{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:58:39Z","timestamp":1768525119118,"version":"3.49.0"},"reference-count":39,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>5G-Vehicle-to-Everything (5G-V2X) supports high-reliability and low latency autonomous services and applications. Proposing an efficient security solution that supports multi-zone broadcast authentication and satisfies the 5G requirement is a critical challenge. In The 3rd Generation Partnership Project (3GPP) Release 16 standard, for Cellular- Vehicle-to-Everything (C-V2X) single-cell communication is suggested to reuse the IEEE1609.2 security standard that utilizes the Public Key Infrastructure (PKI) cryptography. PKI-based solutions provide a high-security level, however, it suffers from high communication and computation overhead, due to the large size of the attached certificate and signature. In this study, we propose a light-weight Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) based on the bilinear pairing cryptography and short-size signature. MAPP protocol provides three different authentication methods that enable a secure broadcast authentication over multiple zones of large-scale base stations, using a single message and a single short signature. We also propose a centralized dynamic key generation method for multiple zones. We implemented and analyzed the proposed key generation and authentication methods using an authentication simulator and a bilinear pairing library. The proposed methods significantly reduce the signature generation time by 16 times\u201380 times, as compared to the previous methods. Additionally, the proposed methods significantly reduced the signature verification time by 10 times\u201316 times, as compared to the two previous methods. The three proposed authentication methods achieved substantial speed-up in the signature generation time and verification time, using a short bilinear pairing signature.<\/jats:p>","DOI":"10.3390\/s21020665","type":"journal-article","created":{"date-parts":[[2021,1,20]],"date-time":"2021-01-20T03:34:25Z","timestamp":1611113665000},"page":"665","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8945-8664","authenticated-orcid":false,"given":"Shimaa A. Abdel","family":"Hakeem","sequence":"first","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea"},{"name":"Electronics Research Institute (ERI), Giza 12622, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2602-2075","authenticated-orcid":false,"given":"HyungWon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"key":"ref_1","first-page":"125","article-title":"Vehicular networking: A survey on spectrum access technologies and persisting challenges","volume":"2","author":"Khabbaz","year":"2015","journal-title":"Veh. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"9457","DOI":"10.1109\/TVT.2016.2591558","article-title":"Interworking of DSRC and Cellular Network Technologies for V2X Communications: A Survey","volume":"65","author":"Abboud","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MCOM.2016.7497765","article-title":"LTE release 14 outlook","volume":"54","author":"Hoymann","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Mir, Z.H., and Filali, F. (2014). LTE and IEEE 802.11p for vehicular networking: A performance evaluation. EURASIP J. Wirel. Commun. Netw., 89.","DOI":"10.1186\/1687-1499-2014-89"},{"key":"ref_5","unstructured":"Hakeem, S.A.A., Hady, A.A., and Kim, H.-W. (2020). 5G-V2X: Standardization, architecture, use cases, network-slicing, and edge-computing. Wirel. Netw., 1\u201327."},{"key":"ref_6","first-page":"50","article-title":"Survey on existing authentication issues for cellular-assisted V2X communication","volume":"12","author":"Muhammad","year":"2018","journal-title":"Veh. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.comnet.2018.12.018","article-title":"Cyber security challenges and solutions for V2X communications: A survey","volume":"151","author":"Alnasser","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Rajavelsamy, R., and Das, D. (2019). A Review on 3GPP 5G Security Aspects. Adv. Comput. Commun.","DOI":"10.34048\/2019.2.CF"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ben Henda, N. (2020). Overview on the Security in 5G Phase 2. J. ICT Stand., 1\u201314.","DOI":"10.13052\/jicts2245-800X.811"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1109\/JPROC.2019.2948302","article-title":"5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy","volume":"108","author":"Lu","year":"2020","journal-title":"Proc. IEEE"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MWC.2016.7422408","article-title":"5G ultra-dense cellular networks","volume":"23","author":"Xiaohu","year":"2016","journal-title":"IEEE Wirel. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Condoluci, M., Gallo, L., Mussot, L., Kousaridas, A., Spapis, P., Mahlouji, M., and Mahmoodi, T. (2019). 5G V2X System-Level Architecture of 5GCAR Project. Future Internet, 11.","DOI":"10.3390\/fi11100217"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Haidar, F., Kaiser, A., and Lonc, B. (2017, January 24\u201327). On the Performance Evaluation of Vehicular PKI Protocol for V2X Communications Security. Proceedings of the 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada.","DOI":"10.1109\/VTCFall.2017.8288286"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","article-title":"An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks","volume":"10","author":"He","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1109\/TITS.2015.2502322","article-title":"An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings","volume":"17","author":"Lo","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"17689","DOI":"10.1007\/s11042-016-3614-9","article-title":"An efficient anonymous authentication protocol using batch operations for VANETs","volume":"75","author":"Liu","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3235","DOI":"10.1109\/TVT.2015.2406877","article-title":"Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs","volume":"66","author":"Tzeng","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-319-42297-8_2","article-title":"Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks","volume":"Volume 9773","author":"Hu","year":"2016","journal-title":"Intelligent Computing Methodologies"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.ins.2015.04.033","article-title":"An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks","volume":"317","author":"Horng","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_20","unstructured":"Li, J., Yuan, H., and Zhang, Y. (2016). Cryptanalysis and Improvement of Certificateless Aggregate Signature with Conditional Privacy Preserving for Vehicular Sensor Networks, IACR. Available online: https:\/\/eprint.iacr.org\/2016\/692."},{"key":"ref_21","first-page":"317","article-title":"An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks","volume":"17","author":"Malhi","year":"2015","journal-title":"Discret. Math. Theor. Comput. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","article-title":"GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications","volume":"56","author":"Lin","year":"2007","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","article-title":"A secure authentication scheme for VANETs with batch verification","volume":"21","author":"Bayat","year":"2015","journal-title":"Wirel. Netw."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","article-title":"Short signatures from the Weil pairing","volume":"17","author":"Boneh","year":"2004","journal-title":"J. Cryptol."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MWC.2017.1600374","article-title":"5G mmWave Positioning for Vehicular Networks","volume":"24","author":"Wymeersch","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_26","unstructured":"Bergren, S. (2017). Design Considerations for a 5G Network Architecture. arXiv."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"El-Beaino, W., El-Hajj, A.M., and Dawy, Z. (2015, January 17\u201319). On Radio network planning for next generation 5G networks: A case study. Proceedings of the 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA\u201915), Sharjah, UAE.","DOI":"10.1109\/ICCSPA.2015.7081315"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MWC.2015.7368823","article-title":"Metaheuristics for the deployment of 5G","volume":"22","author":"Tsai","year":"2015","journal-title":"IEEE Wirel. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"107424","DOI":"10.1016\/j.comnet.2020.107424","article-title":"Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability","volume":"181","author":"Braeken","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_30","unstructured":"Miller, V.S. (1985, January 18\u201322). Use of Elliptic Curves in Cryptography. Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, USA."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","article-title":"Pairings for cryptographers","volume":"156","author":"Galbraith","year":"2008","journal-title":"Discret. Appl. Math."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"119689","DOI":"10.1109\/ACCESS.2019.2937182","article-title":"A Decentralized Lightweight Authentication and Privacy Protocol for Vehicular Networks","volume":"7","author":"Hakeem","year":"2019","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Preneel, B., and Tavares, S. (2006). Pairing-Friendly Elliptic Curves of Prime Order. SAC 2005: Selected Areas in Cryptography. Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/11693383"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/978-3-540-28628-8_9","article-title":"Compressed pairings","volume":"Volume 3152","author":"Franklin","year":"2004","journal-title":"Annual International Cryptology Conference\u2014CRYPTO 2004. Lecture Notes in Computer Science"},{"key":"ref_36","unstructured":"GitHub (2020, August 19). herumi\/mcl. Available online: https:\/\/github.com\/herumi\/mcl."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Takagi, T., Okamoto, T., Okamoto, E., and Okamoto, T. (2007). Implementing Cryptographic Pairings over Barreto-Naehrig Curves. Pairing-Based Cryptography\u2014Pairing 2007. Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/978-3-540-73489-5"},{"key":"ref_38","first-page":"1","article-title":"Current and future developments to improve 5G-NewRadio performance in vehicle-to-everything communications","volume":"75","author":"Hakeem","year":"2020","journal-title":"Telecommun. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Hakeem, S.A.A., El-Gawad, M.A.A., and Kim, H.-W. (2020). Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography. Sensors, 20.","DOI":"10.3390\/s20195719"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/2\/665\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:12:48Z","timestamp":1760159568000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/2\/665"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,19]]},"references-count":39,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021,1]]}},"alternative-id":["s21020665"],"URL":"https:\/\/doi.org\/10.3390\/s21020665","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,19]]}}}