{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:43:06Z","timestamp":1775144586910,"version":"3.50.1"},"reference-count":44,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T00:00:00Z","timestamp":1656806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Scientific Research Deanship at the University of Ha\u2019il, Saudi Arabia","award":["RG-21098"],"award-info":[{"award-number":["RG-21098"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The security and privacy concerns in vehicular communication are often faced with schemes depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the operations used by BP and EC are time-consuming and more complicated. None of the previous studies fittingly tackled the efficient performance of signing messages and verifying signatures. Therefore, a chaotic map-based conditional privacy-preserving authentication (CM-CPPA) scheme is proposed to provide communication security in 5G-enabled vehicular networks in this paper. The proposed CM-CPPA scheme employs a Chebyshev polynomial mapping operation and a hash function based on a chaotic map to sign and verify messages. Furthermore, by using the AVISPA simulator for security analysis, the results of the proposed CM-CPPA scheme are good and safe against general attacks. Since EC and BP operations do not employ the proposed CM-CPPA scheme, their performance evaluation in terms of overhead such as computation and communication outperforms other most recent related schemes. Ultimately, the proposed CM-CPPA scheme decreases the overhead of computation of verifying the signatures and signing the messages by 24.2% and 62.52%, respectively. Whilst, the proposed CM-CPPA scheme decreases the overhead of communication of the format tuple by 57.69%.<\/jats:p>","DOI":"10.3390\/s22135026","type":"journal-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T23:38:55Z","timestamp":1656977935000},"page":"5026","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2358-3785","authenticated-orcid":false,"given":"Mahmood A.","family":"Al-Shareeda","sequence":"first","affiliation":[{"name":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4378-1954","authenticated-orcid":false,"given":"Selvakumar","family":"Manickam","sequence":"additional","affiliation":[{"name":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3539-4161","authenticated-orcid":false,"given":"Badiea Abdulkarem","family":"Mohammed","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, University of Ha\u2019il, Ha\u2019il 81481, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6367-0309","authenticated-orcid":false,"given":"Zeyad Ghaleb","family":"Al-Mekhlafi","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, University of Ha\u2019il, Ha\u2019il 81481, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5210-7086","authenticated-orcid":false,"given":"Amjad","family":"Qtaish","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, University of Ha\u2019il, Ha\u2019il 81481, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5297-3494","authenticated-orcid":false,"given":"Abdullah J.","family":"Alzahrani","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, University of Ha\u2019il, Ha\u2019il 81481, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8851-6180","authenticated-orcid":false,"given":"Gharbi","family":"Alshammari","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, University of Ha\u2019il, Ha\u2019il 81481, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7145-7137","authenticated-orcid":false,"given":"Amer A.","family":"Sallam","sequence":"additional","affiliation":[{"name":"Engineering and Information Technology College, Taiz University, Taiz 6803, Yemen"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8485-7268","authenticated-orcid":false,"given":"Khalil","family":"Almekhlafi","sequence":"additional","affiliation":[{"name":"CBA-Yanbu, Taibah University, Al Madinah 42353, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MNET.001.1900220","article-title":"Security and privacy challenges in 5G-enabled vehicular networks","volume":"34","author":"Lai","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1109\/JIOT.2018.2884200","article-title":"Wireless toward the era of intelligent vehicles","volume":"6","author":"Cheng","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Al-Shareeda, M.A., Anbar, M., Manickam, S., and Hasbullah, I.H. (2022). A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Sensors, 22.","DOI":"10.3390\/s22051696"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"121522","DOI":"10.1109\/ACCESS.2021.3109264","article-title":"Security and Privacy Schemes in Vehicular Ad-Hoc Network with Identity-Based Cryptography Approach: A Survey","volume":"9","author":"Anbar","year":"2021","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Alazzawi, M.A., Al-behadili, H.A., Srayyih Almalki, M.N., Challoob, A.L., and Al-shareeda, M.A. (2020, January 8\u20139). ID-PPA: Robust identity-based privacy-preserving authentication scheme for a vehicular ad-hoc network. Proceedings of the International Conference on Advances in Cyber Security, Penang, Malaysia.","DOI":"10.1007\/978-981-33-6835-4_6"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/CC.2018.8424577","article-title":"5G enabled vehicular communications and networking","volume":"15","author":"Cheng","year":"2018","journal-title":"China Commun."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Al-Shareeda, M.A., Manickam, S., Mohammed, B.A., Al-Mekhlafi, Z.G., Qtaish, A., Alzahrani, A.J., Alshammari, G., Sallam, A.A., and Almekhlafi, K. (2022). Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks. Appl. Sci., 12.","DOI":"10.3390\/app12125939"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MWC.2016.1500374WC","article-title":"Energy efficiency in massive MIMO-based 5G networks: Opportunities and challenges","volume":"24","author":"Prasad","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_9","first-page":"2422","article-title":"Survey of authentication and privacy schemes in vehicular ad hoc networks","volume":"21","author":"Anbar","year":"2020","journal-title":"IEEE Sens. J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","article-title":"An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks","volume":"20","author":"Cui","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Hamdi, M.M., Mustafa, A.S., Mahd, H.F., Abood, M.S., Kumar, C., and Al-shareeda, M.A. (2020, January 6\u20138). Performance analysis of QoS in MANET based on IEEE 802.11 b. Proceedings of the 2020 IEEE International Conference for Innovation in Technology (INOCON), Bangluru, India.","DOI":"10.1109\/INOCON50539.2020.9298362"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"Raya","year":"2007","journal-title":"J. Comput. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Cincilla, P., Hicham, O., and Charles, B. (2016, January 8\u201310). Vehicular PKI scalability-consistency trade-offs in large scale distributed scenarios. Proceedings of the 2016 IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA.","DOI":"10.1109\/VNC.2016.7835970"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1109\/TITS.2011.2156790","article-title":"PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs","volume":"12","author":"Huang","year":"2011","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Joshi, A., Gaonkar, P., and Bapat, J. (2017, January 22\u201324). A reliable and secure approach for efficient car-to-car communication in intelligent transportation systems. Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India.","DOI":"10.1109\/WiSPNET.2017.8300034"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","article-title":"Pseudonym changing at social spots: An effective strategy for location privacy in vanets","volume":"61","author":"Lu","year":"2011","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1007\/s11277-014-2245-6","article-title":"Pseudonyms based blind signature approach for an improved secured communication at social spots in VANETs","volume":"82","author":"Thenmozhi","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"7770","DOI":"10.1109\/ACCESS.2016.2620999","article-title":"A hierarchical privacy preserving pseudonymous authentication protocol for VANET","volume":"4","author":"Rajput","year":"2016","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Asghar, M., Doss, R.R.M., and Pan, L. (2018, January 21\u201323). A scalable and efficient PKI based authentication protocol for VANETs. Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia.","DOI":"10.1109\/ATNAC.2018.8615224"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"F\u00f6rster, D., Kargl, F., and L\u00f6hr, H. (2014, January 3\u20135). PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET). Proceedings of the 2014 IEEE Vehicular Networking Conference (VNC), Paderborn, Germany.","DOI":"10.1109\/VNC.2014.7013305"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1007\/s12083-014-0269-z","article-title":"Mix-zones optimal deployment for protecting location privacy in VANET","volume":"8","author":"Sun","year":"2015","journal-title":"Peer Peer Netw. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1007\/s11276-011-0383-2","article-title":"On batch verification with group testing for vehicular communications","volume":"17","author":"Zhang","year":"2011","journal-title":"Wirel. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1007\/s11276-013-0543-7","article-title":"Toward a secure batch verification with group testing for VANET","volume":"19","author":"Lee","year":"2013","journal-title":"Wirel. Netw."},{"key":"ref_24","first-page":"351","article-title":"On the security of a secure batch verification with group testing for VANET","volume":"16","author":"Jianhong","year":"2014","journal-title":"Int. J. Netw. Secur."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.ins.2018.10.021","article-title":"Privacy-preserving authentication scheme with full aggregation in VANET","volume":"476","author":"Zhong","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","article-title":"EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks","volume":"18","author":"Azees","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1109\/TITS.2016.2579162","article-title":"Distributed aggregate privacy-preserving authentication in VANETs","volume":"18","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1080\/15472450.2019.1625042","article-title":"A new and efficient authentication scheme for vehicular ad hoc networks","volume":"24","author":"Bayat","year":"2020","journal-title":"J. Intell. Transp. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3083","DOI":"10.1007\/s11276-019-02039-x","article-title":"NERA: A New and Efficient RSU based Authentication Scheme for VANETs","volume":"26","author":"Bayat","year":"2020","journal-title":"Wirel. Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.comnet.2018.01.015","article-title":"NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET","volume":"134","author":"Pournaghi","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Al-Shareeda, M.A., Anbar, M., Manickam, S., and Hasbullah, I.H. (2021). SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. Sensors, 21.","DOI":"10.3390\/s21248206"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","article-title":"An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks","volume":"10","author":"He","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"5409","DOI":"10.1109\/TVT.2018.2822768","article-title":"A secure and efficient authentication technique for vehicular ad-hoc networks","volume":"67","author":"Asaar","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"113226","DOI":"10.1109\/ACCESS.2021.3104148","article-title":"Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks","volume":"9","author":"Anbar","year":"2021","journal-title":"IEEE Access"},{"key":"ref_35","first-page":"104","article-title":"EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks","volume":"13","author":"Li","year":"2018","journal-title":"Veh. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"222032","DOI":"10.1109\/ACCESS.2020.3044961","article-title":"Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC)","volume":"8","author":"Alshudukhi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"71424","DOI":"10.1109\/ACCESS.2019.2919973","article-title":"Efficient Conditional Anonymity with Message Integrity and Authentication in a Vehicular Ad hoc Network","volume":"7","author":"Alazzawi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/TDSC.2019.2904274","article-title":"PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks","volume":"18","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"15633","DOI":"10.1109\/ACCESS.2021.3053043","article-title":"A Lightweight Authentication with Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography","volume":"9","author":"Alshudukhi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"8914","DOI":"10.1109\/TVT.2020.2997694","article-title":"Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad hoc Networks","volume":"69","author":"Cui","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"7940","DOI":"10.1109\/TVT.2020.2994144","article-title":"Edge computing-based privacy-preserving authentication framework and protocol for 5G-enabled vehicular networks","volume":"69","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.1109\/TITS.2020.3023797","article-title":"Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks","volume":"23","author":"Cui","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"6417","DOI":"10.1109\/JIOT.2019.2895136","article-title":"RSMA: Reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks","volume":"6","author":"Cui","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Al-Shareeda, M.A., Anbar, M., Manickam, S., and Hasbullah, I.H. (2022). Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks. Appl. Sci., 12.","DOI":"10.3390\/app12031383"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/13\/5026\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:42:18Z","timestamp":1760139738000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/13\/5026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,3]]},"references-count":44,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2022,7]]}},"alternative-id":["s22135026"],"URL":"https:\/\/doi.org\/10.3390\/s22135026","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,3]]}}}