Adaptive and Context-Aware Authentication Framework Using Edge AI and Blockchain in Future Vehicular Networks
Aitizaz Ali
Published: 2024/11/16
Abstract
The rise of connected and autonomous vehicles (CAVs) within intelligent transportation systems has introduced new demands for real-time, scalable, and privacy-preserving authentication mechanisms. Traditional authentication methods, such as Public Key Infrastructure (PKI), are often insufficient in highly dynamic vehicular environments due to their reliance on static credentials and centralized control. This paper proposes an adaptive and context-aware authentication framework that integrates Edge Artificial Intelligence (AI) with blockchain technology to secure vehicular communication. The framework leverages edge- based AI models to assess driver behavior and contextual signals in real time, generating dynamic trust scores for authentication. These scores are verified and recorded through a permissioned blockchain, ensuring tamper-proof identity validation and decentralized access control. The proposed system addresses key challenges including low latency, dynamic trust evaluation, and conditional privacy. Through detailed architectural design and security analysis, this work highlights the potential of hybrid AI-blockchain models to enhance the security, scalability, and accountability of future vehicular networks.
Keywords
Adaptive and Context-Aware Authentication Framework Using Edge AI and Blockchain in Future Vehicular Networks is licensed under CC BY 4.0
References
- Al-Shareeda, M. A., Alsadhan, A. A., Qasim, H. H., & Manickam, S. (2024). Software defined networking for Internet of Things: Review, techniques, challenges, and future directions. Bulletin of Electrical Engineering and Informatics.
- Mohammed, B. A., Al-Shareeda, M. A., Alsadhan, A. A., Al-Mekhlafi, Z. G., Sallam, A. A., Al-Qatab, B. A., Alshammari, M. T., & Alayba, A. M. (2024). Service-based veins framework for vehicular ad-hoc network (VANET): A systematic review of state-of-the-art. Peer-to-Peer Networking and Applications, 17, 2259–2281.
- Al-Shareeda, M. A., & Manickam, S. (2023). A systematic literature review on security of vehicular ad-hoc network (VANET) based on veins framework. IEEE Access, 11, 46218–46228.
- Al-Shareeda, M. A., Anbar, M., Manickam, S., & Hasbullah, I. H. (2020). Review of prevention schemes for man-in-the-middle (MITM) attack in vehicular ad hoc networks. International Journal of Engineering and Management Research.
- Al-Mekhlafi, Z. G., Lashari, S. A., Al-Shareeda, M. A., Mohammed, B. A., Alshudukhi, J. S., Al-Dhlan, K. A., & Manickam, S. (2024). Coherent taxonomy of vehicular ad hoc networks (VANETs) enabled by fog computing: A review. IEEE Sensors Journal, 24, 29575–29602.
- Almansor, M. J., Din, N. M., Baharuddin, M. Z., Alsayednoor, H. M., Al-Shareeda, M. A., Ma, M., & Al-asadi, A. J. (2025). Vessel berthing system using Internet of Things (IoT) for smart port. AIP Conference Proceedings.
- Al-Shareeda, M. A., Ali, A. M., Hammoud, M. A., Kazem, Z. H. M., & Hussein, M. A. (2025). Secure IoT-based real-time water level monitoring system using ESP32 for critical infrastructure. Journal of Cyber Security and Risk Auditing.
- Al-Shareeda, M. A., Manickam, S., & Sari, S. A. (2022). A survey of SQL injection attacks, their methods, and prevention techniques. In 2022 International Conference on Data Science and Intelligent Computing (ICDSIC) (pp. 31–35). IEEE.
- Olumide, M. L., Habib, A. M. M., Halim, F. A., Vijayan, G. A., Rusly, N. S., Fadzil, L. M., Al-Shareeda, M. A., & Manickam, S. (2023). Proposed order management system (OMS) for Gazi Communications. Journal of Computer Science & Computational Mathematics.
- Al-Shareeda, M. A., Manickam, S., & Saare, M. A. (2023). Enhancement of NTSA secure communication with one-time pad (OTP) in IoT. Informatica (Slovenia), 47.
- Hwa, K. C., Manickam, S., & Al-Shareeda, M. A. (2022). Review of peer-to-peer botnets and detection mechanisms. arXiv preprint arXiv:2207.12937.
- Al-Shareeda, M. A., Saare, M. A., Manickam, S., & Karuppayah, S. (2023). Validation of the toolkit for fake news awareness in social media. Indonesian Journal of Electrical Engineering and Computer Science.
- Abbood, A. A., Al-Shammri, F. K., Alaidany, A. A., Al-Shareeda, M. A., Almaiah, M. A., Shehab, R., Ngadi, M. A. B., & Aljarwan, A. Z. A. (2025). Benchmarking bilinear pair cryptography for resource-constrained platforms using Raspberry Pi. WSEAS Transactions on Information Science and Applications
- Abdullahi, A., Manickam, S., Karuppayah, S., & Al-Shareeda, M. A. (2023). Proposed enhanced link failure rerouting mechanism for software-defined exchange point. Indonesian Journal of Electrical Engineering and Computer Science.
- Fadzil, L. M., Manickam, S., & Al-Shareeda, M. A. (2023). A review of an emerging cyber kill chain threat model. In Proceedings of the Second International Conference on Advanced Computer Applications (ACA) (pp. 157–161).
- Shen, W. Y., Manickam, S., & Al-Shareeda, M. A. (2022). A brief review of advanced monitoring mechanisms in peer-to-peer (P2P) botnets. In 2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM) (pp. 312–317).
- Al-Hiti, A. S., Sahbudin, R. K. Z., Harun, S. W., Obaid, A. N., Hamdi, M. M., & Al-Shareeda, M. A. (2023). Wireless body area networks: Applications and congestion control technologies. In 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (pp. 1–7).
- Alomari, M. Q. M., & Alshowaikh, F. J. A. (2023). The network security (NS) of healthcare and medical facilities: An analytical overview of the emerging cybersecurity threats/risks and countermeasures. International Journal of Advanced Research.
- Al-Shareeda, M. A., Manickam, S., Saare, M. A., Sari, S. A., & Alazzawi, M. A. (2022). Controlling COVID-19 with Internet of Things (IoT) technologies: A review. In 2022 Fifth College of Science International Conference of Recent Trends in Information Technology (CSCTIT) (pp. 6–11).
- Al-Shareeda, M. A., Manickam, S., Saare, M. A., Karuppayah, S., & Alazzawi, M. A. (2022). Detection mechanisms for peer-to-peer botnets: A comparative study. In 2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM) (pp. 267–272).
- Alamri, B., Crowley, K., & Richardson, I. (2022). Cybersecurity risk management framework for blockchain identity management systems in Health IoT. Sensors (Basel, Switzerland), 23.
- Wu, C. C., Ahmad, S. A., Fadzil, L. M., Ishak, M. K., Manickam, S., & Al-Shareeda, M. A. (2023). Proposed smart water management system. In 2023 Second International Conference on Advanced Computer Applications (ACA) (pp. 1–4). IEEE.
- Arfeen Laghari, S., Manickam, S., Al-Ani, A. K. I., Al-Shareeda, M. A., & Karuppayah, S. (2023). ES-SECS/GEM: An efficient security mechanism for SECS/GEM communications. IEEE Access, 11, 31813–31828.
- Almansor, M. J., Din, N. M., Baharuddin, M. Z., Ma, M. D., Alsayednoor, H. M., Al-Shareeda, M. A., & Al-asadi, A. J. (2024). Routing protocols strategies for flying ad-hoc network (FANET): Review, taxonomy, and open research issues. Alexandria Engineering Journal.
- Al-Shareeda, M. A., Anbar, M., Alazzawi, M. A., Manickam, S., & Al-Hiti, A. S. (2020). LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network. IEEE Access, 8, 170507–170518.
- Al-Shareeda, M. A., Alsadhan, A. A., Qasim, H. H., & Manickam, S. (2023). Long range technology for Internet of Things: Review, challenges, and future directions. Bulletin of Electrical Engineering and Informatics.
- Al-Shareeda, M. A., Manickam, S., Arfeen Laghari, S., & Jaisan, A. (2022). Replay-attack detection and prevention mechanism in Industry 4.0 landscape for secure SECS/GEM communications. Sustainability.
- Hamdi, M. M., Audah, L. M., Rashid, S. A., & Shareeda, M. A. (2020). Techniques of early incident detection and traffic monitoring centre in VANETs: A review. Journal of Communications, 15, 896–904.
- Shareeda, M. A., Khalil, A., & Fahs, W. (2019). Realistic heterogeneous genetic-based RSU placement solution for V2I networks. International Arab Journal of Information Technology, 16, 540–547.
- Hamdi, M. M., Mustafa, A. S., Mahd, H. F., Abood, M. S., Kumar, C., & Al-Shareeda, M. A. (2020). Performance analysis of QoS in MANET based on IEEE 802.11b. In 2020 IEEE International Conference for Innovation in Technology (INOCON) (pp. 1–5). IEEE.
- Hou, P. S., Fadzil, L. M., Manickam, S., & Al-Shareeda, M. A. (2023). Vector autorepression model-based forecasting of reference evapotranspiration in Malaysia. Sustainability.
- Zijie, F., Al-Shareeda, M. A., Saare, M. A., Manickam, S., & Karuppayah, S. (2023). Wireless sensor networks in the Internet of Things: Review, techniques, challenges, and future directions. Indonesian Journal of Electrical Engineering and Computer Science.
- Shukla, V., Al-Shareeda, M. A., Dixit, S., & Gupta, S. (2025). A secure audio transmission method. In International Conference on Emerging Trends in Artificial Intelligence, Data Science and Signal Processing (pp. 141–155). Springer.
- Shareeda, M. A. A., & Manickam, S. (2022). Man-in-the-middle attacks in mobile ad hoc networks (MANETs): Analysis and evaluation. Symmetry, 14, 1543.
- Almazroi, A. A. A., Alqarni, M. A., Al-Shareeda, M. A., Alkinani, M. H., Almazroey, A. A., & Gaber, T. (2024). FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network. Internet of Things, 25, 101096.
- Mohammed, B. A., Al-Shareeda, M. A., Al-Mekhlafi, Z. G., Alshudukhi, J. S., & Al-Dhlan, K. A. (2024). HAFC: Handover authentication scheme based on fog computing for 5G-assisted vehicular blockchain networks. IEEE Access, 12, 6251–6261.
- Mohammed, B. A., Al-Shareeda, M. A., Alsadhan, A. A., Al-Mekhlafi, Z. G., Sallam, A. A., Al-Qatab, B. A., Alshammari, M. T., & Alayba, A. M. (2024). Efficient blockchain-based pseudonym authentication scheme supporting revocation for 5G-assisted vehicular fog computing. IEEE Access, 12, 33089–33099.
- Al-Shareeda, M. A., Saare, M. A., & Manickam, S. (2023). The blockchain Internet of Things: Review, opportunities, challenges, and recommendations. Indonesian Journal of Electrical Engineering and Computer Science.
- Al-Mekhlafi, Z. G., Al-Janabi, H. D. K., Al-Shareeda, M. A., Mohammed, B. A., Alshudukhi, J. S., & Al-Dhlan, K. A. (2024). Fog computing and blockchain technology-based certificateless authentication scheme in 5G-assisted vehicular communication. Peer-to-Peer Networking and Applications, 17, 3703–3721.
- Al-Shareeda, M. A., Anbar, M., Hasbullah, I. H., & Manickam, S. (2021). Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sensors Journal, 21, 2422–2433.
- Al-Shareeda, M. A., Anbar, M., Manickam, S., & Yassin, A. A. (2020). VPPCS: VANET-based privacy-preserving communication scheme. IEEE Access, 8, 150914–150928.
- Al-Shareeda, M. A., Anbar, M., Hasbullah, I. H., & Manickam, S. (2020). Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks. IEEE Access, 8, 144957–144968.
- Al-Shareeda, M. A., Anbar, M., Manickam, S., Khalil, A., & Hasbullah, I. H. (2021). Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey. IEEE Access, 9, 121522–121531.
- Al-Shareeda, M. A., Anbar, M., Manickam, S., & Hasbullah, I. H. (2021). Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access, 9, 113226–113238.
- Shareeda, M. A., Anbar, M., Manickam, S., & Hasbullah, I. H. (2020). An efficient identity-based conditional privacy-preserving authentication scheme for secure communication in a vehicular ad hoc network. Symmetry, 12, 1687.
- Shareeda, M. A. A., Manickam, S., Mohammed, B. A., Al-Mekhlafi, Z. G., Qtaish, A., Alzahrani, A. J., Alshammari, G., Sallam, A. A., & Almekhlafi, K. (2022). CM-CPPA: Chaotic map-based conditional privacy-preserving authentication scheme in 5G-enabled vehicular networks. Sensors, 22.
- Mohammed, B. A., Al-Shareeda, M. A., Manickam, S., Al-Mekhlafi, Z. G., Alreshidi, A., Alazmi, M., Alshudukhi, J. S., & Alsaffar, M. S. (2023). FC-PA: Fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks. IEEE Access, 11, 18571–18581.
- Shareeda, M. A. A., Anbar, M., Manickam, S., & Hasbullah, I. H. (2022). A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks. Sensors, 22.
- Al-Mekhlafi, Z. G., Al-Shareeda, M. A., Manickam, S., Mohammed, B. A., Alreshidi, A., Alazmi, M., Alshudukhi, J. S., Alsaffar, M. S., & Alsewari, A. A. (2023). Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks. Electronics.
- Shareeda, M. A. A., Anbar, M., Manickam, S., & Hasbullah, I. H. (2021). SE-CPPA: A secure and efficient conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. Sensors, 21.
- Alazzawi, M. A., Al-behadili, H. A. H., Almalki, M. N. S., Challoob, A. L., & Shareeda, M. A. A. (2020). ID-PPA: Robust identity-based privacy-preserving authentication scheme for a vehicular ad-hoc network. In International Conference on Advances in Cybersecurity. https://api.semanticscholar.org/CorpusID:231929822
- Al-Shareeda, M. A., Anbar, M., Alazzawi, M. A., Manickam, S., & Hasbullah, I. H. (2021). Security schemes based on conditional privacy-preserving vehicular ad hoc networks. Indonesian Journal of Electrical Engineering and Computer Science, 21, 479–488.
- Al-Shareeda, M. A., Anbar, M., Manickam, S., Hasbullah, I. H., & Abdullah, N., Hamdi, M. M. (2020). NE-CPPA: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (VANETs). Applied Mathematics & Information Sciences, 14, 957–966.
- Shareeda, M. A. A., Anbar, M., Manickam, S., Hasbullah, I. H., Khalil, A., Alazzawi, M. A., & Al-Hiti, A. S. (2020). Proposed efficient conditional privacy-preserving authentication scheme for V2V and V2I communications based on elliptic curve cryptography in vehicular ad hoc networks. In International Conference on Advances in Cybersecurity. https://api.semanticscholar.org/CorpusID:231929886
- Almazroi, A. A. A., Alqarni, M. A., Al-Shareeda, M. A., & Manickam, S. (2023). L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system. PLOS ONE, 18.
- Al-Mekhlafi, Z. G., Lashari, S. A., Altmemi, J. M. H., Al-Shareeda, M. A., Mohammed, B. A., Sallam, A. A., Al-Qatab, B. A., Alshammari, M. T., & Alayba, A. M. (2024). Oblivious transfer-based authentication and privacy-preserving protocol for 5G-enabled vehicular fog computing. IEEE Access, 12, 100152–100166.
- Shammri, F. K. A., Al-Shareeda, M. A., Abbood, A. A., Almaiah, M. A., & AlAli, R. M. (2025). Quantum-enhanced AI and machine learning: Transforming predictive analytics. Recent Advances in Electrical & Electronic Engineering.
- Al-Shareeda, M. A., Manickam, S., & Saare, M. A. (2023). DDoS attacks detection using machine learning and deep learning techniques: Analysis and comparison. Bulletin of Electrical Engineering and Informatics.
- Al-Shareeda, M. A., Manickam, S., Saare, M. A., Sari, S. A., & Alazzawi, M. A. (2022). Intelligent pizza vending machine intelligence via cloud and IoT. In 2022 Fifth College of Science International Conference of Recent Trends in Information Technology (CSCTIT), 25–30.
- Al-Shareeda, M. A., Obaid, A. A., & Almajid, A. A. H. (n.d.). The role of artificial intelligence in bodybuilding: A systematic review of applications, challenges, and future prospects.
- Ahmad, W., Almaiah, M. A., Ali, A., & Al-Shareeda, M. A. (2024). Deep learning-based network intrusion detection for unmanned aerial vehicle (UAV). In 2024 7th World Conference on Computing and Communication Technologies (WCCCT) (pp. 31–36). IEEE.
- Al-Mekhlafi, Z. G., Al-Janabi, H. D. K., Khalil, A., Al-Shareeda, M. A., Mohammed, B. A., Alsadhan, A. A., Alayba, A. M., Saleh, A. M. S., Al-Reshidi, H. A., & Almekhlafi, K. (2024). Lattice-based cryptography and fog computing-based efficient anonymous authentication scheme for 5G-assisted vehicular communications. IEEE Access, 12, 71232–71247.
- Abbood, A. A., Al-Shammri, F. K., Alzamili, Z., Al-Shareeda, M. A., Almaiah, M. A., & AlAli, R. M. (2025). Investigating quantum-resilient security mechanisms for flying ad-hoc networks (FANETs). Journal of Robotics and Control (JRC).
- Al-Mekhlafi, Z. G., Al-Shareeda, M. A., Manickam, S., Mohammed, B. A., & Qtaish, A. (2023). Lattice-based lightweight quantum-resistant scheme in 5G-enabled vehicular networks. Mathematics.