Abstract
The blistering appearance of autonomous vehicle networks (AVNs) represents extreme cybersecurity dangers, particularly with the forthcoming danger of quantum computing, which is capable of overcoming traditional defenses on the basis of cryptography. This paper offers a new architecture that integrates quantum-resistant blockchain technology and deep learning to offer excellent cybersecurity in intelligent transportation systems (ITS). Three contributions are proposed: (1) a postquantum safe communication scheme, which will secure vehicle-to-anything (V2X) communications; (2) a decentralized blockchain-based data-sharing system, which will be utilized to ensure the integrity, privacy, and integrity of vehicular data; and (3) the application of a deep learning model as an anomaly detector and real-time threat mitigation to vehicle-to-anything (V2X) communications. The experimental tests demonstrate that the deep learning architectures for detecting cyber threats are 95.2% accurate, 94.1% precise, and 93.5% recall, with blockchain data integrity of 99.9% throughput of 150 transactions per second and a block validation time of 1.5 s. In context, the framework will help improve ITSs by offering safer roads, efficient communication infrastructure, and efficient data exchange, which will establish the road to successful and safe application of autonomous transportation systems in the real world.
Similar content being viewed by others
Introduction
The introduction of intelligent transportation systems (ITSs) has revolutionized the life of the modern world by making traffic more efficient, reducing the number of accidents, and, last but not least, providing autonomous vehicles with the ability to communicate with other cars with ease. The autonomous vehicle networks (AVNs) at the heart of the ITS rely on vehicle-to-everything (V2X) communication, which includes vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to-cloud (V2C) communication to ensure the safety of autonomous vehicles and organize their activities. However, the enhanced network integration of AVNs has presented more complex cybersecurity risks. According to the U.S. National Highway Traffic Safety Administration (NHTSA, 2023), over 50 safety incidents associated with cybersecurity issues in connected cars have been reported in the past five years. Similarly, the European Union Agency on Cybersecurity (ENISA, 2022) documented an increase in cyberattacks on ITS infrastructures of 30% annually. Gartner (2023) also believes that nearly one-fourth of cyberattacks against critical infrastructure will be related to mobility systems in the future, which will likely be linked to connected systems and accordingly invoke the necessity of taking the initiative to protect the system. The threat environment has also increased with the emergence of quantum computing. Classic cryptography systems such as RSA and ECC, which were previously considered to be secure, have become vulnerable to quantum algorithms such as the Shor and Grover algorithms, which can be broken within polytimes. This is one of the basic threats to the confidentiality, authenticity, and integrity of V2X communications. Moreover, existing security solutions, such as intrusion detection systems and standard blockchain solutions, are scaled and have latency and quantum-capability adversary-resistance constraints. This susceptibility makes it clear how important the immediate need to introduce a set of quantum-resistant and real-time threat detection measures is. While prior studies, such as those by Su et al. (2024)1 on hybrid blockchain for VANET privacy and Liu et al. (2020)2 on deep learning for image recognition in autonomous driving, have addressed isolated aspects of blockchain or deep learning in vehicular security, they often overlook quantum threats or fail to integrate real-time anomaly detection with decentralized data integrity. In contrast, our work bridges this gap by proposing a holistic framework that combines postquantum lattice-based cryptography, the zk-SNARK-enhanced blockchain for scalable privacy, and adversarial-trained deep learning models (CNN-RNN hybrids) for proactive threat mitigation, achieving superior performance metrics (e.g., 95.2% detection accuracy and 99.9% data integrity) not demonstrated in the literature.
The originality of the current work is that it offers a comprehensive approach to cybersecurity:
-
A postquantum encrypted protocol is proposed for AVNs so that they are future proofs against quantum-enabled cyberattacks.
-
Architects a decentralized blockchain framework of secure, tamper-free and privacy-protected V2X data exchange.
-
Deep learning anomaly detectors and real-time threat mitigation systems with large vehicular data streams are combined.
-
Implementation of a hybrid architecture to balance multilayered threats in terms of scalability, efficiency and resilience.
Unlike Delgado et al.3 and Rayudu et al.4, who focus on deep learning for noncybersecurity applications such as motion estimation or weather prediction, or Masurkar et al.5 on decentralized AI without quantum resistance, our integration ensures resilience against both classical and quantum adversaries while maintaining real-time efficiency in ITS environments.
Literature review
Summarizing existing cybersecurity in ITSs
Vehicle-to-everything (V2X) interactions are secured by traditional mechanisms that include encryption algorithms that are symmetric, asymmetric, or hybrid and digital signatures and a public key infrastructure (PKI)6. The intrusion detection systems (IDSs) and firewalls serve as complementary defenses because they monitor unauthorized access and overt activity. Nevertheless, owing to the growing complexity and network connectivity of autonomous vehicle networks (AVNs), vulnerability to more advanced threat attacks, such as adversarial machine learning attacks, spoofing, ransomware, and cyber-physical coordinated attacks, has been introduced. According to recent activity, the industry has reported that cyberattacks on connected vehicles are increasing, with ENISA (2022) recording 30% annual growth in incident occurrences targeting ITSs, and as such, good cybersecurity measures are needed to mitigate threats and security breaches. A Constraint of Classical Cryptographic Algorithms in the Quantum Age.
Although classical cryptographic algorithms have in the past proven secure against classical attacks, the threat of quantum computing poses an extreme challenge7,8. Quantum algorithms such as the Shor algorithm and Grover algorithm can potentially factor the numbers much faster than a classical computer could use integer factorization and discrete logarithm problems and easily break the commonly used RSA and ECC encryption schemes in polynomial time, and quantum computers of a massively higher scale may be able to perform similarly with much more significantly advanced capabilities9,10. This makes ensuring the confidentiality, authenticity, and integrity of V2X communications via conventional methods of encryption ineffective. Therefore, quantum-resistant cryptography protocols need to be formulated and implemented for future-proof AVNs against all-time cyberattacks [ENISA, 2023; NHTSA, 2023]11.
Novel contribution
Although blockchain and deep learning have demonstrated potential individually in the securing of vehicular networks, their individual application has many gaps. Classical blockchain models have scalability problems, latency problems and quantum vulnerability problems, whereas deep learning models have adversarial attack problems, privacy problems, and computational overhead problems. To the best of our knowledge, no previous research has been able to integrate quantum-resistant blockchain schemes and adaptive deep learning in a single architecture with ITS cybersecurity. The originality of the given work is expressed through four major aspects:
Quantum-resistant Blockchain- The proposed system incorporates lattice-based cryptography and uses SHA-3 hashing in place of the classical blockchain to ensure that vehicular data are not subjected to quantum-vulnerable attacks to ensure that data integrity and privacy are maintained over an extended time. This differs from Ansari et al.12 and Chaudhari et al.13, who applied blockchain for privacy in healthcare without quantum-resistant elements or ITS-specific scalability optimizations14.
AI-Informed threat detection- Deep learning models (CNNs and RNNs) analyse real-time streams of vehicular data to identify anomalies in such a way that preemptive detection is possible for cyberattacks that cannot be mitigated through the application of simple cryptographic controls. In contrast to Wu et al.15 and Gaifulina et al.9, who use deep learning for multimodal fusion or IoT anomaly detection without blockchain integration, our models incorporate adversarial training for enhanced resilience in dynamic AVN scenarios16.
Hybrid and scalable architecture- This innovative combination of the decentralized reliance model of blockchain with the predictive intelligence of deep learning produces multilayered security to withstand quantum assault, adversarial AI, and system breaches and is both scalable and feasible for real ITS applications. This holistic approach surpasses those of Kusi et al. (2020)17 and Yadav et al. (2022)7, which emphasize decentralized ML training or disease management without addressing quantum threats or V2X communication latency18.
Research gap Bridging This study is more direct because it attempts to bridge the research gap in the knowledge of the most effective component of ITS security through the integration of quantum resistance, privacy-preserving blockchain (zk-SNARKs), and deep learning-based anomaly detection into one model. To further illustrate these differentiators, we introduce Table 1, which compares our work against selected prior articles19.
The Vehicular Networks Applications of Blockchain.
Blockchain technology has become a disruptor of improved cybersecurity in vehicular networks. Decentralization and tamper-immune repositories of ledgers are offered by the blockchain process as an instrument to offer secure, transparent, and auditing data transfer between vehicles, infrastructure, and cloud systems. The applications can be made as important as:
-
Safe V2X communications: Proof-of-all-things and other consensus protocols can make data tampering impossible and authenticate the data.
-
Identity Management: In blockchain, identifiers are used to eliminate spoofing and/or unauthorized access.
-
Data Integrity: Sensor and vehicle logs, along with other automotive data, are mutation safe.
Despite being the same, blockchain has scalability, latency and energy consumption issues, which are essential in the implementation of blockchain in real-time ITS environments. They have been proposed to address these limitations through the aid of optimized structures and hybrid blockchain designs [Gartner, 2023; recent ITS blockchain research]20,21. Deep learning and its implementation in: anomaly detection/cybersecurity. Deep learning processes have been shown to possess exceptional features for recognizing aggressive vehicles in intricate highway systems. These models operate with a wide range of data, such as sensor readings, communication history, and system telemetry history, to detect anomalous behavior, which can be used as indicators of a cyber-attack. Methods such as convolutional neural networks (CNNs) and recurrent neural networks (RNNs), which are usually augmented by adversarial training, have been shown to be more resistant to more complex attacks. Despite these accomplishments, the problems of privacy of their information, computing expenses and susceptibility to adversarial instance continue to exist to restrain their potential use in operational ITS systems.
Research gaps
Although prior studies have been conducted on the individual characteristics of blockchain and deep learning in ITS cybersecurity, an adequate analysis of pairs has not been performed. This goes hand in hand with an absence of an overall template that will be centralized in one place:
-
Quantum computer cryptography or long-term security. Existing works such as Zhang et al.22 address blockchain for metaverse privacy but ignore quantum vulnerabilities in vehicular contexts.
-
Blockchain data sharing on a nanoscale level. Studies such as Khan and Munir6 explore decentralization but lack ITS-specific optimizations for high-throughput V2X.
-
Real-time deep learning anomaly detection. While Kavitha and Amutha8 analyse DNN/LSTM for intrusion detection, they do not combine it with a quantum-resistant blockchain for comprehensive resilience.
This study fills these gaps by suggesting a synergistic cybersecurity architecture as a supplement to quantum-resistant blockchain with deep learning algorithms that will offer added security, resilience, and reliability to AVNs in the future in ITS ecosystems.
Related work
Prior research has explored blockchain and deep learning for cybersecurity in domains such as healthcare, vehicular networks, and general AI applications. However, these studies often focus on isolated technologies, neglecting quantum threats, integration challenges, or real-time scalability in intelligent transportation systems (ITS). Below, we critically analyse key works, highlight their shortcomings and demonstrate how our proposed framework—integrating a quantum-resistant blockchain with deep learning for autonomous vehicle networks (AVNs)—addresses these gaps.
Delgado et al.3 proposed a deep learning approach using convolutional neural networks (CNNs) and recurrent neural networks (RNNs) with transfer learning to estimate hand joint angles from surface electromyography (sEMG) and inertial measurement unit (IMU) data. While they are effective for human‒machine interactions and achieve slight improvements over sEMG-only methods, this work is limited to noncybersecurity applications. It overlooks adversarial vulnerabilities in deep learning models and lacks secure data-sharing mechanisms such as blockchain, making it unsuitable for ITSs. Our framework adapts CNNs and RNNs for real-time anomaly detection in vehicle-to-everything (V2X) data streams, incorporating adversarial training for resilience and quantum-resistant blockchains (using lattice-based cryptography and SHA-3 hashing) for tamper-proof data integrity, extending the applicability of deep learning to ITS cybersecurity.
Rayudu et al.4 compared artificial neural networks (ANNs) and deep learning neural networks (DNNs) for rainfall prediction and reported that ANNs were slightly superior (95.68% vs. 92.59% accuracy). This highlights deep learning’s potential in predictive tasks but reveals limitations in accuracy for specific datasets and computational overhead without optimization. The study also ignores privacy concerns and quantum vulnerabilities, limiting its relevance to secure vehicular networks. Our framework optimizes CNNs and RNNs for threat detection, achieving 95.2% accuracy through data augmentation and adversarial training, while integrating zero-knowledge succinct noninteractive arguments of knowledge (zk-SNARKs) in blockchain for privacy-preserving data exchange and lattice-based cryptography for quantum resistance, addressing secure predictive analytics in AVNs21.
Vasu et al.23 utilized transfer learning with pretrained CNNs (e.g., Xception, which achieved 88% accuracy) for classifying epithelial tissues in medical images. While effective, reliance on ImageNet pretraining risks biases, and the study neglects real-time processing needs and defenses against adversarial attacks. It also lacks decentralized data management, which is critical for ITSs. Our framework adapts transfer learning for vehicular telemetry analysis but mitigates these issues by combining it with a quantum-resistant blockchain and low-latency (0.32 s per image) threat detection, ensuring robust performance in dynamic ITS environments.
Liu2 surveyed deep learning networks (DNNs, RNNs, CNNs) for image recognition in autonomous driving, emphasizing navigation safety. However, it focuses on theoretical foundations without empirical integration of cybersecurity layers, leaving gaps in addressing cyber-physical threats such as spoofing or quantum attacks on communication protocols. Our study embeds deep learning within a hybrid architecture, uses RNNs for temporal V2X sequence analysis, is secured by SHA-3 hashing and proof-of-ake (PoS) consensus, achieves 150 transactions per second, and overcomes latency and vulnerability issues in prior autonomous driving applications.
Wu et al.15 introduced a deep neural network for multimodal data fusion, reducing errors in unlabelled datasets through hyperrealization methods. While innovative for handling annotation challenges, it incurs high computational costs and lacks privacy or quantum security, making it unsuitable for decentralized vehicular networks. Our approach resolves this by fusing deep learning with blockchain, using zk-SNARKs for privacy and lattice-based encryption for quantum resistance, enabling secure multimodal fusion of sensor and communication data in AVNs with 99.9% data integrity.
Blockchain-focused studies also reveal shortcomings. Ansari et al.12 applied blockchain for electronic health record (EHR) privacy but faced scalability issues and lacked real-time threat detection, limiting its applicability to ITSs. Su et al.1 proposed a hybrid blockchain for vehicular ad hoc networks (VANETs) with strong authentication, yet high computational costs and a lack of quantum resistance hinder ITS deployment. Chaudhari et al.13 improved healthcare data integrity via blockchain but struggled with legacy system integration and omitted AI-based anomaly detection. Kusi et al.24 decentralized machine learning (ML) training for privacy but suffered from slow convergence and no quantum safeguards. Masurkar et al.25 combined blockchain with AI for privacy but noted complex deployment and scalability gaps without addressing ITS-specific V2X requirements.
Table 2 summarizes these comparisons, highlighting how prior works fail to address quantum threats, scalability, or real-time ITS needs. Our framework bridges these gaps by synergizing quantum-resistant blockchain (lattice-based cryptography, SHA-3 hashing) with adaptive deep learning (CNN-RNN, adversarial-trained), achieving 95.2% detection accuracy, 99.9% data integrity, and scalable performance (1.5 s block validation, 150 transactions per second), making it uniquely suited for future-proof ITS cybersecurity26.
Existing studies on blockchain and deep learning applications in cybersecurity and related domains provide valuable insights but reveal significant limitations when applied to autonomous vehicle networks (AVNs) in intelligent transportation systems (ITS), particularly in addressing quantum threats, real-time scalability, and integrated hybrid architectures. For example, Delgado et al.3 explored deep learning via convolutional neural networks (CNNs) and recurrent neural networks (RNNs) with transfer learning for estimating hand joint angles from surface electromyography (sEMG) and inertial measurement unit (IMU) data, achieving marginal improvements in motion estimation for human‒machine interactions; however, this work is confined to nonccybersecurity contexts, ignoring adversarial vulnerabilities and lacking mechanisms for secure data sharing, making it irrelevant for ITSs where real-time anomaly detection in vehicular data streams is crucial. Similarly, Rayudu et al.4 compared artificial neural networks (ANNs) and deep learning neural networks (DNNs) for rainfall prediction, demonstrating ANNs’ slight superiority in accuracy (95.68% vs. 92.59%), but the study overlooked privacy concerns, quantum-resistant elements, and computational overhead in dynamic environments, limiting its transferability to AVN threat detection where high accuracy must coexist with low latency. Vasu et al.23 employed transfer learning with pretrained CNNs such as Xception for epithelial tissue classification in medical images, attaining 88% accuracy; however, it suffers from potential biases in pretraining datasets and neglects real-time processing or defenses against adversarial attacks, which are essential for vehicular telemetry analysis in ITSs. Liu2 surveyed deep learning networks (DNNs, RNNs, CNNs) for image recognition in autonomous driving, emphasizing theoretical foundations and future developments, but failed to integrate cybersecurity layers, leaving gaps in handling cyber-physical threats such as spoofing or quantum-algorithm vulnerabilities in V2X communications. Wu et al.15 proposed a DNN for multimodal data fusion to reduce errors in unlabelled datasets via hyperrealization methods, showing promise in annotation challenges, but high computational costs and the absence of privacy or quantum safeguards render it unsuitable for decentralized vehicular networks. In blockchain-focused research, Ansari et al.12 reviewed blockchain for electronic health record (EHR) privacy, highlighting secure data handling but plagued by scalability issues and domain-specific focus outside ITSs. Su et al.1 introduced a hybrid blockchain for vehicular ad hoc networks (VANETs) with robust privacy and authentication; however, its high computational demands and lack of quantum resistance hinder deployment in low-latency ITS scenarios. Chaudhari et al.13 enhanced healthcare privacy via blockchain, improving data integrity but struggling with storage costs and legacy integrations without AI anomaly detection. Kusi et al.17 decentralize ML training for privacy preservation, ensuring data security but suffering from slow convergence and no quantum protection. Masurkar et al.5 combine blockchain with AI for decentralized privacy, offering security benefits but complicated by deployment complexities and scalability gaps. Additional works, such as Kavitha and Amutha8, analyse DNNs/LSTM for intrusion detection, achieving good performance but without blockchain synergy for tamper-proofing, whereas Gaifulina and Kotenko27 select DNNs for IoT anomaly detection, missing vehicular-specific optimizations. Overall, these studies advance individual components—deep learning for prediction and anomaly detection, blockchain for privacy and integrity—but fall short in holistic integration, quantum resilience, and ITS-tailored scalability; they often operate in isolated domains such as healthcare or weather, neglecting multilayered threats in AVNs, such as quantum-enabled attacks on V2X, adversarial AI manipulations, and real-time requirements, thereby underscoring the need for a unified framework that combines quantum-resistant protocols, privacy-preserving mechanisms, and adaptive deep learning to achieve superior accuracy, integrity, and efficiency in future-proof ITS cybersecurity28,29.
Methodology
We utilize quantum-resistant protocols of blockchain technology and deep learning-based anomaly detection as a model that guarantees the safety and security of autonomous vehicle networks (AVNs) in intelligent transportation systems (ITS). Lattice-based cryptography and hash-SHA-3 are implemented to build the blockchain layer to have postquantum security and to substitute the insecure RSA and ECC schemes. It adopts a lightweight proof-of-stand (PoS) consensus mechanism to reduce the block validation latency to 1.5 s, and zk-SNARKs are also employed to allow privacy-preserving compliance condition validation, such as identity authentication, balance verification and transaction limits. These smart contracts were deployed and executed on Ethereum testnets via Truffle and Hardhat and simulated blockchain scalability and performance in a distributed environment via Hyperledger Fabric. The deep learning component was oriented at assisting the blockchain during real-time cyber threat identification. Convolutional neural networks (CNNs) were used to process vehicular telemetry and communication data to extract features via space, and recurrent neural networks (RNNs) were used to process features synthesized via time-dependent relationships of sequential vehicular interactions. Artificial datasets were created to model the data of a vehicle sensor, communication logs and telemetry to simulate the data, but data augmentation techniques were employed to introduce adversarial characteristics, such as spoofing, replaying, and denial-of-service attacks30. These models were trained and tested on TensorFlow and PyTorch, and adversarial training processes were performed to make the models more resilient to evasion attacks31,32. The performance measures consisted of standard measures, including accuracy, precision, recall, the F1 score, the false positive rate (FPR), the false negative rate (FNR) and the average processing latency. The workflow of the integration process is sequential. The vehicle data are first verified concerning their form and security standards, after which they are uploaded to the blockchain where they are stored safely. A V2X-like environment simulator with a 15 × 15 grid vehicle network was created to help simulate V2X communication under realistic conditions in the ITS, in which a grid of vehicular data packets was continuously generated and passed through deep learning architectures33,34. The anomaly indicators or threat indicators are captured, encoded and encrypted via a lightweight stream cipher and sent across the network in a secure way. In this way, blockchain is capable of providing decentralized trust and tamper resistance, and deep learning is able to offer proactive monitoring and real-time detection of cyberattacks. The framework was tested and assessed at various levels. The blockchain side was tested, and key performance indicators such as upload time, transaction throughput, block validation latency, data integrity and synchronization time were measured to determine the performance at vehicular network loads35,36. On the deep learning side, the reliability and accuracy in adversarial situations of detection and the computational cost were evaluated. Most of the simulated environments that were adopted, which are MATLAB and NS-3, model the communication protocols, and SUMO and Omnet + + simulate real traffic and congestion scenarios.
-
1.
Elliptic Curve Cryptography (ECC):
Replaced with lattice-based cryptography to secure against quantum threats.
Lattice-based encryption
Given a public key A and a secret key S, encryption involves computing:
where e is a small error vector, ensuring security against quantum attacks.
Blockchain hashing (SHA-3)
The hash function H is defined as:
This method is used for data integrity and immutability.
Consensus mechanism
Implementing proof of stake (PoS) ensures scalability and energy efficiency. The time to validate a block is given by:
-
2.
Deep Learning for Threat Detection.
Convolutional neural networks (CNNs) are employed in the extraction8 of spatial features from vehicular data streams for feature extraction for threat detection in the context of cybersecurity in autonomous vehicle networks. However, recurrent neural networks (RNNs), unlike other forms of neural networks, are able to process temporal dependencies and, therefore, are particularly well suited to real-time threat detection via time series data. These models work together to detect anomalies in the system, an important process of identifying unusual patterns or outliers in the system that can help prevent cybersecurity risks.
Model
-
Neural Network Activation:
For an input x and weights W, activation a is as follows:
where σ(x) is the activation function (e.g., ReLU or sigmoid).
Loss function
The cross-entropy loss L for classification is given by:
where yi is the true label and y^i is the predicted probability.
Precision and recall
-
3.
Integrated Framework.
The vehicle-to-everything (V2X) network9 represents a network in which vehicles, infrastructures, and other objects on the road can seamlessly interact with each other as a security context of autonomous vehicle networks. However, using blockchain technology, blockchain can share data decentralized among network participants since the exchange of data is transparent and safe. Real-time detection is also based on deep learning models to continuously monitor and counter threats, as they were developed to permit real-time response and system integrity.
System dynamics
-
Data Sharing Through Blockchain:
The data D from the sensors are as follows:
Stored on the blockchain and transmitted securely.
Threat detection via deep learning
The input of the neural network S is sensor data S:
where f is the trained deep learning model.
This research proposed a combination of quantum resistant cryptography10 and adaptive deep learning models to develop a framework of a secure and robust intelligent transportation system.
System architecture
Figure 1 comprises the key components of establishing a safe future for self-driving cars36. The latter also touches upon several related fields that should be discussed simultaneously. Among the most significant factors is the development of a quantum-resistant blockchain. The reason is that autonomous vehicle networks are safe against potential quantum computing attacks. The other is the application of deep learning models. The complexity of sophisticated machine learning tools allows autonomous vehicles to make the correct and viable decisions needed to operate safely37,38. Moreover, autonomous vehicle networks and communication networks need to be developed among autonomous vehicles to be secure and robust. This makes the coordination and data exchange between the vehicles more convenient and secure and makes the vehicles safer and more efficient overall. It involves the application of smart transportation systems. These systems are monitored, controlled, and optimized, which enables the flow of traffic to be monitored, controlled, and optimized to the extent possible so that these autonomous vehicle operations are as safe and efficient as possible. Information gathering and preparation are certainly important as well. In the case of autonomous vehicles, we require multiple sources of data that are collected and processed to train and validate the deep learning models that will be applied in autonomous vehicles. Additionally, effective security measures are needed to guarantee data privacy39,40. This allows the information gathered by autonomous vehicle systems, including sensitive information, to be collected safely and therefore preserves privacy among users41,42. All of these interrelated elements result in a secure and reliable autonomous vehicle system, which is able to safely drive on our roads and highways and opens us a door to a future with self-driving cars. The proposed flow diagram is shown in Fig. 2.
Flow chart
Algorithm

The proposed algorithm processes vehicle data for secure upload to a quantum-resistant blockchain, simulates V2X communications in a grid, detects threats via deep learning, and encrypts the results for transmission. Below is a detailed breakdown:
Input Validation (Steps 1–9): Verify file F’s type (sensor logs in JSON/CSV) and security (e.g., signature validation via a lattice-based crypto). If valid, compute the hash and upload it to the blockchain via PoS consensus and zk-SNARKs for privacy-preserving verification (zero-knowledge proof of authenticity without revealing data).
Early Exit Check (Steps 10–12): If hash upload fails (e.g., duplicate or error), terminate to prevent redundant processing.
Grid Initialization and Data Generation (Steps 13–22): Create a 15 × 15 grid representing AVN nodes. For each cell (225 total), generate synthetic vehicular data (e.g., telemetry packets with speed, location, and timestamps). A while loop is used to ensure compliance with V2X rules (e.g., IEEE 802.11p standards for packet format, no invalid fields). Regeneration attempts are bounded (e.g., max 10 tries) to avoid infinite loops.
Threat Detection (Step 23): Apply a deep learning model (CNN for spatial features from grid data, RNN for temporal sequences). Input: Flattened grid as a multivariate time series. The CNN extracts anomalies (e.g., spoofing patterns via convolution kernels), and the RNN processes sequences (e.g., LSTM gates for long-term dependencies). Output E: Anomaly scores/probabilities.
Encoding and Encryption (Steps 24–26): Convert E to ternary (base-3 for compact representation), then binary. Encrypt using a stream cipher (e.g., ChaCha20) keyed by fileHash for confidentiality.
Blockchain Upload and Transmission (Steps 27–28): Upload validated grid B to blockchain (append as a transaction, validate via PoS). Send encrypted M to the user/node.
Complexity Analysis.
Assuming a general N×N grid (here, N = 15 but scalable):
Time Complexity:
Validation/Upload (Steps 1–12, 27): O(1) for fixed-size operations; blockchain uploads O(V), where V is validator in PoS (typically linear but efficient vs. PoW’s O(2^b) for hash difficulty b).
Grid generation (Steps 13–22): O(N² * C), where C is avg. while loop iterations (constant if bounded, e.g., O(1)).
Deep Learning (Step 23): CNN: O(L * C_out * C_in * K² * N²) per layer (L layers, C channels, K kernel). RNN: O(T * H²), where T = N² (sequence length) and H is the hidden size. Total: O(N⁴) worst-case for deep models, but real-time (0.32 s/image) due to a small N.
Encoding/Encryption (Steps 24–26, 28): O(S), where S is the size of E (linear in N²).
Overall: O(N⁴) dominated by DL; efficient for N = 15 (constant in practice).
Space Complexity:
Grid: O(N²).
DL Model: O(parameters), e.g., CNN O(C_in * C_out * K² * L), RNN O(H²).
zk-SNARKs: Prover O(Q log Q) quasilinear in circuit size Q (transaction complexity); verifier O(1).
Blockchain: O(Tx) per transaction (1.2 KB here), scalable with PoS.
This ensures low latency (1.5 s validation) and quantum-resistant security for the ITS.
This system ensures the cybersecurity of intelligent transportation systems (ITS)43,44 through the implementation of a quantum-resistant blockchain and deep learning models45, [4746,. It first verifies the input data file in terms of type and security compliance. It is then stored in the blockchain so that it can be securely stored, should the file pass these checks. Then, we create a 15 × 15 grid of the vehicle network where we create random vehicle data to be used in V2X communication. This information is compared with communication regulations47,48. We use a deep learning model on the information to identify real-time dangers in the network, identifying potentially suspicious or secure risk activities on the network. This output is converted to ternary encoding, binary encoding and stream cipher encryption to transmit it securely. With respect to the blockchain, the encrypted information and vehicle network information interact and are distributed to the target association. This guarantees an eventual structure of secure communication, threat identification and data integrity within the ITS settings.
Result analysis
The study of result scenarios in QR/blockchain and deep learning in AV/networks are two technologies that are incorporated as imperative aspects to study simulation tools and technologies for cybersecurity applications in ITSs49,50. It has MATLAB and NS-3, which can be applied in the modelling and testing of network protocols. The simulations of urban MObility (SUMO) and Omnet + + are used to execute congestion scenarios, and hyperledger fabric is used to execute the blockchain environment. In the case of the quantum resistance evaluation, a quantum algorithm simulation is available in the IBM Quantum Lab. The diagrams used to construct and train the deep learning model are TensorFlow and PyTorch51,52. He also reported that real-time simulations of such systems can be performed via MATLAB simulink in particular. These technologies ensure the verification of sound cybersecurity models in problematic autonomous transportation scenarios53. The deep learning systems were reliable in the detection of threats in vehicular streams of data54,55. The CNN and RNN architectures demonstrated an accuracy of 95.2 in total, 94.1 precision, 93.5 recall, and an F1 score of 93.8. The false positive rate was 4.3, the false negative rate was 6.1, and the mean time to process each image was 0.32 s, which confirms that real-time detection of anomalies in the ITS setting is possible. These findings suggest that the framework is capable of detecting cyberattacks in a time-efficient manner to achieve accuracy and operational efficiency. The blockchain layer also had good performance, with an IRR of 99.9 and a rate of 150 transactions per second. The mean blockchain upload time was 2.1 s, with block validation taking 1.5 s and synchronization taking an average of 5.2 s. The storage requirement was estimated to be 1.2 KB per transaction, which is efficient in processing massive vehicular data. These results confirm the ability of the blockchain to ensure secure and nontamperable V2X communication when operating under a high load of transactions. The combined findings indicate the success of the hybridization of blockchain and deep learning in a single framework. The deep learning models were used to provide the ability to detect threats accurately and in real time, whereas the blockchain was used to provide decentralized trust, privacy preservation, and quantum resistance. Notably, the joint use of these two technologies has enabled them to be highly accurate and resilient without subjecting them to prohibitive computational and communication loads. This shows how practically feasible the framework is to be implemented in next-generation ITS ecosystems, which would guarantee sound, reliable, and future-resilient autonomous vehicle networks.
Table 3 shows a high level of first-prediction effectiveness, with a first-accuracy of 95.2%, a first-precision of 94.1%, a first-recall of 93.5%, and an F1 score of 93.8%. The false positive rate is 4.3%, and the false negative rate is 6.1%, which shows that the detection is very reliable, whereas the time it takes to detect images at 0.32 s makes it efficient.
Table 4: Key performance indicators discussed in the blockchain metrics for data integrity and transaction speed. A blockchain upload time of 2.1 s and a data integrity rate of 99.9% guarantee reliability. The transaction output is established at 150 tx/s, which is accompanied by a block validation time of 1.5 s and storage of 1.2 bytes/transaction.
Figure 3 focuses on blockchain metrics directly related to data integrity, such as transaction validation rates and resistance to tampering. Figure 4 illustrates the deep learning performance in the context of threat detection, where parameters such as accuracy, recall, and response time are included. Figure 5 also shows metrics of both blockchain and deep learning in one figure to show their interactive performance in providing security, efficiency and intelligence to the system.
Below is a comparative analysis table addressing the comment that the deep learning model evaluation in the study only reports the accuracy, precision, recall, and F1 score, missing critical metrics such as the ROC-AUC, Matthews correlation coefficient (MCC), and detection latency distributions, which are vital for safety-critical intelligent transportation systems (ITS).
Table 5 shows the results of the deep learning model evaluation in the proposed framework, which reports the accuracy (95.2%), precision (94.1%), recall (93.5%), F1 score (93.8%), false positive rate (4.3%), false negative rate (6.1%), and average processing time (0.32 s). While these metrics demonstrate high accuracy and efficiency in threat detection for autonomous vehicle networks (AVNs), they lack critical measures such as ROC-AUC, MCC, and latency distributions, which are essential for safety-critical ITSs. The accuracy and F1 score provide overall performance but are sensitive to class imbalance, potentially overstating effectiveness in skewed datasets. Precision and recall offer insight into true positive detection but miss threshold sensitivity, which the ROC-AUC addresses by evaluating performance across all thresholds, ensuring generalizability. MCC is crucial for imbalanced datasets, providing a balanced correlation measure, unlike the F1 score, which may favour majority classes. The reported average latency (0.32 s) confirms real-time capability but lacks distribution details (e.g., min, max, variance), which is critical for ensuring consistent performance in dynamic ITS environments. Including the ROC-AUC, MCC, and latency distributions (e.g., P50, P95 percentiles) would enhance the evaluation robustness, validating the model’s reliability and responsiveness under diverse conditions. These additions address the reviewer’s concerns, ensuring comprehensive assessment for safety-critical applications and strengthening the framework’s applicability in future-proof ITS cybersecurity.
The proposed quantum-resistant blockchain and deep learning framework for securing autonomous vehicle networks (AVNs) in intelligent transportation systems (ITS). Using simulation tools such as MATLAB, NS-3, SUMO, OMNeT++, and Hyperledger Fabric, the model was tested in realistic V2X scenarios, with the quantum resistance evaluated via the IBM Quantum Lab. The deep learning component, which uses CNNs and RNNs, achieved 95.2% accuracy, 94.1% precision, 93.5% recall, and a 93.8% F1 score, with false positive (4.3%) and false negative (6.1%) rates and a 0.32-second processing time per image, confirming efficient real-time threat detection. The blockchain layer, which employs lattice-based cryptography and SHA-3 hashing, demonstrated 99.9% data integrity, 150 transactions per second, 2.1-second upload time, 1.5-second block validation, and 5.2-second synchronization, with 1.2 KB storage per transaction. These results highlight the framework’s ability to ensure secure, tamper-proof V2X communication under high transaction loads while resisting quantum threats. The hybrid approach synergizes deep learning’s proactive anomaly detection with blockchain’s decentralized trust, achieving scalability and low latency. However, limitations such as reliance on synthetic data and computational costs require further real-world validation. These metrics position the framework as a robust, future-proof solution for ITS cybersecurity, surpassing prior works in terms of quantum resistance and real-time performance.
Conclusion
This research presents a novel cybersecurity framework that integrates a quantum-resistant blockchain and deep learning to address vulnerabilities in autonomous vehicle networks (AVNs) within intelligent transportation systems (ITS). The framework introduces three key contributions: a postquantum secure communication protocol using lattice-based cryptography, a decentralized blockchain-based data-sharing platform with zk-SNARKs for privacy and SHA-3 hashing for integrity, and deep learning models (CNNs and RNNs) for real-time anomaly detection. The experimental results validate its efficacy, with deep learning achieving 95.2% accuracy, 94.1% precision, 93.5% recall, and 0.32-second processing time per image, ensuring rapid threat detection. The blockchain layer delivers 99.9% data integrity, 150 transactions per second, 1.5-second block validation, and 2.1-second upload time, demonstrating scalability and quantum resistance. These metrics confirm the framework’s ability to secure V2X communications against classical and quantum threats while maintaining efficiency in high-load ITS environments. By enabling secure, tamper-proof data exchange and proactive threat mitigation, the framework enhances road safety, communication reliability, and system scalability, paving the way for robust autonomous transportation systems. However, limitations include computational costs, reliance on synthetic data, and the need for large-scale real-world validation. Future work should focus on optimizing computational efficiency, testing with real vehicular data, and integrating with legacy ITS infrastructure to ensure long-term reliability. This synergistic approach, which combines a quantum-resistant blockchain with adaptive deep learning, offers a visionary solution, significantly advancing trust, safety, and resilience in AVNs and setting a foundation for future-proof ITS cybersecurity.
Data availability
The datasets analysed during the current study are available from the corresponding author on reasonable request.
References
Su, H., Dong, S. & Zhang, T. A Hybrid Blockchain-Based Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 73(11), 17059–17072. https://doi.org/10.1109/TVT.2024.3424786 (2024).
Liu, J. & Survey of the Image Recognition Based on Deep Learning Network for Autonomous Driving Car,. 2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT), Shenyang, China, Shenyang, China, pp. 1–6, (2020). https://doi.org/10.1109/ISCTT51595.2020.00007
Delgado, A. L. et al. Estimation of Joint Angle From sEMG and Inertial Measurements Based on Deep Learning Approach, 2021 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC), Mexico, pp. 700–703, (2021). https://doi.org/10.1109/EMBC46164.2021.9630609
Rayudu, D. V. & Roseline, J. F. Accurate Weather Forecasting for Rainfall Prediction Using Artificial Neural Network Compared with Deep Learning Neural Network, International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF), Chennai, India, 2023, pp. 1–6, Chennai, India, 2023, pp. 1–6, https://doi.org/10.1109/ICECONF57129.2023.10084252
Kirmani, S. & Raghavan, P. Scalable parallel graph partitioning, in SC ’13: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, pp. 1–10, (2013). https://doi.org/10.1145/2503210.2503280
Khan, A. B. & Munir, Q. Public Debt and Decentralization: A Sub National Evidence from a Non-Arab Muslim Federation, 2021 International Conference on Sustainable Islamic Business and Finance, Sakheer, Bahrain, pp. 182–185, (2021). https://doi.org/10.1109/IEEECONF53626.2021.9686319
Nadeem, M., Pathak, P. C., Ahmad, M. & Farooqui, N. A. Identification of security factors in cloud computing: defence security perspective, in Computational Intelligence Applications in Cyber Security, CRC, 78–99. (2024).
Nadeem, M. et al. Deep Learning Approach for Classifying DDoS Attack Traffic in SDN Environments. J. Inf. Secur. Cybercrimes Res. 7(2), 109–126. https://doi.org/10.26735/VNFU3495 (2024).
Kirmani, F., Lane, B. J. & Rose, J. R. Exploring Machine Learning Techniques to Improve Peptide Identification, in 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE), pp. 66–71, (2019). https://doi.org/10.1109/BIBE.2019.00021
Nadeem, M. Analyze quantum security in software design using fuzzy-AHP. Int. J. Inf. Technol. https://doi.org/10.1007/s41870-024-02002-w (2024).
Alosaimi, W. et al. Analyzing the impact of quantum computing on IoT security using computational based data analytics techniques. AIMS Math. 9 (3), 7017–7039. https://doi.org/10.3934/math.2024342 (2024).
Ansari, M. F., Dash, B., Swayamsiddha, S. & Panda, G. Use of Blockchain Technology to Protect Privacy in Electronic Health Records- A Review, 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Bengaluru, India, pp. 144–149, (2023). https://doi.org/10.1109/IDCIoT56793.2023.10053417
Chaudhari, A. K., Mahajan, P. P., Jadhav, V. A. & Kudtarkar, R. R. Enhancing Patients Privacy in Healthcare Records with Blockchain Technology, 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). https://doi.org/10.1109/ICCCNT61001.2024.10726265
Kirmani, S., Park, J. & Raghavan, P. An embedded sectioning scheme for multiprocessor topology-aware mapping of irregular applications. Int. J. High. Perform. Comput. Appl. 31 (1), 91–103. https://doi.org/10.1177/1094342015597082 (2017).
Wu, Q., Xie, Q. & Xia, D. Application of Computer Vision and Deep Learning Neural Network in Multi-Modal Information Fusion, 2024 International Conference on Data Science and Network Security (ICDSNS), Tiptur, India, Tiptur, India, pp. 1–5, (2024). https://doi.org/10.1109/ICDSNS62112.2024.10691099
Attaallah, A. et al. Prediction of COVID-19 pandemic spread in Kingdom of Saudi Arabia. Comput. Syst. Sci. Eng. 37 (3). https://doi.org/10.32604/CSSE.2021.014933 (2021).
Kusi, G. A., Xia, Q., Cobblah, C. N. A., Gao, J. & Xia, H. Training Machine Learning Models Through Preserved Decentralization, 2020 16th International Conference on Mobility, Sensing and Networking (MSN), Tokyo, Japan, pp. 465–472, (2020). https://doi.org/10.1109/MSN50589.2020.00080
Alharbi, A. et al. Managing Software Security Risks through an Integrated Computational Method. Intell. Autom. Soft Comput. 28(1), 179. https://doi.org/10.32604/IASC.2021.016646 (2021).
Kirmani, S., Sun, H. & Raghavan, P. A Scalability and Sensitivity Study of Parallel Geometric Algorithms for Graph Partitioning, in 2018 30th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), pp. 420–427, (2018). https://doi.org/10.1109/CAHPC.2018.8645916
Alharbi, A. et al. Selection of data analytic techniques by using fuzzy AHP TOPSIS from a healthcare perspective. BMC Med. Inf. Decis. Mak. 24 (1), 240. https://doi.org/10.1186/s12911-024-02651-8 (2024).
Ahmad, M. et al. Healthcare device security assessment through computational methodology. Comput. Syst. Sci. Eng. 41 (2). https://doi.org/10.32604/csse.2022.020097 (2022).
Zhang, C. et al. Privacy-Preserving Identity-Based Data Rights Governance for Blockchain-Empowered Human-Centric Metaverse Communications. IEEE J. Sel. Areas Commun. 42(4), 963–977. https://doi.org/10.1109/JSAC.2023.3345392 (2024).
Vasu, A., Jain & Tiwari, R. G. Epithelial Tissue Classification using Pre-Trained Deep Convolutional Neural Networks, 2023 IEEE 12th International Conference on Communication Systems and Network Technologies (CSNT), Bhopal, India, Bhopal, India, pp. 625–630, (2023). https://doi.org/10.1109/CSNT57126.2023.10134602
Kirmani, F., Lane, B. & Rose, J. Identifying Proteotypic Peptides via Deep Learning, in Proceedings of the 11th International Conference on Bioinformatics Research and Applications, pp. 42–47, (2025). https://doi.org/10.1145/3700666.3700691
Tyler, J., Pastor, J., Huhns, M. N., Kirmani, S. & Du, H. Exposing, formalizing and reasoning over the latent semantics of tags in multimodal data sources. Appl. Ontol. 8, 95–130. https://doi.org/10.3233/AO-130124 (2013).
Kirmani, S. & Shankar, M. Generating keywords by associative context with input words. US Patent (2022). 10,699,302.
Mishra, A., Kirmani, S. & Madduri, K. Fast spectral graph layout on multicore platforms, (2020). https://doi.org/10.1145/3404397.3404471
Kirmani, S. & Madduri, K. Spectral Graph Drawing: Building Blocks and Performance Analysis, in 2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), pp. 269–277, (2018). https://doi.org/10.1109/IPDPSW.2018.00053
Alyami, H. et al. Analyzing the data of software security life-span: quantum computing era. Intell. Autom. Soft Comput. 31 (2). https://doi.org/10.32604/iasc.2022.020780 (2022).
A. H., A. F. S. S. K., Masood Ahmad Jehad, S. M. N. A. A. & Al-Amri, F. Healthcare device security assessment through computational methodology. Comput. Syst. Sci. Eng. 41 (2), 811–828. https://doi.org/10.32604/csse.2022.020097 (2022).
Alyami, H. et al. The evaluation of software security through quantum computing techniques: A durability perspective. Appl. Sci. 11 (24). https://doi.org/10.3390/app112411784 (2021).
Samuel, O., Javaid, N., Alghamdi, T. A. & Kumar, N. Towards sustainable smart cities: A secure and scalable trading system for residential homes using blockchain and artificial intelligence. Sustain. Cities Soc. 76, 103371. https://doi.org/10.1016/j.scs.2021.103371 (2022).
Alharbi, A. et al. Novel 59-layer dense inception network for robust deepfake identification. Sci. Rep. 15 (1), 24159. https://doi.org/10.1038/s41598-025-03889-6 (2025).
Hakami, A. et al. Clinical characteristics and early outcomes of hospitalized COVID-19 patients with end-stage kidney disease in Saudi Arabia. Int. J. Gen. Med. 14, 4837–4845. https://doi.org/10.2147/IJGM.S327186 (2021).
Nadeem, M. et al. Evaluating the Factors of CGTMSE Scheme in Bank by Using Fuzzy AHP, in 2023 6th International Conference on Contemporary Computing and Informatics (IC3I), 6, 56–61. https://doi.org/10.1109/IC3I59117.2023.10397669
Alassery, F. et al. Quantitative Evaluation of Mental-Health in Type-2 Diabetes Patients Through Computational Model. Intell. Autom. Soft Comput. 32(3), 1701–1715. https://doi.org/10.32604/IASC.2022.023314 (2022).
Masurkar, A. S., Sun, X., Dai, J. & Communications Using Blockchain for Decentralized Artificial Intelligence with Data Privacy, 2023 International Conference on Computing, Networking and (ICNC), Honolulu, HI, USA, pp. 195–201, (2023). https://doi.org/10.1109/ICNC57223.2023.10074247
Yadav, R. & Bhat, A. Applications of Deep Learning for Disease Management, 022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India, pp. 1058–1063, (2022). https://doi.org/10.1109/ICAC3N56670.2022.10074269
Kavitha, R. & Amutha, S. Performance Analysis of Deep Neural Network and LSTM models for Secure Network Intrusion Detection System, 2022 IEEE 4th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA), Goa, India, pp. 390–396, (2022). https://doi.org/10.1109/ICCCMLA56841.2022.9989253
Gaifulina, D. & Kotenko, I. Selection of Deep Neural Network Models for IoT Anomaly Detection Experiments, 2021 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Valladolid, Spain, pp. 260–265, (2021). https://doi.org/10.1109/PDP52278.2021.00049
Cai, K., Zhu, Y. & A Method for Identifying Essential Proteins Based on Deep Convolutional Neural Network Architecture with Particle Swarm Optimization,. 2022 Asia Conference on Advanced Robotics, Automation, and Control Engineering (ARACE), Qingdao, China, pp. 7–12, (2022). https://doi.org/10.1109/ARACE56528.2022.00010
Huoh, T. L., Luo, Y., Li, P. & Zhang, T. Flow-Based Encrypted Network Traffic Classification With Graph Neural Networks. IEEE Trans. Netw. Serv. Manage. 20(2), 1224–1237. https://doi.org/10.1109/TNSM.2022.3227500 (2023).
Ansari, M. F., Dash, B., Swayamsiddha, S. & Panda, G. Use of Blockchain Technology to Protect Privacy in Electronic Health Records- A Review, 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Bengaluru, India, pp. 144–149, (2023). https://doi.org/10.1109/IDCIoT56793.2023.10053417
Su, H., Dong, S. & Zhang, T. A Hybrid blockchain-based privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Veh. Technol. 73(11), 17059–17072. https://doi.org/10.1109/TVT.2024.3424786 (2024).
Kamand, I. Networking Technologies (ICCCNT), pp. 1–5, (2024). https://doi.org/10.1109/ICCCNT61001.2024.10726265
Rajawat, A. S., Rawat, R., Barhanpurkar, K., Shaw, R. N. & Ghosh, A. Blockchain-Based model for expanding IoT device data security. In Advances in Applications of Data-Driven Computing. Advances in Intelligent Systems and Computing Vol. 1319 (eds Bansal, J. C. et al.) (Springer, 2021). https://doi.org/10.1007/978-981-33-6919-1_5.
Khan, I. A. et al. A Novel Collaborative SRU Network With Dynamic Behaviour Aggregation, Reduced Communication Overhead and Explainable Features. IEEE J. Biomedical Health Inf. 28(6), 3228–3235. https://doi.org/10.1109/JBHI.2024.3352013 (2024).
Khan, I. A., Pi, D., Kamal, S., Alsuhaibani, M. & Alshammari, B. M. Federated-Boosting: A Distributed and Dynamic Boosting-Powered Cyber-Attack Detection Scheme for Security and Privacy of Consumer IoT. IEEE Trans. Consum. Electron. 71(2), 6340–6347. https://doi.org/10.1109/TCE.2024.3499942 (2025).
Khan, I. A. et al. Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks. Inf. Fusion. 101, 102002. https://doi.org/10.1016/j.inffus.2023.102002 (2024).
Nandanwar, H. & Katarya, R. TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment. Int. J. Inf. Secur. 23(2), 1251–1277. https://doi.org/10.1007/s10207-023-00787-8 (2023).
Nandanwar, H. & Katarya, R. Securing industry 5.0: an explainable deep learning model for intrusion detection in cyber-physical systems. Comput. Electr. Eng. 123, 110161. https://doi.org/10.1016/j.compeleceng.2025.110161 (2025).
Nandanwar, H. & Katarya, R. A hybrid Blockchain-Based framework for Securing intrusion detection systems in internet of things. Cluster Comput. 28, 471. https://doi.org/10.1007/s10586-025-05135-0 (2025).
Vatslavskyi, O. & Ivanova, A. The level of fiscal decentralization in Ukraine: modeling of indicative parameters, 2020 10th International Conference on Advanced Computer Information Technologies (ACIT), Deggendorf, Germany, 545–548. (2020) https://doi.org/10.1109/ACIT49673.2020.9208868
K C, R. S. S K and G. M, Information Processing of Electronic Medical Records Through Intelligent Smart Contracting and its Future Landscape in Industry 5.0, 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, pp. 1560–1564, (2024). https://doi.org/10.1109/ICESC60852.2024.10690110
Nandanwar, H. & Katarya, R. Optimized intrusion detection and secure data management in IoT networks using GAO-Xgboost and ECC-integrated blockchain framework. Knowl. Inf. Syst. https://doi.org/10.1007/s10115-025-02513-3 (2025).
Acknowledgements
The author gratefully acknowledges the support of the Energy, Industry, and Advanced Technologies Research Center, Taibah University, Madinah, Saudi Arabia, for funding this research project.
Funding
This work was supported by the Energy, Industry, and Advanced Technologies Research Center, Taibah University, Madinah, Saudi Arabia.
Author information
Authors and Affiliations
Contributions
The manuscript was written, analysed and completed by the author Reyadh Alluhaibi itself.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
Alluhaibi, R. Quantum resistant blockchain and deep learning revolutionize secure communications for autonomous vehicles. Sci Rep 16, 59 (2026). https://doi.org/10.1038/s41598-025-28938-y
Received:
Accepted:
Published:
Version of record:
DOI: https://doi.org/10.1038/s41598-025-28938-y







