Internet of Things Journal, 2025. DOI: https://doi.org/10.1109/JIOT.2025.3595649
A. M. Farooqi, M. A. Alam, S. I. Hassan, and S. M. Idrees, "A Fog Computing Model for VANET to Reduce Latency and Delay Using 5G Network in Smart City Transportation," Applied Sciences, vol. 12, no. 4, Feb. 2022, Art. no. 2083. DOI: https://doi.org/10.3390/app12042083
R. Maruthamuthu, N. Patel, T. Yawanikha, S. Jayasree, Z. Alsalami, and S. P. V. SubbaRao, "A Way to Design Fog Computing Model For 5G Network using Vanet," in 2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering, Greater Noida, India, 2024, pp. 431–435. DOI: https://doi.org/10.1109/ICACITE60783.2024.10617287
G. Lippi, M. Aljawarneh, Q. Al-Na'amneh, R. Hazaymih, and L. D. Dhomeja, "Security and Privacy Challenges and Solutions in Autonomous Driving Systems: A Comprehensive Review," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 23–41, May 2025. DOI: https://doi.org/10.63180/jcsra.thestap.2025.3.3
A. AlShuaibi, M. W. Arshad, and M. Maayah, "A Hybrid Genetic Algorithm and Hidden Markov Model-Based Hashing Technique for Robust Data Security," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 42–56, May 2025. DOI: https://doi.org/10.63180/jcsra.thestap.2025.3.6
N. Keshari, D. Singh, and A. K. Maurya, "A survey on Vehicular Fog Computing: Current state-of-the-art and future directions," Vehicular Communications, vol. 38, Dec. 2022, Art. no. 100512. DOI: https://doi.org/10.1016/j.vehcom.2022.100512
M. A. Al-Shareeda, A. A. Obaid, and A. A. H. Almaji, "The Role of Artificial Intelligence in Bodybuilding: A Systematic Review of Applications, Challenges, and Future Prospects," Jordanian Journal of Informatics and Computing, vol. 2025, no. 1, pp. 16–26, Feb. 2025. DOI: https://doi.org/10.63180/jjic.thestap.2025.1.3
M. Alshinwan, A. G. Memon, M. C. Ghanem, and M. Almaayah, "Unsupervised text feature selection approach based on improved Prairie dog algorithm for the text clustering," Jordanian Journal of Informatics and Computing, vol. 2025, no. 1, pp. 27–36, Mar. 2025. DOI: https://doi.org/10.63180/jjic.thestap.2025.1.4
M. H. Husain, M. Ahmadi, and F. Mardukhi, "Vehicular Fog Computing: A Survey of Architectures, Resource Management, Challenges and Emerging Trends," Wireless Personal Communications, vol. 136, no. 4, pp. 2243–2273, Jun. 2024. DOI: https://doi.org/10.1007/s11277-024-11373-z
M. AlMarshoud, M. Sabir Kiraz, and A. H. Al-Bayatti, "Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions," ACM Computing Surveys, vol. 56, no. 10, Jun. 2024, Art. no. 260. DOI: https://doi.org/10.1145/3656166
A. A. Khan, M. Abolhasan, and W. Ni, "5G next generation VANETs using SDN and fog computing framework," in 2018 15th IEEE Annual Consumer Communications & Networking Conference, Las Vegas, NV, USA, 2018, pp. 1–6. DOI: https://doi.org/10.1109/CCNC.2018.8319192
A. Bisht and V. Khaitan, "Reliability analysis of 5G-VANET using cloud-fog-edge based architecture," RAIRO - Operations Research, vol. 58, no. 1, pp. 129–149, Jan. 2024. DOI: https://doi.org/10.1051/ro/2023189
T. Alsalem and M. Amin, "Towards Trustworthy IoT Systems: Cybersecurity Threats, Frameworks, and Future Directions," Journal of Cyber Security and Risk Auditing, vol. 2023, no. 1, pp. 3–18, Feb. 2023. DOI: https://doi.org/10.63180/jcsra.thestap.2023.1.2
A. Rachmayanti and W. Wirawan, "Elliptic Curve Cryptography (ECC) Based Authentication Scheme on IoT Networks for Health Information Systems," in 2024 International Seminar on Intelligent Technology and Its Applications, Mataram, Indonesia, 2024, pp. 125–130. DOI: https://doi.org/10.1109/ISITIA63062.2024.10668289
V. Abdullayev, A. Khang, N. Ragimova, and M. Almaayah, "A Novel Authentication Systems in Vehicular Communication: Challenges and Future Directions," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 123–135, Aug. 2025. DOI: https://doi.org/10.63180/jcsra.thestap.2025.3.9
S. R. Addula, S. Norozpour, and M. Amin, "Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud Computing," Jordanian Journal of Informatics and Computing, vol. 2025, no. 1, pp. 37–48, Mar. 2025. DOI: https://doi.org/10.63180/jjic.thestap.2025.1.5
R. Huang and A. Sharma, "Post-Quantum Verifiable Decryption Scheme for Internet of Thing-Based Consumer Electronic Edge Device," IEEE Transactions on Consumer Electronics, vol. 71, no. 2, pp. 4903–4913, May 2025. DOI: https://doi.org/10.1109/TCE.2025.3572470
A. Castiglione, J. G. Esposito, V. Loia, M. Nappi, C. Pero, and M. Polsinelli, "Integrating Post-Quantum Cryptography and Blockchain to Secure Low-Cost IoT Devices," IEEE Transactions on Industrial Informatics, vol. 21, no. 2, pp. 1674–1683, Feb. 2025. DOI: https://doi.org/10.1109/TII.2024.3485796
S. Ahmed and M. H. Anisi, "A Post-Quantum Secure Federated Learning Framework for Cross-Domain V2G Authentication," IEEE Transactions on Consumer Electronics, 2025. DOI: https://doi.org/10.1109/TCE.2025.3580338
N. N. Minhas and K. Mansoor, "Edge-Computing-Based Scheme for Post-Quantum IoT Security for e-Health," IEEE Internet of Things Journal, vol. 11, no. 19, pp. 31331–31337, Oct. 2024. DOI: https://doi.org/10.1109/JIOT.2024.3418959
B. A. Mohammed et al., "FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks," IEEE Access, vol. 11, pp. 18571–18581, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3247222
A. A. Almazroi, E. A. Aldhahri, M. A. Al-Shareeda, and S. Manickam, "ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing," Plos One, vol. 18, no. 6, Jun. 2023, Art. no. e0287291. DOI: https://doi.org/10.1371/journal.pone.0287291
Z. Ghaleb Al-Mekhlafi et al., "Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing," IEEE Access, vol. 12, pp. 100152–100166, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3429179
Y. Bi and C. Jia, "Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover," IEEE Transactions on Mobile Computing, vol. 24, no. 6, pp. 5446–5463, Jun. 2025. DOI: https://doi.org/10.1109/TMC.2025.3532120
S. K. Rajbhar, S. Singh, and D. Kumar, "Dynamic and Secure Group Authentication for 5G-Enabled Vehicular Networks," in 2025 International Conference on Electronics, AI and Computing, Jalandhar, India, 2025, pp. 1–6. DOI: https://doi.org/10.1109/EAIC66483.2025.11101378
H. Zhang and M. Li, "Towards an intelligent and automatic irrigation system based on internet of things with authentication feature in VANET," Journal of Information Security and Applications, vol. 88, Feb. 2025, Art. no. 103927. DOI: https://doi.org/10.1016/j.jisa.2024.103927
P. Kumar and H. Om, "Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET," Vehicular Communications, vol. 47, Jun. 2024, Art. no. 100785. DOI: https://doi.org/10.1016/j.vehcom.2024.100785
Z. S. Alzaidi, A. A. Yassin, Z. A. Abduljabbar, and V. O. Nyangaresi, "A Fog Computing and Blockchain-based Anonymous Authentication Scheme to Enhance Security in VANET Environments," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19143–19153, Feb. 2025. DOI: https://doi.org/10.48084/etasr.8663
Y. Zhou et al., "An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs," IEEE Internet of Things Journal, vol. 10, no. 11, pp. 10052–10065, Jun. 2023. DOI: https://doi.org/10.1109/JIOT.2023.3236699
B. A. Mohammed et al., "Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing," IEEE Access, vol. 12, pp. 33089–33099, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3372390
X. Chen, A. Yang, Y. Tong, J. Weng, J. Weng, and T. Li, "A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET," IEEE Internet of Things Journal, vol. 9, no. 22, pp. 23130–23141, Nov. 2022. DOI: https://doi.org/10.1109/JIOT.2022.3184991
Z. G. Al-Mekhlafi, H. D. K. Al-Janabi, M. A. Al-Shareeda, B. A. Mohammed, J. S. Alshudukhi, and K. A. Al-Dhlan, "Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication," Peer-to-Peer Networking and Applications, vol. 17, no. 6, pp. 3703–3721, Nov. 2024. DOI: https://doi.org/10.1007/s12083-024-01778-9
M. Wang et al., "Smart City Transportation: A VANET Edge Computing Model to Minimize Latency and Delay Utilizing 5G Network," Journal of Grid Computing, vol. 22, no. 1, Feb. 2024, Art. no. 25. DOI: https://doi.org/10.1007/s10723-024-09747-5
Y. Liang, E. Luo, and Y. Liu, "Physically Secure and Conditional-Privacy Authenticated Key Agreement for VANETs," IEEE Transactions on Vehicular Technology, vol. 72, no. 6, pp. 7914–7925, Jun. 2023. DOI: https://doi.org/10.1109/TVT.2023.3241882
W. Othman, M. Fuyou, K. Xue, and A. Hawbani, "Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City," IEEE Transactions on Vehicular Technology, vol. 70, no. 12, pp. 12902–12917, Dec. 2021. DOI: https://doi.org/10.1109/TVT.2021.3121449
A. Altaweel, H. Mukkath, and I. Kamel, "GPS Spoofing Attacks in FANETs: A Systematic Literature Review," IEEE Access, vol. 11, pp. 55233–55280, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3281731
K. Lim, K. M. Tuladhar, and H. Kim, "Detecting Location Spoofing using ADAS sensors in VANETs," in 2019 16th IEEE Annual Consumer Communications & Networking Conference, Las Vegas, NV, USA, 2019, pp. 1–4. DOI: https://doi.org/10.1109/CCNC.2019.8651763
A. Nobahari, D. Bakhshayeshi Avval, A. Akhbari, and S. Nobahary, "Investigation of Different Mechanisms to Detect Misbehaving Nodes in Vehicle Ad-Hoc Networks (VANETs)," Security and Communication Networks, vol. 2023, no. 1, Aug. 2023, Art. no. 4020275. DOI: https://doi.org/10.1155/2023/4020275
B. A. Mohammed, M. A. Al-Shareeda, Z. G. Al-Mekhlafi, J. S. Alshudukhi, and K. A. Al-Dhlan, "HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks," IEEE Access, vol. 12, pp. 6251–6261, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3351278
B. A. Mohammed, M. A. Al-Shareeda, S. Manickam, Z. G. Al-Mekhlafi, A. M. Alayba, and A. A. Sallam, "ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing," Mathematics, vol. 11, no. 6, Mar. 2023, Art. no. 1446. DOI: https://doi.org/10.3390/math11061446
Z. Ghaleb Al-Mekhlafi et al., "Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review," IEEE Sensors Journal, vol. 24, no. 19, pp. 29575–29602, Oct. 2024. DOI: https://doi.org/10.1109/JSEN.2024.3436612
T. K. Venkatasamy, M. J. Hossen, G. Ramasamy, and N. H. B. A. Aziz, "Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols," Scientific Reports, vol. 14, no. 1, Dec. 2024, Art. no. 31780. DOI: https://doi.org/10.1038/s41598-024-82313-x
Downloads
How to Cite
License
Copyright (c) 2025 Sarah Al-Hilfi, Mohammed Yousif, Huda Mohammed Alsayednoor, Mahmood A. Al-Shareeda, Mohammed Almaayah, Marwan Albahar

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
