S. A. Abdel Hakeem, H. Kim. Advancing Intrusion Detection in V2X Networks: A Comprehensive Survey on Machine Learning, Federated Learning, and Edge AI for V2X Security. IEEE Transactions on Intelligent Transportation Systems, vol. 26, no. 8, pp. 11137–11205, Aug. 2025. Article Link (IF: 8.4), Keywords: Vehicle-to-everything, Security, Surveys, Intrusion detection, Computational modeling, Federated learning, Real-time systems, Benchmark testing, Artificial intelligence, Sensor fusion, V2X security, IDS, FL, Edge AI, False alarm reduction, Adversarial threats, Distributed sensor fusion, Blockchain, Post-quantum cryptography, Hybrid IDS, Autonomous vehicles, 5G/6G security.
S. A. Abdel Hakeem and H. Kim, "PQ-V2X: A Novel Postquantum Cryptographic Dataset for Secure Vehicular Communications," in IEEE Internet of Things Journal, vol. 12, no. 24, pp. 53704-53729, 15 Dec.15, 2025, doi: 10.1109/JIOT.2025.3618153. keywords: {Cryptography;Benchmark testing;Vehicle-to-everything;Intrusion detection;Roads;Surveys;Elliptic curve cryptography;Controller area networks;Authentication;Analytical models;Dataset generation;detection efficiency-resource (DER) ratio;hybrid threat detection;intrusion detection;machine learning;postquantum cryptography (PQC);real cryptographic traces;real-world evaluation;resource-constrained deployment;synthetic data;vehicular mobility;zone-aware feature engineering}, Article Link (IF: 8.9)
Shimaa A. Abdel Hakeem, Hyungwon Kim. Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security. Journal of King Saud University – Computer and Information Sciences, vol. 35, no. 7, p. 101638, Elsevier, July 2023.
Description: Proposes a secure 5G-V2X protocol using bilinear pairing and AES encryption; introduces a reputation-based vehicle revocation mechanism for real-time trust updates; achieves efficient signing (1.925 ms) and verification (7.115 ms). Article Link (IF:14.3)
Shimaa A Abdel Hakeem, Hyungwon Kim. Evaluation and analysis of a secure voting-based aggregated signatures authentication and revocation protocol for 5G-V2X communication. Alexandria Engineering Journal, vol. 85, pp. 160–176, Elsevier, December 2023.
Description: Introduces a novel protocol addressing 5G-V2X security challenges, focusing on authentication and malicious entity revocation. Utilizes short bilinear pairing digital signatures for message authentication and pseudo-identities for entity verification, with secret-splitting key generation. Achieves high communication efficiency (280 bytes/message) and competitive computation times (0.614 ms signing, 5.035 ms verification). Article Link (IF:6.8)
Shimaa A. Abdel Hakeem,HyungWon Kim, Hanan H. Hussein. Security Requirements and Challenges of 6G Technologies and Applications. Sensors, vol. 22, no. 5, p. 1969, MDPI, March 2022.
Description: Discusses security needs and potential threats in 6G networks, covering use cases such as holographic communication, internet, and AI-driven applications. Reviews enabling technologies, security architectures, and emerging attack surfaces in 6G ecosystems. (IF:3.5) Article Link
Shimaa A Abdel Hakeem, Hanan H Hussein, HyungWon Kim. Vision and research directions of 6G technologies and applications. Journal of King Saud University – Computer and Information Sciences, vol. 34, no. 6, pp. 2419–2442, Elsevier, June 2022. (IF:13.4) Article Link
Description: Provides a comprehensive overview of sixth-generation (6G) mobile network development, including motivations, use case scenarios, requirements, research projects, and enabling technologies. Discusses Beyond 5G evolution, highlights 6G capabilities, and proposes a roadmap for specification, regulation, and potential applications.
Shimaa A. Abdel Hakeem, HyungWon Kim. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication. Sensors, vol. 22, no. 1, p. 331, MDPI, January 2022.
Description: Proposes an efficient centralized threshold shared secret protocol for vehicular communications, utilizing Shamir secret sharing for secure key distribution and Hashed Message Authentication Code (HMAC) for authentication. The protocol ensures unconditional security, supports dynamic group membership, and minimizes computational complexity compared to bilinear pairing methods. Article Link
Shimaa A. Abdel Hakeem,Sherine M. Abd El-Kader,HyungWon Kim, . A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks. Sensors, vol. 21, no. 17, 5838, MDPI, August 2021.
Description: Introduces an efficient key management protocol for LoRaWAN using hash-chain generation and salt hashing to address session key renewal and device security. Demonstrated improvements in computation time, storage, communication overhead, and resilience against key compromise and replay attacks. (IF:3.5) Article Link
Shimaa A. Abdel Hakeem, HyungWon Kim. Multi-zone authentication and privacy-preserving protocol (MAPP) based on the bilinear pairing cryptography for 5G-V2X. Sensors, vol. 21, no. 2, p. 665, MDPI, January 2021.
Description: Proposes a lightweight Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) for 5G-V2X communication, using bilinear pairing cryptography and short-size signatures. Supports multi-zone broadcast authentication to meet 5G security requirements, reducing communication and computation overhead while enabling secure, efficient authentication across multiple zones. (IF:3.5) Article Link
Shimaa A. Abdel Hakeem,Sherine M. Abd El-Kader,HyungWon Kim, . A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks. Sensors, vol. 21, no. 17, 5838, MDPI, August 2021.
Description: Introduces an efficient key management protocol for LoRaWAN using hash-chain generation and salt hashing to address session key renewal and device security. Demonstrated improvements in computation time, storage, communication overhead, and resilience against key compromise and replay attacks. (IF:3.5) Article Link
Shimaa A. Abdel Hakeem, HyungWon Kim. Multi-zone authentication and privacy-preserving protocol (MAPP) based on the bilinear pairing cryptography for 5G-V2X. Sensors, vol. 21, no. 2, p. 665, MDPI, January 2021.
Description: Proposes a lightweight Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) for 5G-V2X communication, using bilinear pairing cryptography and short-size signatures. Supports multi-zone broadcast authentication to meet 5G security requirements, reducing communication and computation overhead while enabling secure, efficient authentication across multiple zones. (IF:3.5) Article Link
Shimaa A. Abdel Hakeem, Anar A. Hady, HyungWon Kim. 5G-V2X: Standardization, architecture, use cases, network-slicing, and edge-computing. Wireless Networks, vol. 26, no. 8, pp. 6015–6041, Springer US, November 2020.
Description: Reviews the standardization, architecture, and applications of 5G-V2X communications. Discusses enabling technologies such as network slicing and edge computing, and evaluates LTE-V2X and C-V2X under 3GPP Release 14 and Release 16 specifications. Explores automotive capabilities, improvements, and future services in 5G vehicular networks. (IF:2.1) Article Link
Shimaa A. Abdel Hakeem, Anar A. Hady, HyungWon Kim. Current and future developments to improve 5G-NewRadio performance in vehicle-to-everything communications. Telecommunication Systems, vol. 75, no. 3, pp. 331–353, Springer US, November 2020. IF: (2.3) Article Link
Description: Reviews advancements in V2X communications, comparing DSRC and LTE-V2X technologies and their integration into 5G-NewRadio (5G-NR) under 3GPP Release 14, 15, and 16 standards. Examines enhancements for autonomous driving, high-reliability services, and ultra-low latency in next-generation vehicular communication systems.
Shimaa A. Abdel Hakeem, Mohamed A. Abd El-Gawad, HyungWon Kim. Comparative experiments of V2X security protocol based on hash chain cryptography. Sensors, vol. 20, no. 19, p. 5719, MDPI, October 2020.
Description: Proposes a lightweight V2X message authentication and privacy preservation protocol using a hash chain of secret keys for Message Authentication Code (MAC) generation. The approach significantly reduces communication overhead and processing delay compared to Elliptic Curve Digital Signature Algorithm (ECDSA)-based solutions, while maintaining high security for autonomous driving and road safety applications. (IF:3.5) Article Link
A decentralized lightweight authentication and privacy protocol for vehicular networks
Shimaa A Abdel Hakeem, Mohamed A Abd El-Gawad, HyungWon Kim
IEEE Access, Vol. 7, pp. 119689–119705, Aug. 2019. IEEE.
This paper proposes a decentralized, lightweight security protocol for authentication and privacy protection in Vehicle-to-Everything (V2X) communications. Unlike conventional approaches relying on a central Certificate Authority (CA), the proposed scheme employs on-board security hardware—Biometric Devices (BD) and Tamper-Proof Devices (TPD)—to locally verify identities, generate pseudo-identities, and securely manage private keys. This decentralized design reduces communication overhead, preserves privacy, and enhances security for real-time Vehicle-to-Vehicle (V2V) applications. (IF:3.6) doi: 10.1109/ACCESS.2019.2937182.
RPL Routing Protocol Performance in Smart Grid Applications Based Wireless Sensors: Experimental and Simulated Analysis, Shimaa A. Abdel Hakeem, Anar A. Hady, HyungWon Kim, Electronics, Vol. 8, No. 2, Article 186, Feb. 2019. MDPI.
This work evaluates the performance of the Routing Protocol for Low-Power and Lossy Networks (RPL) in the context of smart grid applications using wireless sensor networks. The study combines experimental implementation and simulation to assess routing efficiency, network stability, and energy consumption under various configurations, providing practical insights for optimizing RPL-based smart grid communication systems. DOI: 10.3390/electronics8020186, IF:2.6
Optimizing 5G in V2X Communications: Technologies, Requirements, Challenges, and Standards
Shimaa Abdelnaby Abdel Hakeem, Anar Abdel Hady, HyungWon Kim
Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, pp. 972–1011, 2021. IGI Global Scientific Publishing.
This chapter addresses the integration of 5G New Radio (NR-5G) with Cellular Vehicle-to-Everything (C-V2X) communications, focusing on enabling technologies, requirements, challenges, and standardization efforts. It provides a comprehensive overview of IEEE 802.11p and cellular C-V2X modes, the 3GPP releases governing their evolution, and deployment considerations for both short-range and long-range communication. The work also discusses LTE-V2X as the current baseline, enhancements in 3GPP Release 16, and implications for future NR-V2X capabilities. DOI: 10.4018/978-1-7998-7708-0.ch041