{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T12:12:06Z","timestamp":1773317526615,"version":"3.50.1"},"reference-count":44,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T00:00:00Z","timestamp":1753056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"\u201cLingyan\u201d R&amp;D Program of Zhejiang Province","award":["2023C01238"],"award-info":[{"award-number":["2023C01238"]}]},{"name":"\u201cLingyan\u201d R&amp;D Program of Zhejiang Province","award":["2023C01133"],"award-info":[{"award-number":["2023C01133"]}]},{"name":"\u201cLingyan\u201d R&amp;D Program of Zhejiang Province","award":["2023BZ10002"],"award-info":[{"award-number":["2023BZ10002"]}]},{"name":"\u201cJianbing\u201d R&amp;D Program of Zhejiang Province","award":["2023C01238"],"award-info":[{"award-number":["2023C01238"]}]},{"name":"\u201cJianbing\u201d R&amp;D Program of Zhejiang Province","award":["2023C01133"],"award-info":[{"award-number":["2023C01133"]}]},{"name":"\u201cJianbing\u201d R&amp;D Program of Zhejiang Province","award":["2023BZ10002"],"award-info":[{"award-number":["2023BZ10002"]}]},{"name":"Key R&amp;D Program of Jiaxing City","award":["2023C01238"],"award-info":[{"award-number":["2023C01238"]}]},{"name":"Key R&amp;D Program of Jiaxing City","award":["2023C01133"],"award-info":[{"award-number":["2023C01133"]}]},{"name":"Key R&amp;D Program of Jiaxing City","award":["2023BZ10002"],"award-info":[{"award-number":["2023BZ10002"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The Internet of Vehicles (IoV) operates in an environment characterized by asymmetric security threats, where centralized vulnerabilities create a critical imbalance that can be disproportionately exploited by attackers. This study addresses this imbalance by proposing a symmetrical security framework that integrates Blockchain and Federated Learning (FL) to restore equilibrium in the Vehicle\u2013Road\u2013Cloud ecosystem. The evolution toward sixth-generation (6G) technologies amplifies both the potential of vehicle-to-everything (V2X) communications and its inherent security risks. The proposed framework achieves a delicate balance between robust security and operational efficiency. By leveraging blockchain\u2019s symmetrical and decentralized distribution of trust, the framework ensures data and model integrity. Concurrently, the privacy-preserving approach of FL balances the need for collaborative intelligence with the imperative of safeguarding sensitive vehicle data. A novel Cloud Proxy Re-Encryption Offloading (CPRE-IoV) algorithm is introduced to facilitate efficient model updates. The architecture employs a partitioned blockchain and a smart contract-driven FL pipeline to symmetrically neutralize threats from malicious nodes. Finally, extensive simulations validate the framework\u2019s effectiveness in establishing a resilient and symmetrically secure foundation for next-generation IoV networks.<\/jats:p>","DOI":"10.3390\/sym17071168","type":"journal-article","created":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T17:27:36Z","timestamp":1753118856000},"page":"1168","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Integrated Blockchain and Federated Learning for Robust Security in Internet of Vehicles Networks"],"prefix":"10.3390","volume":"17","author":[{"given":"Zhikai","family":"He","sequence":"first","affiliation":[{"name":"School of Mechanical and Vehicle Engineering, Changsha University of Science and Technology, Changsha 410114, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8003-7477","authenticated-orcid":false,"given":"Rui","family":"Xu","sequence":"additional","affiliation":[{"name":"Chengnan College, Changsha University of Science and Technology, Changsha 410114, China"}]},{"given":"Binyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of City and Regional Planning, Georgia Institute of Technology, Atlanta, GA 30332, USA"}]},{"given":"Qisong","family":"Meng","sequence":"additional","affiliation":[{"name":"Chengnan College, Changsha University of Science and Technology, Changsha 410114, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0360-5526","authenticated-orcid":false,"given":"Qiang","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Anhui University of Science and Technology, Hefei 231131, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7957-4442","authenticated-orcid":false,"given":"Li","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Information and Electronics, Beijing Institute of Technology, Beijing 100080, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2962-6334","authenticated-orcid":false,"given":"Zhen","family":"Tian","sequence":"additional","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK"}]},{"given":"Jianyu","family":"Duan","sequence":"additional","affiliation":[{"name":"School of Transportation Science and Engineering, Beihang University, Beijing 100080, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/JIOT.2021.3103320","article-title":"6G Internet of Things: A comprehensive survey","volume":"9","author":"Nguyen","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Kwon, H. (2024). Secure and Scalable Device Attestation Protocol with Aggregate Signature. Symmetry, 16.","DOI":"10.3390\/sym17050698"},{"key":"ref_3","unstructured":"(2010). Wireless Access in Vehicular Environments (Standard No. IEEE 802. 11p)."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/JPROC.2022.3173031","article-title":"6G for vehicle-to-everything (V2X) communications: Enabling technologies, challenges, and opportunities","volume":"110","author":"Liu","year":"2022","journal-title":"Proc. IEEE"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4259","DOI":"10.1109\/TIV.2024.3377163","article-title":"Cooperative Localization in Transportation 5.0","volume":"9","author":"Gao","year":"2024","journal-title":"IEEE Trans. Intell. Veh."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3872","DOI":"10.1109\/JIOT.2020.2974823","article-title":"A Vision of C-V2X: Technologies, Field Testing, and Challenges With Chinese Development","volume":"7","author":"Chen","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"7572","DOI":"10.1109\/JIOT.2021.3130054","article-title":"Autonomous Driving Security: State of the Art and Challenges","volume":"9","author":"Gao","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Annu (2023, January 11\u201314). Advancing 6G V2X Networks Through Transparent Congestion Metric Estimation. Proceedings of the 2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Jaipur, India.","DOI":"10.1109\/ANTS59832.2023.10468805"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"4535","DOI":"10.1109\/TVT.2021.3133308","article-title":"SecCDV: A Security Reference Architecture for Cybertwin-Driven 6G V2X","volume":"71","author":"Li","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"13218","DOI":"10.1109\/TITS.2023.3243542","article-title":"A Secure Intelligent System for Internet of Vehicles: Case Study on Traffic Forecasting","volume":"24","author":"Djenouri","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Javed, A.R., Hassan, M.A., Shahzad, F., Ahmed, W., Singh, S., Baker, T., and Gadekallu, T.R. (2022). Integration of blockchain technology and federated learning in vehicular (iot) networks: A comprehensive survey. Sensors, 22.","DOI":"10.3390\/s22124394"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","article-title":"Blockchain and federated learning for privacy-preserved data sharing in industrial IoT","volume":"16","author":"Lu","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"12399","DOI":"10.1109\/TVT.2024.3385916","article-title":"Zero-x: A blockchain-enabled open-set federated learning framework for zero-day attack detection in iov","volume":"73","author":"Boualouache","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Ullah, I., Deng, X., Pei, X., and Mushtaq, H. (2024). SecBFL-IoV: A Secure Blockchain-Enabled Federated Learning Framework for Resilience Against Poisoning Attacks in Internet of Vehicles. Pattern Recognition and Computer Visio, Proceedings of the Chinese Conference on Pattern Recognition and Computer Vision (PRCV), Urumqi, China, 18\u201320 October 2024, Springer Nature.","DOI":"10.1007\/978-981-97-8487-5_29"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Ahmed, H.A., Jasim, H.M., Gatea, A.N., Al-Asadi, A.A.A., and Al-Asadi, H.A.A. (2024). A secure and efficient blockchain enabled federated Q-learning model for vehicular Ad-hoc networks. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-82585-3"},{"key":"ref_16","first-page":"12","article-title":"Blockchain for intelligent vehicular communication","volume":"55","author":"Mumtaz","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1109\/LCOMM.2018.2813360","article-title":"Call Admission Control for Non-Standalone 5G Ultra-Dense Networks","volume":"22","author":"Cosmas","year":"2018","journal-title":"IEEE Commun. Lett."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","article-title":"Security and privacy for cloud-based IoT: Challenges","volume":"55","author":"Zhou","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_19","first-page":"8075","article-title":"A framework to balance location privacy preservation with quality of experience","volume":"65","author":"Feng","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"16222","DOI":"10.1109\/JIOT.2022.3152223","article-title":"Modeling Control Delays for Edge-Enabled UAVs in Cellular Networks","volume":"9","author":"Wu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1881","DOI":"10.1109\/TNET.2021.3073272","article-title":"Coordinated 5G Network Slicing: How Constructive Interference Can Boost Network Throughput","volume":"29","author":"Bonati","year":"2021","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Saleem, J., Raza, U., Hammoudeh, M., and Holderbaum, W. (2025). Machine Learning-Enhanced Attribute-Based Authentication for Secure IoT Access Control. Sensors, 25.","DOI":"10.3390\/s25092779"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MCOM.003.2100852","article-title":"High-Rate Uninterrupted Internet of Vehicle Communications in Highways: Dynamic Blockage Avoidance and CSIT Acquisition","volume":"60","author":"Guo","year":"2022","journal-title":"IEEE Commun. Mag."},{"key":"ref_24","first-page":"110","article-title":"Security in vehicular ad hoc networks","volume":"46","author":"Lin","year":"2008","journal-title":"IEEE Commun. Mag."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1109\/OJVT.2024.3375451","article-title":"Sustainable Mobility in B5G\/6G: V2X Technology Trends and Use Cases","volume":"5","author":"Roger","year":"2024","journal-title":"IEEE Open J. Veh. Technol."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1109\/TBC.2019.2912619","article-title":"Multicast and Broadcast Enablers for High-Performing Cellular V2X Systems","volume":"65","author":"Fallgren","year":"2019","journal-title":"IEEE Trans. Broadcast."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Haliloglu, O., Yu, H., Madapatha, C., Guo, H., Kadan, F.E., and Wolfgang, A. (2023, January 6\u20139). Distributed MIMO Systems for 6G. Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit), Gothenburg, Sweden.","DOI":"10.1109\/EuCNC\/6GSummit58263.2023.10188355"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"6664","DOI":"10.1109\/JIOT.2023.3311800","article-title":"Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks","volume":"11","author":"Shen","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_29","first-page":"942","article-title":"A Mobile Agent-Based Framework for Flexible Automation Systems","volume":"15","author":"Nestinger","year":"2010","journal-title":"IEEE\/ASME Trans. Mechatronics"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1109\/TNET.2023.3313557","article-title":"Dissecting Operational Cellular IoT Service Security: Attacks and Defenses","volume":"32","author":"Wang","year":"2023","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Zhang, C., Li, J., Wang, N., and Zhang, D. (2025). Research on Intrusion Detection Method Based on Transformer and CNN-BiLSTM in Internet of Things. Sensors, 25.","DOI":"10.3390\/s25092725"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MC.2018.2141033","article-title":"Penetration Testing in the IoT Age","volume":"51","author":"Chen","year":"2018","journal-title":"Computer"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wang, B., Han, Y., Wang, S., Tian, D., Cai, M., Liu, M., and Wang, L. (2022). A Review of Intelligent Connected Vehicle Cooperative Driving Development. Mathematics., 10.","DOI":"10.3390\/math10193635"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TR.2024.3355905","article-title":"Reliability Engineering in a Time of Rapidly Converging Technologies","volume":"73","author":"Shieh","year":"2024","journal-title":"IEEE Trans. Reliab."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1990","DOI":"10.1109\/JIOT.2023.3303010","article-title":"Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids","volume":"11","author":"Chang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Nelson, K., Mohammadi, J., Chen, Y., Aved, A., Ferris, D., and Blasch, E. (2024, January 6\u20138). Electric Vehicle Aggregation Review: Benefits and Vulnerabilities of Managing a Growing Fleet. Proceedings of the 2024 IEEE Texas Power and Energy Conference (TPEC), College Station, TX, USA.","DOI":"10.1109\/TPEC60005.2024.10472169"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/TTHZ.2023.3237697","article-title":"Deep Learning at the Physical Layer for Adaptive Terahertz Communications","volume":"13","author":"Hall","year":"2023","journal-title":"IEEE Trans. Terahertz Sci. Technol."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Chang, K.K.-C., Liu, X., Lin, C.-W., Huang, C., and Zhu, Q. (2023, January 17\u201319). A Safety-Guaranteed Framework for Neural-Network-Based Planners in Connected Vehicles under Communication Disturbance. Proceedings of the 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), Antwerp, Belgium.","DOI":"10.23919\/DATE56975.2023.10137184"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1109\/TNET.2022.3205183","article-title":"Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures","volume":"31","author":"Lu","year":"2022","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"6033","DOI":"10.1109\/TWC.2022.3145399","article-title":"AI-Driven Blind Signature Classification for IoT Connectivity: A Deep Learning Approach","volume":"21","author":"Pan","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Abdo, A., Wu, G., Zhu, Q., and Abu-Ghazaleh, N. (2022, January 4\u20139). CVGuard: Mitigating Application Attacks on Connected Vehicles. Proceedings of the 2022 IEEE Intelligent Vehicles Symposium (IV), Aachen, Germany.","DOI":"10.1109\/IV51971.2022.9827191"},{"key":"ref_42","first-page":"50","article-title":"Federated Learning: Challenges, Methods, and Future Directions","volume":"37","author":"Li","year":"2020","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Maftei, A.A., Petrariu, A.I., Popa, V., and Lavric, A. (2025). A Blockchain Framework for Scalable, High-Density IoT Networks of the Future. Sensors, 25.","DOI":"10.3390\/s25092886"},{"key":"ref_44","unstructured":"(2021). Road Vehicles\u2014Cybersecurity Engineering (Standard No. ISO\/SAE 21434)."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/7\/1168\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:13:34Z","timestamp":1760033614000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/7\/1168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,21]]},"references-count":44,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["sym17071168"],"URL":"https:\/\/doi.org\/10.3390\/sym17071168","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,21]]}}}