Tamper-Resilient and Sensor-Spoofing-Resistant Authentication for 5G-Connected Vehicular Edge Systems

Authors

  • Sarah Al-Hilfi Computer Engineering Department, College of Engineering, University of Basrah, Basra, Iraq
  • Mohammed Yousif Department of Computer Engineering Techniques, College of Technical Engineering, University of Al Maarif, Al Anbar, Iraq
  • Huda Mohammed Alsayednoor Shatt Al-Arab University College, Basra, Iraq
  • Mahmood A. Al-Shareeda Department of Information Technology, Management Technical College, Southern Technical University, Basrah, Iraq | College of Engineering, Al-Ayen University, Thi-Qar, Iraq
  • Mohammed Almaayah Department of Computer Science, King Abdullah the II IT School, The University of Jordan, Amman, Jordan
  • Marwan Albahar Department of Computing, College of Engineering and Computing in Al-Lith, Umm Al-Qura University, Makkah, Saudi Arabia
Volume: 15 | Issue: 6 | Pages: 28769-28779 | December 2025 | https://doi.org/10.48084/etasr.13431

Abstract

From the perspective of vehicular fog computing enabled by 5G, fast and secure authentication between Onboard Units (OBUs) and Fog Servers (FSs) is crucial. Threats such as combined physical tampering and sensor spoofing, along with emergency message forgery, can be devastating in practice, causing traffic accidents, privacy breaches, or service interruptions. This paper presents a six-phase, tamper-resilient authentication protocol tailored for 5G vehicular networks. It integrates entropy-based sensor verification and real-time tamper detection into a unified trust mechanism, alongside emergency-aware session handling. To ensure post-quantum resilience, forward secrecy, and lightweight performance, we employ Chebyshev polynomial cryptography and hash chains. The proposed scheme reduces computational time by 32% and communication overhead by 27% compared to existing protocols, demonstrating its effectiveness and robustness for real-time vehicular edge environments.

Keywords:

5G vehicular networks, fog computing, secure authentication, tamper detection, sensor spoofing, Chebyshev polynomial cryptography, emergency message integrity, post-quantum security, Trusted Execution Environment (TEE), vehicular edge computing

Downloads

Download data is not yet available.

References

A. Behura, A. Kumar, and P. K. Jain, "A comparative performance analysis of vehicular routing protocols in intelligent transportation systems: A comparative performance analysis of vehicular routing protocols...," Telecommunication Systems, vol. 88, no. 1, Mar. 2025, Art. no. 26. DOI: https://doi.org/10.1007/s11235-024-01243-1

H. Al-Maliki, H. A. A. AL-Asadi, Z. A. Abduljabbar, and V. O. Nyangaresi, "Reliable Vehicular Ad Hoc Networks for Intelligent Transportation Systems based on the Snake Optimization Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18631–18639, Dec. 2024. DOI: https://doi.org/10.48084/etasr.8851

Z. G. Al-Mekhlaf et al., "A quantum-resilient lattice-based security framework for internet of medical things in healthcare systems," Journal of King Saud University Computer and Information Sciences, vol. 37, no. 6, Jul. 2025, Art. no. 126. DOI: https://doi.org/10.1007/s44443-025-00140-0

K. S. El Gayyar, A. I. Saleh, and L. M. Labib, "A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks," Peer-to-Peer Networking and Applications, vol. 15, no. 1, pp. 386–407, Jan. 2022. DOI: https://doi.org/10.1007/s12083-021-01197-0

O. Nazih, N. Benamar, H. Lamaazi, and H. Chaoui, "Toward Secure and Trustworthy Vehicular Fog Computing: A Survey," IEEE Access, vol. 12, pp. 35154–35171, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3371488

B. A. Mohammed et al., "Taxonomy-Based Lightweight Cryptographic Frameworks for Secure Industrial IoT: A Survey," IEEE Internet of Things Journal, 2025. DOI: https://doi.org/10.1109/JIOT.2025.3595649

A. M. Farooqi, M. A. Alam, S. I. Hassan, and S. M. Idrees, "A Fog Computing Model for VANET to Reduce Latency and Delay Using 5G Network in Smart City Transportation," Applied Sciences, vol. 12, no. 4, Feb. 2022, Art. no. 2083. DOI: https://doi.org/10.3390/app12042083

R. Maruthamuthu, N. Patel, T. Yawanikha, S. Jayasree, Z. Alsalami, and S. P. V. SubbaRao, "A Way to Design Fog Computing Model For 5G Network using Vanet," in 2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering, Greater Noida, India, 2024, pp. 431–435. DOI: https://doi.org/10.1109/ICACITE60783.2024.10617287

G. Lippi, M. Aljawarneh, Q. Al-Na'amneh, R. Hazaymih, and L. D. Dhomeja, "Security and Privacy Challenges and Solutions in Autonomous Driving Systems: A Comprehensive Review," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 23–41, May 2025. DOI: https://doi.org/10.63180/jcsra.thestap.2025.3.3

A. AlShuaibi, M. W. Arshad, and M. Maayah, "A Hybrid Genetic Algorithm and Hidden Markov Model-Based Hashing Technique for Robust Data Security," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 42–56, May 2025. DOI: https://doi.org/10.63180/jcsra.thestap.2025.3.6

N. Keshari, D. Singh, and A. K. Maurya, "A survey on Vehicular Fog Computing: Current state-of-the-art and future directions," Vehicular Communications, vol. 38, Dec. 2022, Art. no. 100512. DOI: https://doi.org/10.1016/j.vehcom.2022.100512

M. A. Al-Shareeda, A. A. Obaid, and A. A. H. Almaji, "The Role of Artificial Intelligence in Bodybuilding: A Systematic Review of Applications, Challenges, and Future Prospects," Jordanian Journal of Informatics and Computing, vol. 2025, no. 1, pp. 16–26, Feb. 2025. DOI: https://doi.org/10.63180/jjic.thestap.2025.1.3

M. Alshinwan, A. G. Memon, M. C. Ghanem, and M. Almaayah, "Unsupervised text feature selection approach based on improved Prairie dog algorithm for the text clustering," Jordanian Journal of Informatics and Computing, vol. 2025, no. 1, pp. 27–36, Mar. 2025. DOI: https://doi.org/10.63180/jjic.thestap.2025.1.4

M. H. Husain, M. Ahmadi, and F. Mardukhi, "Vehicular Fog Computing: A Survey of Architectures, Resource Management, Challenges and Emerging Trends," Wireless Personal Communications, vol. 136, no. 4, pp. 2243–2273, Jun. 2024. DOI: https://doi.org/10.1007/s11277-024-11373-z

M. AlMarshoud, M. Sabir Kiraz, and A. H. Al-Bayatti, "Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions," ACM Computing Surveys, vol. 56, no. 10, Jun. 2024, Art. no. 260. DOI: https://doi.org/10.1145/3656166

A. A. Khan, M. Abolhasan, and W. Ni, "5G next generation VANETs using SDN and fog computing framework," in 2018 15th IEEE Annual Consumer Communications & Networking Conference, Las Vegas, NV, USA, 2018, pp. 1–6. DOI: https://doi.org/10.1109/CCNC.2018.8319192

A. Bisht and V. Khaitan, "Reliability analysis of 5G-VANET using cloud-fog-edge based architecture," RAIRO - Operations Research, vol. 58, no. 1, pp. 129–149, Jan. 2024. DOI: https://doi.org/10.1051/ro/2023189

T. Alsalem and M. Amin, "Towards Trustworthy IoT Systems: Cybersecurity Threats, Frameworks, and Future Directions," Journal of Cyber Security and Risk Auditing, vol. 2023, no. 1, pp. 3–18, Feb. 2023. DOI: https://doi.org/10.63180/jcsra.thestap.2023.1.2

A. Rachmayanti and W. Wirawan, "Elliptic Curve Cryptography (ECC) Based Authentication Scheme on IoT Networks for Health Information Systems," in 2024 International Seminar on Intelligent Technology and Its Applications, Mataram, Indonesia, 2024, pp. 125–130. DOI: https://doi.org/10.1109/ISITIA63062.2024.10668289

V. Abdullayev, A. Khang, N. Ragimova, and M. Almaayah, "A Novel Authentication Systems in Vehicular Communication: Challenges and Future Directions," Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 123–135, Aug. 2025. DOI: https://doi.org/10.63180/jcsra.thestap.2025.3.9

S. R. Addula, S. Norozpour, and M. Amin, "Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud Computing," Jordanian Journal of Informatics and Computing, vol. 2025, no. 1, pp. 37–48, Mar. 2025. DOI: https://doi.org/10.63180/jjic.thestap.2025.1.5

R. Huang and A. Sharma, "Post-Quantum Verifiable Decryption Scheme for Internet of Thing-Based Consumer Electronic Edge Device," IEEE Transactions on Consumer Electronics, vol. 71, no. 2, pp. 4903–4913, May 2025. DOI: https://doi.org/10.1109/TCE.2025.3572470

A. Castiglione, J. G. Esposito, V. Loia, M. Nappi, C. Pero, and M. Polsinelli, "Integrating Post-Quantum Cryptography and Blockchain to Secure Low-Cost IoT Devices," IEEE Transactions on Industrial Informatics, vol. 21, no. 2, pp. 1674–1683, Feb. 2025. DOI: https://doi.org/10.1109/TII.2024.3485796

S. Ahmed and M. H. Anisi, "A Post-Quantum Secure Federated Learning Framework for Cross-Domain V2G Authentication," IEEE Transactions on Consumer Electronics, 2025. DOI: https://doi.org/10.1109/TCE.2025.3580338

N. N. Minhas and K. Mansoor, "Edge-Computing-Based Scheme for Post-Quantum IoT Security for e-Health," IEEE Internet of Things Journal, vol. 11, no. 19, pp. 31331–31337, Oct. 2024. DOI: https://doi.org/10.1109/JIOT.2024.3418959

B. A. Mohammed et al., "FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks," IEEE Access, vol. 11, pp. 18571–18581, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3247222

A. A. Almazroi, E. A. Aldhahri, M. A. Al-Shareeda, and S. Manickam, "ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing," Plos One, vol. 18, no. 6, Jun. 2023, Art. no. e0287291. DOI: https://doi.org/10.1371/journal.pone.0287291

Z. Ghaleb Al-Mekhlafi et al., "Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing," IEEE Access, vol. 12, pp. 100152–100166, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3429179

Y. Bi and C. Jia, "Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover," IEEE Transactions on Mobile Computing, vol. 24, no. 6, pp. 5446–5463, Jun. 2025. DOI: https://doi.org/10.1109/TMC.2025.3532120

S. K. Rajbhar, S. Singh, and D. Kumar, "Dynamic and Secure Group Authentication for 5G-Enabled Vehicular Networks," in 2025 International Conference on Electronics, AI and Computing, Jalandhar, India, 2025, pp. 1–6. DOI: https://doi.org/10.1109/EAIC66483.2025.11101378

H. Zhang and M. Li, "Towards an intelligent and automatic irrigation system based on internet of things with authentication feature in VANET," Journal of Information Security and Applications, vol. 88, Feb. 2025, Art. no. 103927. DOI: https://doi.org/10.1016/j.jisa.2024.103927

P. Kumar and H. Om, "Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET," Vehicular Communications, vol. 47, Jun. 2024, Art. no. 100785. DOI: https://doi.org/10.1016/j.vehcom.2024.100785

Z. S. Alzaidi, A. A. Yassin, Z. A. Abduljabbar, and V. O. Nyangaresi, "A Fog Computing and Blockchain-based Anonymous Authentication Scheme to Enhance Security in VANET Environments," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19143–19153, Feb. 2025. DOI: https://doi.org/10.48084/etasr.8663

Y. Zhou et al., "An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs," IEEE Internet of Things Journal, vol. 10, no. 11, pp. 10052–10065, Jun. 2023. DOI: https://doi.org/10.1109/JIOT.2023.3236699

B. A. Mohammed et al., "Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing," IEEE Access, vol. 12, pp. 33089–33099, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3372390

X. Chen, A. Yang, Y. Tong, J. Weng, J. Weng, and T. Li, "A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET," IEEE Internet of Things Journal, vol. 9, no. 22, pp. 23130–23141, Nov. 2022. DOI: https://doi.org/10.1109/JIOT.2022.3184991

Z. G. Al-Mekhlafi, H. D. K. Al-Janabi, M. A. Al-Shareeda, B. A. Mohammed, J. S. Alshudukhi, and K. A. Al-Dhlan, "Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication," Peer-to-Peer Networking and Applications, vol. 17, no. 6, pp. 3703–3721, Nov. 2024. DOI: https://doi.org/10.1007/s12083-024-01778-9

M. Wang et al., "Smart City Transportation: A VANET Edge Computing Model to Minimize Latency and Delay Utilizing 5G Network," Journal of Grid Computing, vol. 22, no. 1, Feb. 2024, Art. no. 25. DOI: https://doi.org/10.1007/s10723-024-09747-5

Y. Liang, E. Luo, and Y. Liu, "Physically Secure and Conditional-Privacy Authenticated Key Agreement for VANETs," IEEE Transactions on Vehicular Technology, vol. 72, no. 6, pp. 7914–7925, Jun. 2023. DOI: https://doi.org/10.1109/TVT.2023.3241882

W. Othman, M. Fuyou, K. Xue, and A. Hawbani, "Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City," IEEE Transactions on Vehicular Technology, vol. 70, no. 12, pp. 12902–12917, Dec. 2021. DOI: https://doi.org/10.1109/TVT.2021.3121449

A. Altaweel, H. Mukkath, and I. Kamel, "GPS Spoofing Attacks in FANETs: A Systematic Literature Review," IEEE Access, vol. 11, pp. 55233–55280, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3281731

K. Lim, K. M. Tuladhar, and H. Kim, "Detecting Location Spoofing using ADAS sensors in VANETs," in 2019 16th IEEE Annual Consumer Communications & Networking Conference, Las Vegas, NV, USA, 2019, pp. 1–4. DOI: https://doi.org/10.1109/CCNC.2019.8651763

A. Nobahari, D. Bakhshayeshi Avval, A. Akhbari, and S. Nobahary, "Investigation of Different Mechanisms to Detect Misbehaving Nodes in Vehicle Ad-Hoc Networks (VANETs)," Security and Communication Networks, vol. 2023, no. 1, Aug. 2023, Art. no. 4020275. DOI: https://doi.org/10.1155/2023/4020275

B. A. Mohammed, M. A. Al-Shareeda, Z. G. Al-Mekhlafi, J. S. Alshudukhi, and K. A. Al-Dhlan, "HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks," IEEE Access, vol. 12, pp. 6251–6261, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3351278

B. A. Mohammed, M. A. Al-Shareeda, S. Manickam, Z. G. Al-Mekhlafi, A. M. Alayba, and A. A. Sallam, "ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing," Mathematics, vol. 11, no. 6, Mar. 2023, Art. no. 1446. DOI: https://doi.org/10.3390/math11061446

Z. Ghaleb Al-Mekhlafi et al., "Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review," IEEE Sensors Journal, vol. 24, no. 19, pp. 29575–29602, Oct. 2024. DOI: https://doi.org/10.1109/JSEN.2024.3436612

T. K. Venkatasamy, M. J. Hossen, G. Ramasamy, and N. H. B. A. Aziz, "Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols," Scientific Reports, vol. 14, no. 1, Dec. 2024, Art. no. 31780. DOI: https://doi.org/10.1038/s41598-024-82313-x

Downloads

How to Cite

[1]
S. Al-Hilfi, M. Yousif, H. M. Alsayednoor, M. A. Al-Shareeda, M. Almaayah, and M. Albahar, “Tamper-Resilient and Sensor-Spoofing-Resistant Authentication for 5G-Connected Vehicular Edge Systems”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 6, pp. 28769–28779, Dec. 2025.

Metrics

Abstract Views: 222
PDF Downloads: 275

Metrics Information