{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:06:50Z","timestamp":1772302010331,"version":"3.50.1"},"reference-count":44,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2023,4,23]],"date-time":"2023-04-23T00:00:00Z","timestamp":1682208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, security and privacy concerns pose significant challenges that must be addressed. Therefore, researchers have focused on improving the security and integrity of vehicle data sharing, with a particular emphasis on V2X application layer security and privacy requirements. This is crucial given that V2X networks can consist of vehicles manufactured by different companies and registered in various jurisdictions, which may only be within communication range for a few seconds. Thus, it is necessary to establish a trusting relationship between vehicles quickly. The article proposes a threshold cryptography-based key exchange protocol that meets the key requirements for V2X data sharing and privacy, including the rapid establishment of trust, the maintenance of vehicle anonymity, and the provision of secure messages. To evaluate the feasibility and performance of the proposed protocol, a tailored testbed that leverages the NS-3 network simulator, a commercial 5G network, and public cloud infrastructure is used. Overall, the proposed protocol provides a potential solution for addressing security and privacy concerns in V2X networks, which is essential for successfully implementing and adopting this technology.<\/jats:p>","DOI":"10.3390\/fi15050157","type":"journal-article","created":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T01:35:44Z","timestamp":1682300144000},"page":"157","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems"],"prefix":"10.3390","volume":"15","author":[{"given":"Nuwan","family":"Weerasinghe","sequence":"first","affiliation":[{"name":"Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6440-4595","authenticated-orcid":false,"given":"Muhammad Arslan","family":"Usman","sequence":"additional","affiliation":[{"name":"Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7593-6661","authenticated-orcid":false,"given":"Chaminda","family":"Hewage","sequence":"additional","affiliation":[{"name":"Cybersecurity and Information Networks Centre (CINC), Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK"}]},{"given":"Eckhard","family":"Pfluegel","sequence":"additional","affiliation":[{"name":"Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK"}]},{"given":"Christos","family":"Politis","sequence":"additional","affiliation":[{"name":"Faculty of Science, Engineering and Computing, Kingston University London, London KT1 2EE, UK"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Paul, A., Chilamkurti, N., Daniel, A., and Rho, S. (2017). Chapter 2\u2014Intelligent transportation systems, Intelligent Vehicular Networks and Communications, Elsevier.","DOI":"10.1016\/B978-0-12-809266-8.00002-8"},{"key":"ref_2","unstructured":"3GPP Universal Mobile Telecommunications System (UMTS), and LTE (2017). Architecture enhancement for V2X Services (3GPP TS 23.285 version 14.2.0 Release 14) Technical Report, ETSI. Available online: https:\/\/www.etsi.org\/deliver\/etsi_ts\/123200_123299\/123285\/14.02.00_60\/ts_123285v140200p.pdf."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"380","DOI":"10.3390\/electronics4030380","article-title":"Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures","volume":"4","author":"Hamida","year":"2015","journal-title":"Electronics"},{"key":"ref_4","unstructured":"IFilippi, A., Moerman, K., Martinez, V., Haran, O., and Toledano-Autotalks, R. (2017, January 27\u201329). IEEE802.11p ahead of LTE-V2V for safety applications. Proceedings of the 2017 IEEE Vehicular Networking Conference (VNC), Torino, Italy. Available online: https:\/\/www.nxp.com.cn\/docs\/en\/white-paper\/LTE-V2V-WP.pdf."},{"key":"ref_5","unstructured":"Dawood, M., Fuhrmann, W., and Ghita, B.V. (2014, January 8\u201310). Assay of White Space Technology Standards for Vehicular Cognitive Access. Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1109\/COMST.2014.2319555","article-title":"A survey on device-to-device communication in cellular networks","volume":"16","author":"Asadi","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"35368","DOI":"10.1109\/ACCESS.2020.2973706","article-title":"3GPP NR Sidelink Transmissions Toward 5G V2X","volume":"8","author":"Lien","year":"2020","journal-title":"IEEE Access"},{"key":"ref_8","unstructured":"(2013). IEEE Standard for Wireless Access in Vehicular Environments\u2014Security Services for Applications and Management Messages, in IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006). Standard No. IEEE Std 1609.2-2013."},{"key":"ref_9","unstructured":"Schlienz, R.A., and Whitepaper, J. (2015). Device to Device Communication in LTE Technical Report, Rohde & Schwarz. Available online: https:\/\/www.rohde-schwarz.com\/us\/applications\/device-to-device-communication-in-lte-white-paper_230599.html."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TWC.2004.842941","article-title":"Security analysis and enhancements of 3gpp authentication and key agreement protocol","volume":"4","author":"Zhang","year":"2005","journal-title":"IEEE Trans. Wireless Commun."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Hsu, R.H., and Lee, J. (2015, January 28\u201330). Group anonymous D2D communication with end-to-end security in LTE-A. Proceedings of the 2015 IEEE Conference on Communications and Network Security (CNS), Florence, Italy.","DOI":"10.1109\/CNS.2015.7346857"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Saxena, N. (2006, January 6\u20139). Public key cryptography sans certificates in ad hoc networks. Proceedings of the International Conference on Applied Cryptography and Network Security, Singapore.","DOI":"10.1007\/11767480_26"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/TPDS.2008.77","article-title":"Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs","volume":"20","author":"Saxena","year":"2008","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Saxena, N., Tsudik, G., and Yi, J.H. (2004, January 5\u20139). Identity-based access control for ad hoc groups. Proceedings of the International Conference on Information Security and Cryptology, Jeju Island, Korea.","DOI":"10.1007\/11496618_27"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1109\/TIFS.2009.2031946","article-title":"Noninteractive Self-Certification for Long-Lived Mobile Ad Hoc Networks","volume":"4","author":"Saxena","year":"2009","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"Elgamal","year":"1985","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_17","first-page":"94","article-title":"Security issues in V2X communication","volume":"56","author":"Cho","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_18","first-page":"129","article-title":"5G V2X Communications: Challenges and Opportunities","volume":"57","author":"Serrano","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_19","unstructured":"Wu, B., Wu, J., and Cardei, M. (2008). Handbook of Research on Wireless Security, IGI Global."},{"key":"ref_20","unstructured":"Bellovin, S., and Housley, R. (2005). Request for Comments (RFC) 4107, Internet Engineering Task Force. Available online: https:\/\/tools.ietf.org\/html\/rfc4107."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"Raya","year":"2007","journal-title":"J. Comput. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P.-H., and Shen, X. (2008, January 13\u201318). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. Proceedings of the IEEE INFOCOM 2008\u2014The 27th Conference on Computer Communications, Phoenix, AZ, USA.","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wasef, A., Jiang, Y., and Shen, X. (2008\u20134, January 30). ECMV: Efficient certificate management scheme for vehicular networks. Proceedings of the IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, New Orleans, LA, USA.","DOI":"10.1109\/GLOCOM.2008.ECP.129"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","article-title":"An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks","volume":"20","author":"Cui","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/TMC.2003.1195151","article-title":"Self-organized public-key management for mobile ad hoc networks","volume":"2","author":"Capkun","year":"2003","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/COMST.2006.253271","article-title":"A survey of key management in ad hoc networks","volume":"8","author":"Hegland","year":"2006","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","article-title":"Identity-Based Encryption from the Weil Pairing","volume":"32","author":"Boneh","year":"2003","journal-title":"SIAM J. Comput."},{"key":"ref_28","unstructured":"Girault, M. (1991, January 8\u201311). Self-certified public keys. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK."},{"key":"ref_29","unstructured":"Al-Riyami, S.S., and Paterson, K.G. (December, January 30). Certificateless public key cryptography. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan."},{"key":"ref_30","first-page":"343","article-title":"Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks","volume":"8","author":"Rana","year":"2011","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/65.806983","article-title":"Securing ad hoc networks","volume":"13","author":"Zhou","year":"1999","journal-title":"IEEE Netw."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Chor, B., Goldwasser, S., Micali, S., and Awerbuch, B. (1985, January 21\u201323). Verifiable secret sharing and achieving simultaneity in the presence of faults. Proceedings of the 26th Annual Symposium on Foundations of Computer Science (sfcs 1985), Portland, OR, USA.","DOI":"10.1109\/SFCS.1985.64"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Feldman, P. (1987, January 12\u201314). A practical scheme for non-interactive verifiable secret sharing. Proceedings of the 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), Los Angeles, CA, USA.","DOI":"10.1109\/SFCS.1987.4"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Suh, G.E., and Devadas, S. (2007, January 4\u20138). Physical unclonable functions for device authentication and secret key generation. Proceedings of the 2007 44th ACM\/IEEE Design Automation Conference, San Diego, CA, USA.","DOI":"10.1109\/DAC.2007.375043"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Al Ibrahim, O., and Nair, S. (2011, January 4\u20138). Cyber-physical security using system-level PUFs. Proceedings of the 2011 7th International Wireless Communications and Mobile Computing Conference, Istanbul, Turkey.","DOI":"10.1109\/IWCMC.2011.5982786"},{"key":"ref_37","unstructured":"Shamir, A. (1984, January 9\u201311). Identity-based cryptosystems and signature schemes. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Paris, France."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Bellare, M., and Rogaway, P. (1993, January 3\u20135). Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA.","DOI":"10.1145\/168588.168596"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s00145-003-0052-4","article-title":"Separating decision Diffie\u2013Hellman from computational Diffie\u2013Hellman in cryptographic groups","volume":"16","author":"Joux","year":"2003","journal-title":"J. Cryptol."},{"key":"ref_40","unstructured":"Stallman, R. (2023, April 19). \u201cGNU General Public License Version 2.\u201d Free Software Foundation. Available online: https:\/\/www.gnu.org\/licenses\/old-licenses\/gpl-2.0.en.html."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Su, Z., Liu, Y., Xian, C., and Zhao, Y. (2021, January 28\u201330). Pre-specified-time coordination algorithm for convex optimization problems over weight-unbalanced networks. Proceedings of the 2021 36th Youth Academic Annual Conference of Chinese Association of Automation (YAC), Nanchang, China.","DOI":"10.1109\/YAC53711.2021.9486469"},{"key":"ref_42","unstructured":"Razavi, S.M., and Yuan, D. (2022, January 24\u201328). Mitigating mobility signaling congestion in LTE by overlapping tracking area lists. Proceedings of the 14th ACM international Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM \u201811), Association for Computing Machinery, New York, NY, USA."},{"key":"ref_43","unstructured":"(2023, April 19). Tap Bridge Class Reference, 10. Available online: https:\/\/www.nsnam.org\/docs\/doxygen\/classns3_1_1_tap_bridge.html."},{"key":"ref_44","unstructured":"Amazon Web Services (2023, April 19). Amazon Elastic Compute Cloud (EC2) T3a Instances. Available online: https:\/\/aws.amazon.com\/ec2\/instance-types\/t3\/."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/5\/157\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:21:55Z","timestamp":1760124115000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/5\/157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,23]]},"references-count":44,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["fi15050157"],"URL":"https:\/\/doi.org\/10.3390\/fi15050157","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,23]]}}}