Enhancing Traffic Data Security in Smart Cities Using Optimized Quantum-Based Digital Signatures and Privacy-Preserving Techniques

Main Article Content

Tuqa Ghani Tregi
Mishall Al-Zubaidie

Abstract

Securing big data in power plants is an important and fundamental step in the infrastructure of smart cities. In addition, it becomes a barrier if it is not controlled from the beginning. Security must be a combination of fast and robust properties. This research presents a traffic security system (TSS) in a smart city (SC). It is a novel paradigm meant to improve data security and integrity by means of a multilayered method. Advanced fault analysis, dual-stage pseudonymizing, quantum key distribution via the BB84 protocol, and Falcon signatures (FS) are combined in the proposed system. TSS enhances data security by enhancing privacy, supporting resilience against quantum computing threats, and not burdening the network with complex and large keys. The proposed system has been tested against several recently known attacks, such as replay, supply chain, Sybil, blackhole, eavesdropping, advanced persistent threat (APT), tampering, ransomware identity fraud, and desynchronization, and it has been proven to overcome them. In terms of performance evaluation, the average signing time was approximately 0.002 milliseconds. In comparison, the average signature verification time was approximately 0.004 milliseconds, with an average execution time of approximately 0.54 milliseconds and a precision of approximately 93.6 %, a recall of approximately 97.8 %, and an F1_score of approximately 95.6 %, which are considered low compared with those of state-of-the-art research. Thus, the proposed TSS system is highly acceptable for power plant applications. This work lays the groundwork for future developments in safe, privacy-conscious urban systems by presenting a multilayered approach to secure energy data in smart cities.

Article Details

Section

Articles

How to Cite

Enhancing Traffic Data Security in Smart Cities Using Optimized Quantum-Based Digital Signatures and Privacy-Preserving Techniques (T. G. . Tregi & M. . Al-Zubaidie , Trans.). (2025). Mesopotamian Journal of CyberSecurity, 5(1), 256-272. https://doi.org/10.58496/MJCS/2025/017

References

[1] M. Imran, A. B. Altamimi, W. Khan, S. Hussain, and M. Alsaffar, "Quantum cryptography for future networks security: A systematic review," IEEE Access, 2024. Available: https://doi.org/10.1109/ACCESS.2024.3504815.

[2] W. A. Jebbar, R. H. Razzaq, D. H. Tahayur, and M. Al-Zubaidie, "Blockchain and cryptography framework of e-apps with big data," Journal of Education for Pure Science-University of Thi-Qar, 14(3), 2024. Available: https://doi.org/10.32792/jeps.v14i3.545.

[3] K. Ahmad, M. Maabreh, M. Ghaly, K. Khan, J. Qadir, and A. Al-Fuqaha, "Developing future human-centered smart cities: Critical analysis of smart city security, data management, and ethical challenges," Computer Science Review, vol. 43, p. 100452, 2022. Available: https://doi.org/10.1016/j.cosrev.2021.100452.

[4] A. R. Javed, F. Shahzad, S. ur Rehman, Y. B. Zikria, I. Razzak, Z. Jalil, and G. Xu, "Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects," Cities, vol. 129, p. 103794, 2022. Available: https://doi.org/10.1016/j.cities.2022.103794.

[5] R. H. Razzaq, M. Al-Zubaidie, and R. G. Atiyah, "Intermediary decentralized computing and private blockchain mechanisms for privacy preservation in the Internet of medical things," Mesopotamian Journal of CyberSecurity, 4(3), 152-165, 2024. Available: https://doi.org/10.58496/MJCS/2024/020.

[6] R. Sánchez-Corcuera, A. Nuñez-Marcos, J. Sesma-Solance, A. Bilbao-Jayo, R. Mulero, U. Zulaika, G. Azkune, and A. Almeida, "Smart cities survey: Technologies, application domains and challenges for the cities of the future," International Journal of Distributed Sensor Networks, vol. 15, no. 6, 2019. Available: https://doi.org/10.1177/1550147719853984.

[7] S. Siddiqui, S. Hameed, S. A. Shah, A. K. Khan, and A. Aneiba, "Smart contract-based security architecture for collaborative services in municipal smart cities," Journal of Systems Architecture, vol. 135, 2023. Available: https://doi.org/10.1016/j.sysarc.2022.102802.

[8] D. H. Tahayur, and M. Al-Zubaidie, "Establishing an optimized searching approach with e-signatures based on blockchain for electronic agriculture applications," In AIP Conference Proceedings (Vol. 3264, No. 1). AIP Publishing, March 2025. Available: https://doi.org/10.1063/5.0258784.

[9] M. Al-Zubaidie, and W. A. Jebbar, "Providing security for flash loan system using cryptocurrency wallets supported by XSalsa20 in a blockchain environment," Applied Sciences, 14(14), 6361, 2024. Available: https://doi.org/10.3390/app14146361.

[10] D. Kales and G. Zaverucha, "An attack on some signature schemes constructed from five-pass identification schemes," in Lecture Notes in Computer Science, Cham: Springer International Publishing, 2020. Available: https://doi.org/10.1007/978-3-030-65411-5_1.

[11] R. Chen, Y. Li, Y. Yu, H. Li, X. Chen, and W. Susilo, "Blockchain-based dynamic provable data possession for smart cities," IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4143–4154, 2020. Available: https://doi.org/10.1109/JIOT.2019.2963789.

[12] E. Ismagilova, L. Hughes, and N. P. Rana, "Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework," Inf Syst Front, 24, 393–414, 2022. https://doi.org/10.1007/s10796-020-10044-1.

[13] K. Ahmad, M. Maabreh, M. Ghaly, K. Khan, J. Qadir, and A. Al-Fuqaha, "Developing future human-centered smart cities: Critical analysis of smart city security, data management, and ethical challenges," Computer Science Review, vol. 43, p. 100452, 2022. Available: https://doi.org/10.1016/j.cosrev.2021.100452

[14] F. Al-Turjman, H. Zahmatkesh, and R. Shahroze, "An overview of security and privacy in smart cities' IoT communications," Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, p. e3677, 2022. Available: https://doi.org/10.1002/ett.3677.

[15] F. S. Gharehchopogh, "Quantum-inspired metaheuristic algorithms: comprehensive survey and classification," Artif Intell Rev 56, 5479–5543, 2023. https://doi.org/10.1007/s10462-022-10280-8.

[16] N. J. Mohammed, "Quantum cryptography in convolution neural network approach in smart cities," Journal of Survey in Fisheries Sciences, vol. 10, no. 2S, pp. 2043–2056, 2023. Available: https://doi.org/10.17762/sfs.v10i2S.1105.

[17] G. R. Figlarz and F. P. Hessel, "Enhancement in LoraWAN’s security with post-quantum key encapsulation method," 2024 IEEE 10th World Forum on Internet of Things (WF-IoT), Ottawa, ON, Canada, 2024, pp. 804-809, http://doi.org/10.1109/WF-IoT62078.2024.10811133.

[18] D. Das, P. Chaterjee, U. Ghosh, and B. Blakely, "Secure and privacy aware data sharing approach for smart electric vehicles," IEEE Consumer Electronics Magazine, 2025. Available: https://doi.org/10.1109/MCE.2025.3529398.

[19] H. Y. Peivandizadeh, B. Adarbah, A. Molavi, A. Mohajerzadeh, and A. H. Al-Badi, "A secure key exchange and authentication scheme for securing communications in the Internet of Things environment," Future Internet, vol. 16, no. 10, p. 357, 2024. Available: https://doi.org/10.3390/fi16100357.

[20] M. Yazdi, J. Mohammadpour, H. Li, H. Z. Huang, E. Zarei, R. G. Pirbalouti, and S. Adumene, "Fault tree analysis improvements: A bibliometric analysis and literature review," Quality and Reliability Engineering International, 39(5), 1639-1659, 2023.

[21] A. Abdulhamid, S. Kabir, I. Ghafir, and C. Lei, "Quantitative failure analysis for IoT systems: an integrated model-based framework," International Journal of System Assurance Engineering and Management, pp. 1–23, 2025. Available: https://doi.org/10.1007/s13198-024-02700-5.

[22] S. M. Nicoletti, E. M. Hahn, and M. Stoelinga, "BFL: A logic to reason about fault trees," in 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 441–452, 2022. Available: https://doi.org/10.1109/DSN53405.2022.00051.

[23] J. Heaton, "'Pseudonyms are used throughout’: A footnote, unpacked," Qualitative Inquiry, vol. 28, no. 1, pp. 123–132, 2022. Available: https://doi.org/10.1177/10778004211048379.

[24] R. Tandon and P. K. Gupta, "A novel pseudonym assignment and encryption scheme for preserving the privacy of military vehicles," Defence Science Journal, vol. 71, 2021. Available: https://doi.org/10.14429/dsj.71.15534.

[25] M. Mehic, L. Michalek, E. Dervisevic, P. Burdiak, M. Plakalovic, J. Rozhon, and M. Voznak, "Quantum cryptography in 5G networks: a comprehensive overview," IEEE Communications Surveys & Tutorials, 2023. Available: https://doi.org/10.1109/COMST.2023.3309051.

[26] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, "The security of practical quantum key distribution," Reviews of Modern Physics, vol. 81, no. 3, pp. 1301–1350, 2009. Available: https://doi.org/10.1103/RevModPhys.81.1301.

[27] D. H. Tahayur, and M. Al-Zubaidie, "Enhancing electronic agriculture data security with a blockchain-based search method and e-signatures," Mesopotamian Journal of CyberSecurity, 4(3), 1-21, 2024. Available: https://doi.org/10.58496/MJCS/2024/012.

[28] E. Karabulut and A. Aysu, "A hardware-software co-design for the discrete Gaussian sampling of falcon digital signature," in 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 90–100, 2024. Available: https://doi.org/10.1109/HOST55342.2024.10545399.

[29] C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," in *Proceedings of the fortieth annual ACM symposium on Theory of computing*, pp. 197–206, 2008. Available: https://doi.org/10.1145/1374376.1374407.

[30] Y. Kim, J. Song, and S. C. Seo, "Accelerating FALCON on ARMv8," IEEE Access, vol. 10, pp. 44446–44460, 2022. Available: https://doi.org/10.1109/ACCESS.2022.3169784.

[31] M. Vidaković and K. Miličević, "Performance and applicability of post-quantum digital signature algorithms in resource-constrained environments," Algorithms, vol. 16, no. 11, p. 518, 2023. Available: https://doi.org/10.3390/a16110518.

[32] P. A. Fouque, J. Hoffstein, P. Kirchner, V. Lyubashevsky, T. Pornin, T. Prest, and Z. Zhang, "FALCON: Fast-Fourier lattice-based compact signatures over NTRU, Specification v1. 2," NIST Post-Quantum Cryptography Standardization Round, vol. 3, 2020.

[33] Y. Kim, J. Song, and S. C. Seo, "Accelerating FALCON on ARMv8," IEEE Access, vol. 10, pp. 44446–44460, 2022. Available: https://doi.org/10.1109/ACCESS.2022.3169784.

[34] M. Keerthika and D. Shanmugapriya, "Wireless sensor networks: Active and passive attacks-vulnerabilities and countermeasures," Global Transitions Proceedings, vol. 2, no. 2, pp. 362–367, 2021. Available: https://doi.org/10.1016/j.gltp.2021.08.045.

[35] M. Al-Zubaidie and W. Jebbar, "Transaction security and management of blockchain-based smart contracts in e-banking-employing microsegmentation and yellow saddle Goatfish," Mesopotamian Journal of CyberSecurity, vol. 4, no. 2, pp. 1–19, 2024. Available: https://doi.org/10.58496/MJCS/2024/005.

[36] B. Saha, M. M. Hasan, N. Anjum, S. Tahora, A. Siddika, and H. Shahriar, "Protecting the decentralized future: An exploration of common blockchain attacks and their countermeasures," arXiv preprint, 2023. Available: https://doi.org/10.48550/arXiv.2306.11884.

[37] M. Al-Zubaidie and R. A. Muhajjar, "Integrating trustworthy mechanisms to support data and information security in health sensors," Procedia Computer Science, vol. 237, pp. 43–52, 2024. Available: https://doi.org/10.1016/j.procs.2024.05.078.

[38] S. Mollajafari and K. Bechkoum, "Blockchain technology and related security risks: Towards a seven-layer perspective and taxonomy," Sustainability, vol. 15, no. 18, p. 13401, 2023. Available: https://doi.org/10.3390/su151813401.

[39] G. S. Shyaa, and M. Al-Zubaidie, "Securing transactions using hybrid cryptography in e-commerce apps," Journal of Education for Pure Science-University of Thi-Qar, 13(3), 2023. Available: https://doi.org/10.32792/jeps.v13i3.357.

[40] M. A. León Chávez, and F. Rodríguez Henríquez, "Post-quantum digital signature for the mexican digital invoices by Internet," Computación y Sistemas, 25(4), 729-737, 2021.‏ Available: https://doi.org/10.13053/cys-25-4-4048.

[41] R. Flores-Carapia, V. M. Silva-García, and M. A. Cardona-López, "A chaotic digital signature algorithm based on a dynamic substitution box," Scientific Reports, 15(1), 2435, 2025. https://doi.org/10.1038/s41598-024-83943-x.

[42] A. Adu-Kyere, E. Nigussie, and J. Isoaho, "Quantum key distribution: Modeling and simulation through BB84 protocol using python3," Sensors, 22(16), 6284, 2022.

[43] M. Saračević, S. Adamović, M. Maček, M. Elhoseny, and S. Sarhan, "Cryptographic keys exchange model for smart city applications," IET Intelligent Transport Systems, vol. 14, no. 11, pp. 1456–1464, 2020. Available: https://doi.org/10.1049/iet-its.2019.0855.

[44] T. Sharma, M. R. Kumar, S. Kaushal, D. Chaudhary, and K. Saleem, "Privacy aware post quantum secure ant colony optimization ad hoc on-demand distance vector routing in intent based Internet of vehicles for 5G smart cities," IEEE Access, pp. 110391–110399, 2023. Available: https://doi.org/10.1109/ACCESS.2023.3311515.

[45] H. Shahid, H. Ashraf, H. Javed, M. Humayun, N. Z. Jhanjhi, and M. A. AlZain, "Energy optimised security against wormhole attack in IoT-based wireless sensor networks," Computational Materials Continuum, vol. 68, no. 2, pp. 1967–1981, 2021. Available: https://doi.org/10.32604/cmc.2021.015259.

[46] R. D. Prasad, and M. Srivenkatesh, "A hybrid model combining graph neural networks, reinforcement learning, and autoencoders for automated code refactoring and optimization," Journal of Theoretical and Applied Information Technology, 103(1), 2025.

[47] J. H. Namdar and J. F. Yonan , Trans., “Revolutionizing IoT Security in the 5G Era with the Rise of AI-Powered Cybersecurity Solutions”, BJIoT, vol. 2023, pp. 85–91, Nov. 2023, doi: 10.58496/BJIoT/2023/011.

[48] M.. Abotaleb, E.-S. M. El-kenawy, and K. . Dhoska, “Deep Learning-Based Time Series Forecasting: A Convolutional Neural Network Approach for Predicting Inflation Trends”, EDRAAK, vol. 2025, pp. 19–28, Jan. 2025, doi: 10.70470/EDRAAK/2025/004.