Butt, T. A., Iqbal, R., Shah, S. C. & Umar, T. Social internet of vehicles: Architecture and enabling technologies. Comput. Electr. Eng.69, 68–84 (2018).
Khan, A. R. et al. Dsrc technology in vehicle-to-vehicle (v2v) and vehicle-to-infrastructure (v2i) iot system for intelligent transportation system (its): A review. Recent trends in mechatronics towards industry 4.0: selected articles from iM3F 2020, Malaysia 97–106 (2022).
Cynthia, J., Sakthipriya, G., Sudhahar, J. C. & Suguna, M. Intelligent transportation system: A review of vanet applications for urban areas, technologies, and protocols. Sustainable Digital Technologies for Smart Cities 99–112 (2023).
Xing, L., Zhao, P., Gao, J., Wu, H. & Ma, H. A survey of the social internet of vehicles: Secure data issues, solutions, and federated learning. IEEE Intell. Transp. Syst. Mag.15, 70–84 (2022).
Kaur, T. & Kaur, P. D. The emergence of the social internet of vehicles (siov): A comprehensive analysis of architecture, technologies, and applications. In International Conference on Advancements in Smart Computing and Information Security, 335–347 (Springer, 2024).
Ismail, S., Hammad, E. & Iqbal, R. Towards holochain-based adaptive trust management in social internet of vehicles. In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC), 00878–00884 (IEEE, 2025).
Roopa, M. et al. Dtcms: Dynamic traffic congestion management in social internet of vehicles (siov). IOT16, 100311 (2021).
Hemmati, A., Zarei, M. & Souri, A. Blockchain-based internet of vehicles (biov): A systematic review of surveys and reviews. Secur. Privacy6, e317 (2023).
Vegni, A. M. & Loscri, V. A survey on vehicular social networks. IEEE Commun. Surv. Tutorials17, 2397–2419 (2015).
Hassan, I. M. & Hassan, K. R. Vehicular social networks and vehicular ad-hoc networks, applications, modelling tools and challenges: A survey. Int. J. Comput. Appl.176, 32–38 (2020).
Mohammed, B. A. et al. Service based veins framework for vehicular ad-hoc network (vanet): A systematic review of state-of-the-art. Peer-to-Peer Netw. Appl.17, 2259–2281 (2024).
Chang, S. Y., He, J. & Nallanathan, A. Application of Gromov-Wasserstein matching for vehicular social network security profiling. IEEE Trans. Veh. Technol. https://doi.org/10.1109/TVT.2025.3564560 (2025).
Cui, M. et al. Secure data sharing for consortium blockchain enabled vehicular social networks. IEEE Trans. Veh. Technol.73, 19682–19695 (2024).
Wan, Q., Liu, M., Wang, L., Wang, F. & Zhang, M. Dual-policy attribute-based searchable encryption with secure keyword update for vehicular social networks. Electronics14, 266 (2025).
Mazhar, S. et al. State-of-the-art authentication and verification schemes in vanets: A survey. Veh. Commun.49, 100804 (2024).
Azam, F. Ensuring security and privacy in vanet: A comprehensive survey of authentication approaches. J. Comput. Netw. Commun.2024, 1818079 (2024).
Mishra, D. & Nagar, M. Comprehensive survey of post-quantum secure lattice-based authentication schemes for vanets. In 2025 International Conference on Computational, Communication and Information Technology (ICCCIT), 787–792 (IEEE, 2025).
Sood, S. K. et al. Scientometric analysis of quantum algorithms for vanet optimization. IEEE Trans. Syst. Man Cybern. Syst. https://doi.org/10.1109/TSMC.2024.3428707 (2024).
Dwivedi, S. K. et al. Dbke: Design of blockchain-envisioned vehicle-to-vehicle secure key management protocol using ecc. IEEE Trans. Intell. Transp. Syst. https://doi.org/10.1109/TITS.2025.3572305 (2025).
Tao, Q., Cui, X., Ding, H., Shen, Z. & Li, Y. Elsp-ma: An efficient lightweight and security-enhanced privacy-preserving message authentication scheme for vanets. IEEE Trans. Veh. Technol. https://doi.org/10.1109/TVT.2025.3571380 (2025).
Bai, Y. A lightweight bidirectional secure authentication protocol for mobile edge computing in 6g networks. Internet Technol. Lett.8, e70001 (2025).
Suman, A., Suman, P., Varshney, S. & Kumar, C. Secured vanet using privacy-preserving authentication approach. SN Comput. Sci.6, 1–11 (2025).
Lwamo, N. M. et al. Suaa: A secure user authentication scheme with anonymity for the single & multi-server environments. Inf. Sci.477, 369–385 (2019).
Xiao, J., Li, W.-J., Geng, H.-Y. & Zhai, Y.-B. An anti-dos attack rfid security authentication protocol in the internet of vehicles. J. Beijing Univ. Posts Telecommun.42, 114 (2019).
Zhu, H., Liu, T., Wei, G. & Li, H. Ppas: privacy protection authentication scheme for vanet. Clust. Comput.16, 873–886 (2013).
Limbasiya, T. & Das, D. Secure message confirmation scheme based on batch verification in vehicular cloud computing. Phys. Commun.34, 310–320 (2019).
Shekhawat, H. & Gupta, D. S. A survey on lattice-based security and authentication schemes for smart-grid networks in the post-quantum era. Concurr. Comput. Pract. Exp.36, e8080 (2024).
Dharminder, D. et al. Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for iot applications. Trans. Emerg. Telecommun. Technol.33, e4540 (2022).
Imran, M. A quantum algorithm for semidirect discrete logarithm problem on elliptic curves. IACR Cryptol. ePrint Arch.2023, 1052 (2023).
Abdullah, A. & Mahalanobis, A. A zero minor solves the elliptic curve discrete logarithm problem. Exp. Math. https://doi.org/10.1080/10586458.2025.2525844 (2025).
Wong, H. Y. Shor’s algorithm. In Introduction to Quantum Computing: From a Layperson to a Programmer in 30 Steps, 289–298 (Springer, 2023).
Kumar, M. & Mondal, B. Study on implementation of shor’s factorization algorithm on quantum computer. SN Comput. Sci.5, 413 (2024).
Akçay, L. & Yalçın, B. Ö. Lightweight asip design for lattice-based post-quantum cryptography algorithms. Arab. J. Sci. Eng.50, 835–849 (2025).
Nguyen, T.-H., Pham, C.-K. & Hoang, T.-T. A high-efficiency modular multiplication digital signal processing for lattice-based post-quantum cryptography. Cryptography7, 46 (2023).
Singh, D. K. & Bhardwaj, D. An eaade: Effective authentication approach for data exchange in vehicular social network for iov. Secur. Privacy8, e457 (2025).
Sikarwar, H. & Das, D. Smmap. Secure mac-based mutual authentication protocol for iov In 330–335 (2023).
Chen, C.-M. et al. A provably secure key transfer protocol for the fog-enabled social internet of vehicles based on a confidential computing environment. Veh. Commun.39, 100567 (2023).
Ayed, S., Hbaieb, A. & Chaari, L. Blockchain and trust-based clustering scheme for the iov. Ad Hoc Netw.142, 103093 (2023).
Arafeh, M. et al. Data independent warmup scheme for non-iid federated learning. Inf. Sci.623, 342–360 (2023).
Al-Mekhlafi, Z. G., Al-Shareeda, M. A., Manickam, S., Mohammed, B. A. & Qtaish, A. Lattice-based lightweight quantum resistant scheme in 5g-enabled vehicular networks. Mathematics11, 399 (2023).








