{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:07:06Z","timestamp":1772928426755,"version":"3.50.1"},"reference-count":45,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The amalgamation of Vehicular Ad hoc Network (VANET) with the Internet of Things (IoT) leads to the concept of the Internet of Vehicles (IoV). IoV forms a solid backbone for Intelligent Transportation Systems (ITS), which paves the way for technologies that better explain about traffic efficiency and their management applications. IoV architecture is seen as a big player in different areas such as the automobile industry, research organizations, smart cities and intelligent transportation for various commercial and scientific applications. However, as VANET is vulnerable to various types of security attacks, the IoV structure should ensure security and efficient performance for vehicular communications. To address these issues, in this article, an authentication-based protocol (A-MAC) for smart vehicular communication is proposed along with a novel framework towards an IoV architecture model. The scheme requires hash operations and uses cryptographic concepts to transfer messages between vehicles to maintain the required security. Performance evaluation helps analyzing its strength in withstanding various types of security attacks. Simulation results demonstrate that A-MAC outshines other protocols in terms of communication cost, execution time, storage cost, and overhead.<\/jats:p>","DOI":"10.3390\/fi12040063","type":"journal-article","created":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T15:37:21Z","timestamp":1585755441000},"page":"63","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":48,"title":["Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1568-368X","authenticated-orcid":false,"given":"Nishu","family":"Gupta","sequence":"first","affiliation":[{"name":"Electronics and Communication Engineering Department, Vaagdevi College of Engineering, Warangal 506005, India"}]},{"given":"Ravikanti","family":"Manaswini","sequence":"additional","affiliation":[{"name":"Electronics and Communication Engineering Department, Vaagdevi College of Engineering, Warangal 506005, India"}]},{"given":"Bongaram","family":"Saikrishna","sequence":"additional","affiliation":[{"name":"Electronics and Communication Engineering Department, Vaagdevi College of Engineering, Warangal 506005, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8339-3679","authenticated-orcid":false,"given":"Francisco","family":"Silva","sequence":"additional","affiliation":[{"name":"Computer Science Department, Federal University of Maranh\u00e3o, S\u00e3o Lu\u00eds 65080-805, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0840-3870","authenticated-orcid":false,"given":"Ariel","family":"Teles","sequence":"additional","affiliation":[{"name":"Campus Araioses, Federal Institute of Maranh\u00e3o, Araioses 65570-000, Brazil"}]}],"member":"1968","published-online":{"date-parts":[[2020,4,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"6473","DOI":"10.1109\/ACCESS.2018.2887076","article-title":"Deployment of IoV for Smart Cities: Applications, Architecture, and Challenges","volume":"7","author":"Ang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_2","unstructured":"Limbasiya, T., and Das, D. (2019). IoVCom: Reliable Comprehensive Communication System for Internet of Vehicles. IEEE Trans. Dependable Sec. Comput."},{"key":"ref_3","first-page":"223","article-title":"Medium access control protocols for safety applications in Vehicular Ad-Hoc Network: A classification and comprehensive survey","volume":"2","author":"Gupta","year":"2015","journal-title":"Veh. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","article-title":"Dedicated Short-Range Communications (DSRC) Standards in the United States","volume":"99","author":"Kenney","year":"2011","journal-title":"Proc. IEEE"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.jnca.2013.02.036","article-title":"A comprehensive survey on vehicular Ad Hoc network","volume":"37","author":"Zedan","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.1109\/TVT.2012.2197031","article-title":"Secure Incentives for Commercial Ad Dissemination in Vehicular Networks","volume":"61","author":"Lee","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_7","unstructured":"Yong, X., Libing, W., Yubo, Z., and Luyao, Y. (2016). Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs. J. Comput. Res. Dev., 53."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","article-title":"An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks","volume":"20","author":"Cui","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2339","DOI":"10.1109\/TITS.2015.2423667","article-title":"Routing in Internet of Vehicles: A Review","volume":"16","author":"Cheng","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1342","DOI":"10.1109\/COMST.2015.2422735","article-title":"Byzantine Attack and Defense in Cognitive Radio Networks: A Survey","volume":"17","author":"Zhang","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2241","DOI":"10.1109\/ACCESS.2017.2782672","article-title":"Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks","volume":"6","author":"Zhong","year":"2018","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P., and Shen, X. (2008, January 13\u201318). An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA.","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Bazzi, A., Cecchini, G., Menarini, M., Masini, B.M., and Zanella, A. (2019). Survey and Perspectives of Vehicular Wi-Fi versus Sidelink Cellular-V2X in the 5G Era. Future Internet, 11.","DOI":"10.3390\/fi11060122"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/3213232.3213237","article-title":"VANETs\u2019 Research over the Past Decade: Overview, Credibility, and Trends","volume":"48","author":"Cavalcanti","year":"2018","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.comcom.2018.02.006","article-title":"Cognitive Internet of Vehicles","volume":"120","author":"Chen","year":"2018","journal-title":"Comput. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MCOM.2014.6871677","article-title":"Context-aware vehicular cyber-physical systems with cloud support: Architecture, challenges, and solutions","volume":"52","author":"Wan","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"5356","DOI":"10.1109\/ACCESS.2016.2603219","article-title":"Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects","volume":"4","author":"Kaiwartya","year":"2016","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1109\/TPDS.2014.2308215","article-title":"ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs","volume":"26","author":"Li","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","article-title":"An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks","volume":"10","author":"He","year":"2015","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1109\/TVT.2015.2402166","article-title":"2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET","volume":"65","author":"Wang","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2562","DOI":"10.1109\/TC.2015.2485225","article-title":"Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response","volume":"65","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1109\/TITS.2015.2492981","article-title":"Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks","volume":"17","author":"Vijayakumar","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_23","first-page":"601","article-title":"Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets","volume":"20","author":"Malik","year":"2018","journal-title":"Int. J. Netw. Secur."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ora, P., and Pal, P.R. (2015, January 10\u201312). Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography. Proceedings of the 2015 International Conference on Computer, Communication and Control (IC4), Indore, India.","DOI":"10.1109\/IC4.2015.7375655"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Cao, D., and Yang, B. (2010, January 16\u201318). Design and implementation for MD5-based data integrity checking system. Proceedings of the 2nd IEEE International Conference on Information Management and Engineering, Chengdu, China.","DOI":"10.1109\/ICIME.2010.5477912"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Chawdhury, M.D.A., and Habib, A.H.M.A. (2008, January 24\u201327). Security enhancement of MD5 hashed passwords by using the unused bits of TCP header. Proceedings of the 2008 11th International Conference on Computer and Information Technology, Khulna, Bangladesh.","DOI":"10.1109\/ICCITECHN.2008.4803081"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"50974","DOI":"10.1109\/ACCESS.2018.2869543","article-title":"MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/CC.2014.6969789","article-title":"An overview of Internet of Vehicles","volume":"11","author":"Yang","year":"2014","journal-title":"China Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.trc.2012.05.004","article-title":"Collaborative positioning and embedded multi-sensors fusion cooperation in advanced driver assistance system","volume":"29","author":"Salameh","year":"2013","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"ref_30","first-page":"44","article-title":"Clustering based cognitive MAC protocol for channel allocation to prioritize safety message dissemination in vehicular ad-hoc network","volume":"5","author":"Gupta","year":"2016","journal-title":"Veh. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Temel, S., Vuran, M.C., and Faller, R.K. (2016, January 18\u201321). A Primer on Vehicle-to-Barrier Communications: Effects of Roadside Barriers, Encroachment, and Vehicle Braking. Proceedings of the 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada.","DOI":"10.1109\/VTCFall.2016.7880871"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.dcan.2016.10.003","article-title":"An empirical study of DSRC V2V performance in truck platooning scenarios","volume":"2","author":"Gao","year":"2016","journal-title":"Digit. Commun. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Xie, Y., Su, X., He, Y., Chen, X., Cai, G., Xu, B., and Ye, W. (2017, January 24\u201326). STM32-based vehicle data acquisition system for Internet-of-Vehicles. Proceedings of the IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS), Wuhan, China.","DOI":"10.1109\/ICIS.2017.7960119"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2740","DOI":"10.1109\/TITS.2017.2657649","article-title":"Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm","volume":"18","author":"Liu","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_35","unstructured":"Fortino, G., Russo, W., Savaglio, C., Viroli, M., and Zhou, M. (2020, February 26). Modeling Opportunistic IoT Services in Open IoT Ecosystems. Available online: http:\/\/ceur-ws.org\/Vol-1867\/w16.pdf."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Cugola, G., and Margara, A. (2012). Processing Flows of Information: From Data Stream to Complex Event Processing. ACM Comput. Surv., 44.","DOI":"10.1145\/2187671.2187677"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"9570","DOI":"10.1109\/TVT.2016.2621354","article-title":"A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks","volume":"65","author":"Tan","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Vladyko, A., Khakimov, A., Muthanna, A., Ateya, A.A., and Koucheryavy, A. (2019). Distributed Edge Computing to Assist Ultra-Low-Latency VANET Applications. Future Internet, 11.","DOI":"10.3390\/fi11060128"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Arena, F., and Pau, G. (2019). An Overview of Vehicular Communications. Future Internet, 11.","DOI":"10.3390\/fi11020027"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Libed, J.M., Sison, A.M., and Medina, R.P. (2018, January 28\u201330). Improved MD5 through the Extension of 1024 Message Input Block. Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, Hanoi, Vietnam.","DOI":"10.1145\/3278312.3278318"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Vasudev, H., and Das, D. (2018, January 8\u201312). A Lightweight Authentication Protocol for V2V Communication in VANETs. Proceedings of the 2018 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation, Guangzhou, China.","DOI":"10.1109\/SmartWorld.2018.00215"},{"key":"ref_42","unstructured":"MathWorks MATLAB (2020, February 26). Version 8.5 (R2015a). Available online: https:\/\/www.mathworks.com\/help\/matlab\/release-notes-R2015a.html."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Ren, C., Zhang, W., Qin, L., and Sun, B. (2018). Queue Spillover Management in a Connected Vehicle Environment. Future Internet, 10.","DOI":"10.3390\/fi10080079"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Amadeo, M., Campolo, C., Molinaro, A., Harri, J., Rothenberg, C.E., and Vinel, A. (2019). Enhancing the 3GPP V2X Architecture with Information-Centric Networking. Future Internet, 11.","DOI":"10.3390\/fi11090199"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.comnet.2015.11.024","article-title":"Green data center with IoT sensing and cloud-assisted smart temperature control system","volume":"101","author":"Liu","year":"2016","journal-title":"Comput. Netw."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/4\/63\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:14:07Z","timestamp":1760174047000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/4\/63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":45,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,4]]}},"alternative-id":["fi12040063"],"URL":"https:\/\/doi.org\/10.3390\/fi12040063","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}