1. Introduction
An Intelligent Transportation System (ITS) provides passengers with a secure, comfortable, intelligent travel experience. The process involves establishing a connection between drivers’ smartphones, roadside infrastructure, and automobiles to offer a safe and convenient service for users [
1]. Vehicles communicate and exchange information with each other from vehicles and tool booths. Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) technologies use the edge infrastructure. V2V communication will exchange information about one vehicle with another, like position, speed, location, etc. [
2]. V2I communication enables the transmission of information from a roadside unit to complement V2V communication. V2V and V2I technologies will use dedicated short-range communication to exchange information. Vehicles-to-everything (V2X) technologies are widely used for communication processes such as traffic jams, routing, and accidents [
3]. A Transmit Management System (TMS) provides approximate information about the position of the vehicles around the traveller, and it leads to verification of the security of the person. A TMS gives efficient and reliable services to travellers [
4]. An Incident Management System is used to identify incidents or accidents that occurred on a person’s travelling route. With this traveller’s aid, it also avoids traffic jams and takes other convenient routes to reach the destination. An emergency management system helps to determine risk and how to avoid risk. This system mostly indicates natural disasters in route [
5]. An efficient and secure system was designed for vehicular networks based on the Software-Defined Networking (SDN) paradigm. The proposed architecture ensured improved performance and security for vehicular communication systems, highlighting the role of SDN in providing adaptable, centralized control over dynamic vehicular environments [
6]. A review on security, privacy, and decentralized trust management was conducted in vehicular ad hoc networks (VANETs). The challenges of ensuring secure communication and managing privacy were discussed while maintaining trustworthiness in decentralized vehicular networks [
7]. A blockchain-based system was proposed to preserve privacy and enable efficient data sharing within intelligent transportation systems [
8]. Another blockchain-based solution was investigated for security, privacy, and trust management in vehicular networks. It also examined the potential of blockchain to address security concerns in VANETs, offering decentralized mechanisms to protect users and ensure the reliability of communication [
9]. Trust management on the Internet of Vehicles (IoV), encompassing the importance of trust systems in ensuring secure communication and decision-making in vehicular networks, was examined in [
10], which identified the key challenges and solutions for building robust trust management frameworks within IoV ecosystems.
The appeal of Intelligent Transportation Systems lies primarily in the advanced services they offer, such as real-time traffic management, improved safety, and efficiency. However, addressing privacy concerns is crucial to ensuring user trust and widespread adoption. Nowadays, both the public and private sectors are providing privacy policies, and this is the main reason for the success of ITSs [
11]. The data collected from the users is stored in a database. Differential privacy is applied to protect the floating car data stored and processed in traffic data centres. The main goal is to safeguard traveller data by minimizing the storage of sensitive information wherever feasible and implementing robust security mechanisms to protect necessary data within the database. The approach balances privacy concerns with retaining data essential for ITS functionality and optimization [
12]. It focuses on protecting floating car data stored and processed in the central traffic data centre. It helps to identify the traffic conditions and to detect the speed of the vehicles around the travelling road. A laplace mechanism is used to achieve differential privacy [
13]. The emergent intelligence (EI) technique is used to analyse, collect, and share information during the privacy process of ITSs [
14]. EI is adaptive to complicated and dynamic systems to provide the behaviours for transportation during travelling. Local Differential Privacy (LDP) is another vision of differential privacy that protects travellers’ data from unauthorized parties. It helps users not give unauthorized persons personal information at an appropriate time [
15]. There are new difficulties in traffic management, data privacy, and making decisions in real-time brought forth by the advent of autonomous vehicles (AVs), which are fast-changing ITSs.
This study provides a FLPTM system, a framework for optimizing service access and data privacy for AVs, to solve these problems. The FLPTM system uses a Contained Privacy-Preserving Scheme to prevent users’ personal information from being shared and let vehicle train their models on decentralized data. Integral to this architecture is vehicles-to-everything (V2X) communication, which allows for smooth data flow across infrastructure (V2I), pedestrians (V2P), networks (V2N), and vehicles (V2V). C-V2X and the soon-to-be-released 5G-enabled communication systems are examples of modern vehicle-to-element (V2X) technologies beyond Dedicated Short-Range Communication (DSRC). Recent developments have made it easier for AVs to access high-bandwidth data streams in real-time, which is essential for using an FLPTM system in different types of traffic. These communication technologies allow FLPTM to provide strong, scalable traffic management solutions and protect user privacy.
The two most important goals of an FLPTM system’s localized computation are protecting user privacy and enhancing the estimated accuracy of traffic while guaranteeing efficient and secure communication. Improved accuracy and contextual awareness in traffic forecasts are achieved by letting cars train local models with their data. This allows the system to capture region-specific circumstances and patterns. Simultaneously, unnecessary sharing of user data can be protected with centralized servers due to localized processing, which keeps raw data private. This study will ensure that the updated description clarifies its main goal and elaborates on how FLPTM achieves its dual objective of privacy and accuracy. The main contributions of this study are as follows:
Predictive modelling for AVs using the FLPTM-CPPS system is applied in this paper, which enables traffic models to be trained locally without centralizing data, thus improving the accuracy of traffic predictions.
FL enables traffic models to be trained locally without sharing raw data and maintains secure communication within the network to ensure data privacy across vehicles and infrastructure.
A state learning classifier is designed to control service access allocation and user permission revocation by defining different vehicle states and traffic flow states, adapting to real-time conditions to support congestion reduction.
Vehicle requirements and service access failures optimize communication rates, which are assessed using federated aggregation methods, and efficient predictive management is achieved without compromising data security.
The efficiency of the proposed approach is evaluated through metrics like access time, adversary impact, response time, and service durability across traffic density and network load conditions.
The CPPS framework focuses on privacy attainment by preventing data leakage via local processing and guaranteeing the secure enforcement of access permissions. Security reinforcement is realized by defending against specific attacks, handling adversarial effects, and maintaining secure state transitions.
Privacy Concerns:
The manuscript focuses on privacy through a Contained Privacy-Preserving Scheme. The main points of this scheme are as follows:
Local Data Processing: Federated Learning ensures raw data are contained in local devices (vehicles) and not shared with the central servers.
Privacy Mechanisms: this refers to differential privacy techniques and the privacy-preserving state coalition models that protect user data from unauthorized access.
State transitions and partial validation ensure privacy against the view of communication failure or adversarial influences.
Security Issues:
The manuscript also contains a few mechanisms for securing data and communication:
Man-in-the-Middle Protection: the CPPS framework uses authentication protocols, bilinear mapping, and key-based mechanisms to attenuate adversarial threats.
Access Permission: vehicles must be authenticated and authorized to access communication; this will ensure that access is secured.
State Modelling for Security: classifier-based state modelling handles potential adversarial effects and enforces security in network interactions.
The rest of the paper is followed by
Section 2, describing a recent literature review of the proposed topic.
Section 3 details the explanation of the proposed methodology.
Section 4 gives the results and discussion. Finally,
Section 5 gives the conclusion.
3. The Proposed Methodology
The proposed scheme aims to maximize the vehicle’s service endurance by reducing the adversary’s impact on the mobile environment. The adversary considered in this scheme is the man-in-the-middle that interrupts the services between vehicles and service providers. In the service allocation process, the vehicle’s state is retained if the allocated service sustains regardless of the adversary density. The proposed scheme’s functions are illustrated in
Figure 1 for ease of understanding.
The vehicles are interconnected through access points and other infrastructure units. Therefore, V2V and V2X communications are familiar with the proposed scenario. A federated state learning classifier analyses the traffic demand patterns, classifying the vehicles based on their security parameters. The functions are classified as state modelling and service processes. Beyond state modelling, service procedures facilitate a wide range of operational and communication activities within the ITS, making them indispensable. Service processes oversee the system’s many components, including infrastructure, cars, traffic management systems, data interchange, coordination, decision-making, and state modelling. They ensure everything is in sync and communicating well, allowing route optimization, real-time updates, and dynamic traffic management. In addition to assuring data privacy and security during transmission, resolving exceptions and keeping the system reliable are also responsibilities of service processes. Service processes improve the system’s responsiveness, scalability, and overall performance by providing these functions, which allow it to respond to changing user demands and traffic circumstances. In the state modelling, access permission and authentication are administered. By initiating a service request from the AVs, a vehicle verifies its access permissions before beginning the communication, thereby going through an authentication process whenever it asks for service. After the vehicle has been verified, it is permitted to join the network for efficient traffic control. The optimized and accurate traffic management service response prediction yields the system’s real-time responses to traffic flow and communication; these changes improve network security and efficiency. The classifier learning process defines the states and functions. On the contrary, requests and responses are performed in the other process. Vehicles and infrastructure (as shown by symbols like automobiles, buses, and traffic lights) initially gather data from road infrastructure and traffic signals. Next, the data are processed locally, and only model updates are sent to the central Federated Learning (FL) server for aggregation. This design and training process represents a decentralized machine-learning model for traffic management.
In this model, each infrastructure node and vehicle participate in the training process without sharing raw data. A global model is created by combining the local models from all dispersed nodes (infrastructure and vehicles) at the central model aggregation server. After combining the models, the system is signalled to evaluate the traffic demand pattern in light of the present traffic conditions by initiating a service request. The federated state learning classifier is used to assess and classify the traffic demand pattern to make the best decisions possible about traffic management. After traffic demand classification, the system uses authentication to guarantee that AVs have secure access to traffic management services. After authentication is successful, access authorization is given, enabling the autonomous vehicles to obtain optimum replies for traffic management. These responses serve as the final outputs, guaranteeing that autonomous vehicles can navigate traffic efficiently.
The proposed framework starts by initializing a list of vehicles, infrastructure, and service request states, followed by the training of local models on vehicle data
and infrastructure data
. The parameters
and
denote the availability of the infrastructure and services, each ranging from 0 to 1. Values closer to 0 are less available, and closer to 1 are more available. This continuous scale models partial availability, capturing scenarios like degraded performance or intermittent connectivity, which cannot be represented by binary states (e.g., true/false). These local models are then sent to the system for aggregation into a global model, which is distributed back to all autonomous vehicles (AVs). The system decides on the service type based on conditions such as high-security requirements (when both
and
are 1) high traffic demand or regular service needs. Each vehicle’s service access is updated accordingly. Privacy is key, and service access is revoked if a vehicle no longer meets the required privacy standards. The system predicts traffic parameters and conditions (T) and evaluates performance using metrics related to service effectiveness.
denotes the time delay between a vehicle requesting a service and the time its response is received. This value is essential for assessing the system’s communication efficiency. The implemented FLPTM system for ITSs is an Algorithm that outlines the main components, including input, output, and the decision-making process regarding service access based on vehicle states and adversary impacts. The function takes a list of vehicle requests, infrastructure, and service provider availability and outputs a list of service grant statuses for each request. The function iterates through each vehicle request and checks the availability of resources and service providers to determine whether to grant, deny, or put the request in a pending state. The Algorithm 1 provides a simplified view of the decision-making process in the proposed system as:
Algorithm 1: Proposed FLPTM system for ITSs. |
INPUT: vehicle data OUTPUT: service response Initialize list of for each vehicle, do train a local model using s data send a local model update while the system is running, do local models = gather all local model updates aggregate (local models) send an updated global model to all AVs if and then service = high_security else if traffic demand is high, then service=traffic optimization else service = regular service update service access for with for each vehicle, do if the vehicle state no longer meets privacy, then revoke service access for vehicle else Predict and end for evaluate performance evaluation using metrcis |
3.1. Adversary Impact Representation
The man-in-the-middle adversary model is considered in the function validation.
Figure 2 illustrates a schematic representation of the same. A man-in-the-middle intruder causes response, communication, connectivity, and access failures. The impact of a man-in-the-middle attack, including response delays, communication disruptions, connectivity issues, and access failures, depends on the adversary’s position within the network and the density of adversarial nodes in the ITS scenario. The proposed scheme must confront the abovementioned issues without degrading the communication performance.
First, the permission grant and service access are defined for a vehicle using Equations (1a) and (1c), respectively:
such that
and
In Equation (1a), the variables and represent vehicles, requests, and time. For a response
, the available service providers
respond if the infrastructure and
are available. The term
says that the request
is relevant to, or belongs to, some time interval
The statement establishes a temporal relationship that the request
is valid or relevant during the time
represents the probability that a service request is valid or relevant at a predetermined time interval
. Similarly,
is the probability that a valid service request will occur in the infinitesimal time interval
in consideration of system constraints like infrastructural and service availability. In the Equation (1b), if the summation uses
as the index, but if the element
does not depend on
then is a constant concerning
. In that case, the summation multiplies the constant
by the number of terms in the summation, i.e.,
.
In Equation (1c), is the instantaneous probability density of granting access, where
is a probability density function describing instantaneous system conditions, for example, resource availability or security check over an infinitesimally small interval in time
. Here, G now represents an accumulated probability of granting access and
becomes the accumulated probability given for more general system behaviour, accounting for a time-averaged fashion or threshold satisfaction, again scaled by
The availability of infrastructure and service providers is defined as
and
. The grant process is defined as
and the permission
concerning
and failure probability
is formulated in any instance and is retained at a high level. The failure probability (τ) is deduced from the cumulative time delays. It expresses the probability that a service request will not be executed within the acceptable temporal thresholds, thus expressing the system degradation. This increases the service’s endurance by reducing errors. The permission grants for
and
are independently considered for defining a state. First, the state is defined as
and
, the
and hence
. The proposed scheme defines three states: grant, deny, and pending. The grant state ensures service distribution to the
enduring its span while preserving its privacy through FL mechanisms. The denied state halts the service distribution due to privacy violations and adversary impact. Contrarily, the pending state defines the actual vehicle’s involvement in service sharing. This means it possesses the states of either grant or deny. If a grant occurs, it augments the service endurance; a denial increases service failures. Initially, the service level for a vehicle is defined as in Equation (2).
In Equation (2), τ (failure probability) is computed as where denotes the timestamp when a service request is made, and ∆R represents the timestamp when the response is delivered. This metric is crucial in determining the traffic management system’s responsiveness and identifying service provision bottlenecks. The service level defines the flexibility provided to vehicle throughout to such that G = 0, then and the service failure is accounted for. The decision as to whether the system is within acceptable performance limits is determined by the comparison between and , where is the fraction of system resources available to serve requests. If , it would imply the time delay is greater than the capacity of the system to handle requests; therefore, due to this fact, system performance is degraded or results in service failure. Insights like this are instrumental in pre-emptive traffic management for autonomous vehicle reliability.
3.2. Privacy Preserving State Coalition Model
A state coalition paradigm is provided for FL environments where grant
, deny
, pending
service states are securely represented. Each transaction between states is verified using FL updates, guaranteeing that transitions retain data privacy and secure accessibility across distant entities. Based on
, the service grant state of a
is defined as
where the grant, deny, and pending are represented. A common coalition between the states is represented in
Figure 3.
In the state coalition, granting to deny and vice versa rely on
alone. Whereas
and
transactions are decided based on
and
. Therefore, the occurrence due to vehicle movement and handoffs in different
instances requires the above intermediate transactions. The transaction between
and
, and
and
are defined using Equation (3)
In Equation (3), the variables
denote the transaction for the appropriate states. This is connected with
when the service is sustained; hence, the access and connected failures are reduced. The state models for transactions are used to provide different authentication formats. It depends on the state and action as defined in
or
. Contrarily, if
, then the
is high, reducing
; the alternate case is the privacy-preserving. If a transaction
is observed, then partial transaction authentication is required. Contrarily, if
is observed, then a complete authentication sequence including
and
is required. The first preserves the
, disconnecting
induced failures, whereas the later part requires
and
authentication, preserving service endurance. The authentication for
is discussed as follows. In this process, a conventional bilinear mapping-key-based authentication is used. For a service grant process where
, the bilinear pairing between
and
is defined as
. The bilinear pairing formulation is relevant to the vehicle and service provider, as it ensures their identities and the associated privacy primitives are securely linked and protected within the service grant process. Here the
and
refer to the vehicle’s and service providers’ primitives for privacy. The primitives include a non-replicated key
, a random generator
, and
. Therefore the
and
are defined as in Equations (4a) and (4b), respectively,
,
The “provided” condition given in Equation (4c) is the congruency in verifying the privacy between and , and . If the congruency is retained, then the state is retained as false is observed.
3.3. Integrated FL into the Authentication Process
The congruence-based privacy preserving between
, I, and
is presented in
Figure 4. This illustration is observed before a privacy breach/communication failure occurs.
The above Figure presents the validation between different transaction states wherein
or
is considered. There are two possibilities for providing authentication and privacy preservation:
(i.e.,)
is alone true and
to
is experienced. In the first case, complete privacy will be retained for the
and services. As discussed earlier, the v′s privacy and authentication are expected alone in the second transaction. Therefore, by pursuing Equations (4a) and (4b), the primitives are exploited to maximize the communication rate. In Lakes privacy experiences, the primitives (of V) are revoked, suspending it from the
connection. Thus, the changes are reverted using the states, and in a reconnection, the
or
is considered. Therefore, the first authentication covering
and
is given by Equations (5a)–(5d).
In Equation (6), the modifications are pursued between
and hence, privacy is retained for
. This ensures intruders have less access to the services at a high communication rate. Therefore, the privacy between
and
is high, and the service access is restored. Contrarily, state transaction is retained in
such that
is used for verifying
. In the other authentication, partial privacy is ensured, wherein
is induced. The process illustrated in
Figure 4, i.e.,
, represents the failure in
; therefore, an adversary impact is experienced. Therefore, the partial privacy requirements are retained based on the previous state. If the previous state is
, then new validation and authentication are initiated. If the previous state is
, then the state of the vehicle is either grant
or deny
. Therefore, partial privacy (for
alone) is retained. In this scenario, the privacy is preserved based on
and from this, if the
requires authentication, it performs
and
exchange. This is induced in
authentication, concealing the communication. This partial privacy is ensured in
and
transactions. The process is defined using Equations (6a)–(6c) for both transactions.
Validate
The above validation given in Equation (6d) ensures the
or
, whereas
or
need not be verified. This reduces the communication cost provided for V2V and V2I information exchange. The above is valid until
or
is not achieved in any
. Hence, the communication rate is expected to be high in the abovementioned case. The contrary part requires a proper classification of a revoked/persisting
in the communication scenario. Here, a V’s revocation does not require the above authentication, reducing the communication cost. It depends on
to
transactions to provide a denial of service access. First, the
is verified and proceeded by
requirement, and hence revocation with the last known
is achieved. The process verifies the current and previous state is expected to be in
for new communication. The transaction under different
or
and
or
is defined as in Equation (7).
The chance that leads to modification in different is evaluated using Equations (3) and (7). In Equation (7), is not accounted for as the service level is unknown (unavailable) in state.
3.4. Different State Transactions
The process for different state transactions based on
-to-
communication is illustrated in
Figure 5.
As in the above illustration,
to
is verified through a new
, and the previous state demand and response are required here. The state change is observed for any
with precise
for
. Therefore, the
is retained within
transaction. Therefore, a vehicle revocation case is not required. Contrarily, the discrepancy due to
and
by equating Equations (3) and (7) induces a revocation. Therefore,
In the above Equations (8a) and (8b), two different constraints are balanced and . If both constraints are satisfied, the same state is retained; otherwise, a transaction is required. This transaction ensures the revocation is the same across different intervals. Therefore, whereas to has to be verified in different . Thus, the is suspended from the communication due to adversary impact. If the adversary impact is overcome, the validation pursues a partial validation, preventing the impact over . Therefore, the revocation denies access for multiple and persists to be the same, preventing different verification and privacy patterns. The FLPTM system handles state transitions with high sensitivity to the current network state, such that when an adversarial impact is lessened, partial V revalidation is performed for secure communication.
3.5. User Revocation
The proposed FLPTM framework includes mechanisms for the user revocation process to distinguish a change in service access and vehicle state transactions. In the revocation process, the constraints in Equations (8a) and (8b) are validated, whereas Equation (1) with or is modified. Hence, in this case, the change is performed with an augmentation in multiple . These mechanisms identify, isolate, and revoke access for compromised entities, helping to maintain security and continuity without centralized intervention.
However, this occurs in different and therefore, adversary impact is reduced. The state is retained in the previous transaction, preventing privacy leakage. For a new vehicle request, the permission is denied at the same interval, and a persisting vehicle’s permissions/access from the current t are revoked. The revoked process is defined by Equations (9a)–(9c).
The grant is defined in the above Equation for
requests, and if a
retains its state in
, then
, and hence
. This means the
is revoked from
and
, deviating service access. On the other hand, revoked users are analysed for their liability, and hence the authentication follows
. The parameter
represents the predicted and calculated state of the vehicle, which is related to privacy conditions in access control. If a
meets the required conditions (based on privacy, traffic, and security factors), it is granted service access and
. The AV’s state transition is influenced by the predicted service allocation, the vehicle’s traffic behaviour, and the communication rate. In Equation (4), the partial authentication is induced to preserve a
privacy regardless of
or
. Pursued by this, the revoked user is allocated a service until the condition (transaction) in Equation (8) is achieved. This defines a new
for the user/vehicles in the communicating scenario. In
Table 1, the G for different “t” is presented.
The
observed at an average for different “t” is presented in
Table 1. This is based on
observed in the different states available. The service endurance is maximized if
is high, provided
and the constraint in Equation (8) is satisfied. Contrarily, the
requires
and
for providing flawless dissemination. The above factors reduce the adversary impacts, containing multiple non-feasible factors in “t”.
Table 2 presents the service endurance and communication cost for different vehicle densities.
An analysis of service failure, communication cost, and service endurance is presented in
Table 2. The endurance is retained based on the G factor defined in two equations. The communication cost increases if
is high; hence, the service failure rate is lower. These two factors under
and
maximizes service endurance without increasing the communication cost.
Figure 6 presents the service endurance and access failure percentage analysis with different vehicle densities. The probability refers to the probability of a successful service request given certain conditions of vehicle density.
In scenarios where the probability of a successful service request equals 1, failures in access should theoretically not exist. However, observed failures in access can still be attributed to transient network conditions that might cause delays in authentication or temporary unavailability of infrastructure. These are independent factors from the intrinsic success probability of the service request itself. The service endurance analysed using the FLPTM system represents how long the vehicle continues to have access to the service before conditions change. The access failure could occur when the system denies service to a vehicle due to high traffic demand and privacy concerns. The probability considered is
wherein the individual ratios may vary. As the endurance increases, access failure decreases confined to the
. In the maximizing probability, the
determines the available “t”, so a process is defaced. Therefore, the lower the vehicle density, the higher the endurance and the less the failure. The independent and joint state definitions and
determinations reduce the failure in resource access. The proposed scheme balances
for different privacy constraints that maximize performance.
Figure 7 presents the revoked V, access, and response time for different transactions and vehicles.
In
Figure 7, the
revoked and the time for different transactions are analysed. The
revoked are analysed under
and
transactions. In
the revocation is high as
is achieved first; hence, the vehicle is not included in the communication. Contrarily,
reduces the revocation as both
vehicles and new ones are augmented for communication. This requires different access and response times, controlling privacy, and
. The changes are predominant in providing access to the
, and
is retained. Therefore, the access is mapped to the
based on their incoming time and the response. In different
, access, and response are provided at precise intervals.
4. Results and Discussion
4.1. Data and Comparative Study
This section analyses the proposed scheme’s performance using comparative analysis. The experiment is modelled using vehicular SIM, considering 130 vehicles distributed on a highway with three intersections. A vehicle is allocated a maximum of nine instances for service-sharing augmentation. Three vehicle states and 50 transactions are considered to identify the performance of access time, adversary impact, response time, service endurance, and communication cost. The methods OFAS [
17], BPNN [
21], and FL–BT [
23] are accounted for in the comparative analysis with the proposed FLPTM system for ITSs.
4.2. Access Time
Figure 8 presents the comparative analysis for access time for different vehicle densities and
. The FLPTM framework emphasizes decentralized processing, allowing vehicles to handle requests locally without relying on a central server. Integrating vehicle requests based on transactions aligns with the FLPTM system’s research goal to enable vehicles to operate autonomously.
The access time is comparatively less for different and by maximizing the request process rate. In the proposed scheme, the are integrated based on transactions defined by and . The pending state provides additional delay for the in different . First, if tends to , then is acquired, and hence, access time is less. Contrarily, if is observed, the partial privacy-preserving feature is instigated to maximize access. The is retained for the previous case, whereas the is defined from for the second case. In , assessment based on balancing as in Equations (9) and (8), the or is first attained. If is achieved, then tends to ; hence, the revocation is denied. Therefore, access to service is provided instantaneously without reducing . In addition, the state learning-based allocations reduce the adversary impact and frequent disconnections. This turns out in and independently. Therefore, the v′s requests are momentarily analyzed without additional communication costs. The split in and as in Equation (8), defines the access level without intersection. Hence, incorporating the above features, the proposed scheme reduces access time.
4.3. Adversary Impact
The proposed scheme achieves less adversary impact compared to the other methods. An illustration of the same is presented in
Figure 9 for different
and
. The considered impact of the man-in-the-middle adversary is combated using transactions and state modelling. First, the
for a
is designated as 1, such that
is satisfied.
Two cases of adversaries are considered, i.e., the adversary’s location is to be considered. In and , the states are retained, and new identity-based privacy features are retained. Therefore, regardless of the adversary’s density and location, the transaction defines its impact. For defined in multiple instances of and , is verified. Based on this condition, validation ensures secure communication between the . Therefore, a “t” that breaks the closure reduces the adversary’s impact. In this context, the is suspended from and hence . This means the least possible chance of privacy being lost is ensured. Further privacy post-transaction verification maximizes high security, reducing the adversary impact.
4.4. Response Time
FL’s resilience is achieved through a decentralized approach in which each AV performs local assessments
that provide secure features
in
for preserving “t”. FL allows AVs to train on their data without sharing raw data, allowing them to preserve local models. This improves privacy and reduces the computed overhead. Using FL, the proposed approach ensures that vehicles and the central server
establish separate, secure communication channels, allowing ongoing network communication sessions. The proposed scheme achieves less response time than the other methods (
Figure 10). The access is concurrent and swift for different
under contained privacy. In the permission delegation,
and
constraints are satisfied for maximizing
. However, if an adversary impact is observed, the transaction determines the V state. Here,
is the reward factor that maximizes the communication rate without compromising time. The independent/joint authentication for V and session “t” is administered in the privacy retaining case. Therefore,
and, hence, service response is high. For the
in “t”, the
is congruent at some far “t”; therefore, response time is less. In cases where
fails to be met, the applied local privacy protocols prevent the next upcoming session breakdowns and mitigate the risk of adversarial interference, ensuring continuity during FL sessions. On the other hand, an independent privacy-retaining vehicle does not need to ensure false communication. This is confirmed based on
and the final validation is performed based on
. It provides durable communication security, preventing communication
. Therefore, the passive communication support and interruption in V2V or V2X is less in the proposed scheme, requiring less response time.
4.5. Service Endurance
FL enables local privacy assessments, improving the ratio
to prevent communication overheads. Each
local updates are only transmitted when significant model improvements are detected;
guarantees an optimal use of communication channels. Additionally,
enables reliable communications when
, meaning only minimal control data are required between
s and the central node
. Then, state identification through local training allows Vs to monitor their communication needs autonomously, reducing the frequency of global model updates. For instance, Equation (7) highlights the balancing mechanism used to maintain performance while optimizing
constraints can be validated across AVs and prevent adversarial effects. The proposed scheme retains the communication session without additional computation/overhead. This is achieved by providing independent authentication and privacy stings between
and
. First,
based assessments provide
features in
for security, the “t”. Pursued by this process,
in
retains the session endurance until
is received. Therefore, there is a change in the different verification phases for (t) and G−G, as in Equation (5). The validation is performed for
in
and
in
for
such that
or
is identified. If this is identified, a new
will be allocated for ∆R, and the service will be retained. Contrarily, if
is not achievable, then the privacy of
is retained, preventing further
failures. Thus the
or
is decided to communicate “t” further. This improves the session’s endurance, reducing the adversary’s impact. Similarly, the state analysis in Equation (8) determines the requirement or end of a “t”. The transaction requiring
is disconnected from the session, so the communicating “t” is retained. This prevents false transmissions and pauses “t”, maximizing the endurance. A comparative analysis for service endurance is presented in
Figure 11.
4.6. Communication Cost
Including adversaries in a “t” requires altering the session and a new
for communication. This requirement is reduced in the proposed scheme by performing two different assessments. First, the validation is preceded based on privacy maximizing
. The
is defined as high for service access, so the dissemination is masked above the required
. This is verified until
is satisfied. Contrarily
ensures a reliable communication with
. Therefore, an additional requirement for the “t” is not mandatory, pursuing the
. This ensures no additional control data between
and
. The second validation is the state identification defined through Equation (7). The
maximization is required for
or
without increasing the adversary impact. In Equation (8), transaction validation is performed to balance multiple ∆R constraints and reduce the false rate. The
is revoked from the communication provided
and
in the
condition. This requires some communication message to be shared between the
or
to establish communication. In the overall process, the revocation confines additional control messages, reducing communication costs (refer to
Figure 12).
The summary of these comparative findings for the FLPTM system has proven it to be the most effective approach in decreasing access time, lowering adversary impact, enhancing response time, boosting service durability, and cutting communication costs. It continuously beats all other methods across all parameters. Based on these findings, the FLPTM system is the go-to protocol for real-time traffic management and communication since it is the most efficient and secure alternative for smart transportation systems.
Table 3 presents the comparative analysis results based on the above discussion.
The parameter is used in two different contexts: First, as a temporal measure, it indicates the elapsed time while the system is operating or the data are under analysis. The second use of is an iteration index showing the number of training or computational cycles carried out in the federated learning process. In such cases, the exact meaning of will be specified in the context. For example, represents time in seconds for the performance analysis metrics but not the number of iterations during the federated aggregation steps.