Enhanced EAADE: a quantum-resilient and privacy-preserving authentication protocol for secure data exchange in vehicular social networks

  • Butt, T. A., Iqbal, R., Shah, S. C. & Umar, T. Social internet of vehicles: Architecture and enabling technologies. Comput. Electr. Eng.69, 68–84 (2018).

    Google Scholar 

  • Khan, A. R. et al. Dsrc technology in vehicle-to-vehicle (v2v) and vehicle-to-infrastructure (v2i) iot system for intelligent transportation system (its): A review. Recent trends in mechatronics towards industry 4.0: selected articles from iM3F 2020, Malaysia 97–106 (2022).

  • Cynthia, J., Sakthipriya, G., Sudhahar, J. C. & Suguna, M. Intelligent transportation system: A review of vanet applications for urban areas, technologies, and protocols. Sustainable Digital Technologies for Smart Cities 99–112 (2023).

  • Xing, L., Zhao, P., Gao, J., Wu, H. & Ma, H. A survey of the social internet of vehicles: Secure data issues, solutions, and federated learning. IEEE Intell. Transp. Syst. Mag.15, 70–84 (2022).

    Google Scholar 

  • Kaur, T. & Kaur, P. D. The emergence of the social internet of vehicles (siov): A comprehensive analysis of architecture, technologies, and applications. In International Conference on Advancements in Smart Computing and Information Security, 335–347 (Springer, 2024).

  • Ismail, S., Hammad, E. & Iqbal, R. Towards holochain-based adaptive trust management in social internet of vehicles. In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC), 00878–00884 (IEEE, 2025).

  • Roopa, M. et al. Dtcms: Dynamic traffic congestion management in social internet of vehicles (siov). IOT16, 100311 (2021).

    Google Scholar 

  • Hemmati, A., Zarei, M. & Souri, A. Blockchain-based internet of vehicles (biov): A systematic review of surveys and reviews. Secur. Privacy6, e317 (2023).

    Google Scholar 

  • Vegni, A. M. & Loscri, V. A survey on vehicular social networks. IEEE Commun. Surv. Tutorials17, 2397–2419 (2015).

    Google Scholar 

  • Hassan, I. M. & Hassan, K. R. Vehicular social networks and vehicular ad-hoc networks, applications, modelling tools and challenges: A survey. Int. J. Comput. Appl.176, 32–38 (2020).

    Google Scholar 

  • Mohammed, B. A. et al. Service based veins framework for vehicular ad-hoc network (vanet): A systematic review of state-of-the-art. Peer-to-Peer Netw. Appl.17, 2259–2281 (2024).

    Google Scholar 

  • Chang, S. Y., He, J. & Nallanathan, A. Application of Gromov-Wasserstein matching for vehicular social network security profiling. IEEE Trans. Veh. Technol. https://doi.org/10.1109/TVT.2025.3564560 (2025).

    Google Scholar 

  • Cui, M. et al. Secure data sharing for consortium blockchain enabled vehicular social networks. IEEE Trans. Veh. Technol.73, 19682–19695 (2024).

    Google Scholar 

  • Wan, Q., Liu, M., Wang, L., Wang, F. & Zhang, M. Dual-policy attribute-based searchable encryption with secure keyword update for vehicular social networks. Electronics14, 266 (2025).

    Google Scholar 

  • Mazhar, S. et al. State-of-the-art authentication and verification schemes in vanets: A survey. Veh. Commun.49, 100804 (2024).

    Google Scholar 

  • Azam, F. Ensuring security and privacy in vanet: A comprehensive survey of authentication approaches. J. Comput. Netw. Commun.2024, 1818079 (2024).

    Google Scholar 

  • Mishra, D. & Nagar, M. Comprehensive survey of post-quantum secure lattice-based authentication schemes for vanets. In 2025 International Conference on Computational, Communication and Information Technology (ICCCIT), 787–792 (IEEE, 2025).

  • Sood, S. K. et al. Scientometric analysis of quantum algorithms for vanet optimization. IEEE Trans. Syst. Man Cybern. Syst. https://doi.org/10.1109/TSMC.2024.3428707 (2024).

    Google Scholar 

  • Dwivedi, S. K. et al. Dbke: Design of blockchain-envisioned vehicle-to-vehicle secure key management protocol using ecc. IEEE Trans. Intell. Transp. Syst. https://doi.org/10.1109/TITS.2025.3572305 (2025).

    Google Scholar 

  • Tao, Q., Cui, X., Ding, H., Shen, Z. & Li, Y. Elsp-ma: An efficient lightweight and security-enhanced privacy-preserving message authentication scheme for vanets. IEEE Trans. Veh. Technol. https://doi.org/10.1109/TVT.2025.3571380 (2025).

    Google Scholar 

  • Bai, Y. A lightweight bidirectional secure authentication protocol for mobile edge computing in 6g networks. Internet Technol. Lett.8, e70001 (2025).

    Google Scholar 

  • Suman, A., Suman, P., Varshney, S. & Kumar, C. Secured vanet using privacy-preserving authentication approach. SN Comput. Sci.6, 1–11 (2025).

    Google Scholar 

  • Lwamo, N. M. et al. Suaa: A secure user authentication scheme with anonymity for the single & multi-server environments. Inf. Sci.477, 369–385 (2019).

    Google Scholar 

  • Xiao, J., Li, W.-J., Geng, H.-Y. & Zhai, Y.-B. An anti-dos attack rfid security authentication protocol in the internet of vehicles. J. Beijing Univ. Posts Telecommun.42, 114 (2019).

    Google Scholar 

  • Zhu, H., Liu, T., Wei, G. & Li, H. Ppas: privacy protection authentication scheme for vanet. Clust. Comput.16, 873–886 (2013).

    Google Scholar 

  • Limbasiya, T. & Das, D. Secure message confirmation scheme based on batch verification in vehicular cloud computing. Phys. Commun.34, 310–320 (2019).

    Google Scholar 

  • Shekhawat, H. & Gupta, D. S. A survey on lattice-based security and authentication schemes for smart-grid networks in the post-quantum era. Concurr. Comput. Pract. Exp.36, e8080 (2024).

    Google Scholar 

  • Dharminder, D. et al. Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for iot applications. Trans. Emerg. Telecommun. Technol.33, e4540 (2022).

    Google Scholar 

  • Imran, M. A quantum algorithm for semidirect discrete logarithm problem on elliptic curves. IACR Cryptol. ePrint Arch.2023, 1052 (2023).

    Google Scholar 

  • Abdullah, A. & Mahalanobis, A. A zero minor solves the elliptic curve discrete logarithm problem. Exp. Math. https://doi.org/10.1080/10586458.2025.2525844 (2025).

    Google Scholar 

  • Wong, H. Y. Shor’s algorithm. In Introduction to Quantum Computing: From a Layperson to a Programmer in 30 Steps, 289–298 (Springer, 2023).

  • Kumar, M. & Mondal, B. Study on implementation of shor’s factorization algorithm on quantum computer. SN Comput. Sci.5, 413 (2024).

    Google Scholar 

  • Akçay, L. & Yalçın, B. Ö. Lightweight asip design for lattice-based post-quantum cryptography algorithms. Arab. J. Sci. Eng.50, 835–849 (2025).

    Google Scholar 

  • Nguyen, T.-H., Pham, C.-K. & Hoang, T.-T. A high-efficiency modular multiplication digital signal processing for lattice-based post-quantum cryptography. Cryptography7, 46 (2023).

    Google Scholar 

  • Singh, D. K. & Bhardwaj, D. An eaade: Effective authentication approach for data exchange in vehicular social network for iov. Secur. Privacy8, e457 (2025).

    Google Scholar 

  • Sikarwar, H. & Das, D. Smmap. Secure mac-based mutual authentication protocol for iov In 330–335 (2023).

  • Chen, C.-M. et al. A provably secure key transfer protocol for the fog-enabled social internet of vehicles based on a confidential computing environment. Veh. Commun.39, 100567 (2023).

    Google Scholar 

  • Ayed, S., Hbaieb, A. & Chaari, L. Blockchain and trust-based clustering scheme for the iov. Ad Hoc Netw.142, 103093 (2023).

    Google Scholar 

  • Arafeh, M. et al. Data independent warmup scheme for non-iid federated learning. Inf. Sci.623, 342–360 (2023).

    Google Scholar 

  • Al-Mekhlafi, Z. G., Al-Shareeda, M. A., Manickam, S., Mohammed, B. A. & Qtaish, A. Lattice-based lightweight quantum resistant scheme in 5g-enabled vehicular networks. Mathematics11, 399 (2023).

    Google Scholar 

  • Continue Reading