You are currently on the new version of our website. Access the old version .
SensorsSensors
  • Article
  • Open Access

6 January 2026

Secure TPMS Data Transmission in Real-Time IoV Environments: A Study on 5G and LoRa Networks

,
and
1
Department of Computer Science and Engineering, Amrita School of Computing, Amrita Vishwa Vidyapeetham, Bengaluru 560035, India
2
Department DISIM and Centre Ex-EMERGE, University of L’Aquila, Via Vetoio 1, 67100 L’Aquila, Italy
*
Authors to whom correspondence should be addressed.
This article belongs to the Section Internet of Things

Abstract

The advancement of Automotive Industry 4.0 has promoted the development of Vehicle to Vehicle (V2V) and Internet of Vehicles (IoV) communication, which marks the new era for intelligent, connected and automated transportation. Despite the benefits of this metamorphosis in terms of effectiveness and convenience, new obstacles to safety, inter-connectivity, and cybersecurity emerge. The tire pressure monitoring system (TPMS) is one prominent feature that senses tire pressure, which is closely related to vehicle stability, braking performance and fuel efficiency. However, the majority of TPMSs currently in use are based on the use of insecure and proprietary wireless communication links that can be breached by attackers so as to interfere with not only tire pressure readings but also sensor data manipulation. For this purpose, we design a secure TPMS architecture suitable for real-time IoV sensing. The framework is experimentally implemented using a Raspberry Pi 3B+ (Raspberry Pi Ltd., Cambridge, UK) as an independent autonomous control unit (ACU), interfaced with vehicular pressure sensors and a LoRa SX1278 (Semtech Corporation, Camarillo, CA, USA) module to support low-power, long-range communication. The gathered sensor data are encrypted, their integrity checked, source authenticated by lightweight cryptographic algorithms and sent to a secure server locally. To validate this approach, we show a three-node exhibition where Node A (raw data and tampered copy), B (unprotected copy) and C (secure auditor equipped with alerting of tampering and weekly rotation of the ID) realize detection of physical level threats at top speeds. The validated datasets are further enriched in a MATLAB R2024a simulator by replicating the data of one vehicle by 100 virtual vehicles communicating using over 5G, LoRaWAN and LoRa P2P as communication protocols under urban, rural and hill-station scenarios. The presented statistics show that, despite 5G ultra-low latency, LoRa P2P consistently provides better reliability and energy efficiency and is more resistant to attacks in the presence of various terrains. Considering the lack of private vehicular 5G infrastructure and the regulatory restrictions, this work simulated and evaluated the performance of 5G communication, while LoRa-based communication was experimentally validated with a hardware prototype. The results underline the trade-offs among LoRa P2P and an infrastructure-based uplink 5G mode, when under some specific simulation conditions, as opposed to claiming superiority over all 5G modes. In conclusion, the presented Raspberry Pi–MATLAB hybrid solution proves to be an effective and scalable approach to secure TPMS in IoV settings, intersecting real-world sensing with large-scale network simulation, thus enabling safer and smarter next-generation vehicular systems.

1. Introduction

The global automotive sector is in the midst of a wholesale transformation driven by digitization, connectivity and automation. In the last two decades, vehicles have become more than just mechanical devices that carry people or goods; they are now intelligent machines with cyber-physical systems and are able to perceive, decide and communicate in real time. This revolution, or what we refer to as Automotive Industry 4.0, brings the intersection of embedded electronics, wireless networking, cloud computing and artificial intelligence into every vehicle manufactured today. Whereas it used to be a self-contained mechanical apparatus, it now acts as a node in a sprawling network of connected data.
The market growth of the global Internet of Vehicles (IoV) has shown significant expansion. The market is estimated to expand from USD 173.90 billion in 2024 to USD 972.59 billion by 2032, at a Compound Annual Growth Rate (CAGR) of 24% throughout the forecast period. Asia Pacific occupied the majority of the market share, with 38.95% [1,2]. At the core of this development is the IoV, which consists of three primary network domains:
(1)
A vehicular mobile internet that enables vehicles to communicate with cloud infrastructure, roadside units, and mobility management services.
(2)
An intra-vehicular network that connects sensors, ECUs, and actuators inside each vehicle.
(3)
An inter-vehicle network that accommodates direct V2V communication for cooperative sensing and collision avoidance.
These layers combine to create a flexible structure for self-driving, predictive diagnostics, over-the-air updates and fleet management. This architecture is evolving with the car as an element of the universal web—along with volumes of terabytes/day being produced and consumed [1,3].
The never-before-seen digital convergence also brings about deep challenges. Each new sensor, Electronic Control Unit (ECU) and communication interface is a potential open door for a hacker or offensive code. A single compromised node may disseminate the false information throughout the entire network, leading to wrong control decisions or privacy loss. Vehicle safety today, in other words, has as much to do with the integrity of digital data as it does with the soundness of its metal. Growing reliance on control by software (for example, key safety functions such as braking, steering and stability management) results in a possible accident or malfeasance with respect to data communication, leading directly to hazardous situations [4,5].
The complexity is evident in the modern vehicle design. A modern vehicle includes, on average, 70 to 150 ECUs that are used to manage a particular system (powertrain, infotainment, climate control, or driving assistance). These are usually software-enabled controllers and have separate firmware, microcontroller and communication interfaces. This modular architecture is solid for flexibility and scalability, but it also increases the possible attack surface. A dedicated protocol is normally used for each of the ECUs—such as CAN, LIN, FlexRay, or automotive Ethernet—however, these networks are only lightweight and isolated. If an attacker can compromise one ECU, for example, through infotainment or telematics, they might be able to move across internal buses towards safety-critical ECUs such as steering and brakes [6,7].
This heterogeneity and distribution of control and communication provide fertile ground for manipulation, although it is often necessary for functionality. Several high-profile automotive cyber-attacks have resulted in wireless ECU remote exploitation; hence, the motivation for common encryption, intrusion detection and authenticated inter-controller communication [8].
In such an interlinked control ecosystem, the state of health of the tire remains a crucial safety parameter. The tires are the only thing between the vehicle and the road, so they directly impact traction, braking effectiveness and stability. Especially in emergency stopping applications, any variation can increase stopping distance and risk of skidding or a possible accident. Research indicates that a lot of tire-related accidents result from communication mistakes or pressure monitoring system delays, and not mechanical failure. False or manipulated sensor data that is fed to the vehicle control algorithms can result in dangerous reactions—especially in semi-autonomous cars, where sensor fusion is a condition of judgment [9].
Traditional TPMS sends data value from the sensors to the ECU or dashboard in a low-power RF module. The problem is that those transmissions are rarely encrypted and rarely authenticated, making it easy for an adversary to both eavesdrop (passive) or tamper with (active) packets using a cheap receiver. Such an alteration could result in false alarms, covering up important errors, or revealing individual sensor constants that can be related to particular vehicles. In interconnected IoV networks, where TPMS data are distributed to mobile applications or cloud dashboards, these vulnerabilities may become vehicle-centric security threats. As a consequence, TPMS is no longer relegated to being just a maintenance sub-system but rather an attack surface within the larger realm of IoV [7,10].
While TPMS information may seem light and not critical, untrusted access to this telemetry can support vehicle profiling, driving behavior inference and development of targeted replay or spoofing attacks. In today’s systems, TPMS data can be received and processed by mobile applications, cloud dashboards, or driver assistance software, so confidentiality is an important need in addition to integrity and authentication. Thus, the encryption is required to protect from passive eavesdropping, context information and building of malicious injection patterns.
Extending our prior physical-access security architecture, this proposed work assures the integrity of inter-vehicle communication and vehicle-embedded controllers via USB-based authorizations. Only the authenticated hardware tokens could act as triggers or modifiers for essential vehicle functions, which served as a secure foundation to protect the physical link from unauthorized access. This article advances this notion into a full-fledged secure communication infrastructure for TPMS and inter-vehicle telemetry, and brings attention to encrypted data exchange semantics in conjunction with integrity verification considerations, as well as scalability analysis under diverse communication media.
In this paper, a secure edge node for IoV in the form of Raspberry Pi 3B+ combined with LoRaSX1278 transceivers is realized to gather and send tire-pressure/temperature information. Every transmission frame is encrypted by AES-128 and is authenticated, making the MAC proof against eavesdropping or tamper attacks. Real-time encrypted data collected from the physical test-bed is then imported into a MATLAB-based V2X simulation architecture representing a single vehicle node to propagate it to one hundred virtual vehicles. The simulator models urban, rural, and hilly terrains, thus enabling the comparison of 5G with LoRaWAN and LoRa Peer-to-Peer (P2P) technologies while simulating the same type of attack and load [11,12].
Through the high integration of low-power telemetry, the validation of edge communication security through encryption and by reusing the access control enforcement employed, this study demonstrates a unified and scalable solution for securing tire pressure data and autonomous control units for Connected and Autonomous Vehicles (CAVs). This work exhibits that, by strengthening a single small system such as TPMS, we can substantially advance toward the ultimate goal that is resilient, secure and trustworthy vehicle-to-vehicle communication in the smart IoV world.
It is also important to mention that this work is not intended to reproduce the mechanical limitations or packaging constraints of commercial wheel-mounted TPMS devices. Instead, the platform introduced here is a research-based secure TPMS telemetry framework that can be used to study end-to-end encryption and authentication, as well as the resilience of attacks in IoV communication pipelines. This paper does not concern product-level mechanical integration, but rather focuses on data security, communication reliability and large-scale IoV behavior.
Unlike in our past works, this work centers on ensuring physical-layer security for end-to-end encryption-based TPMS telemetry data. It involves AES-HMAC encryption on the sensor and edge layers and also includes a 5G, LoRaWAN, and LoRa P2P IoV simulation environment.
The main contributions of this article are as follows:
  • We propose a unified secure TPMS communication framework that integrates real-time tire-pressure data acquisition with encrypted LoRa-based transmission for the Internet of Vehicles. The system uses a Raspberry Pi 3B+ and LoRa SX1278 modules implementing AES-128 encryption and HMAC authentication to ensure confidentiality, integrity, and authenticity of tire-pressure telemetry against interception, replay, and tampering attacks.
  • Extending our prior work, a physical access security architecture is proposed where the integrity of inter-vehicle communication and vehicle-embedded controllers via USB-based authorizations is assured. USB-based physical access authorization is included to secure wireless communication between vehicular units. The proposed framework unifies physical and cyber-layer protection, ensuring that both autonomous control units and inter-vehicle data links remain secure from unauthorized access and physical tampering within the IoV ecosystem [13].
  • A cross-domain experimental and simulation-based evaluation is performed by integrating encrypted real-time TPMS data into a MATLAB V2X simulation that scales to one hundred virtual vehicles operating in urban, rural, and hill environments. Comparative analysis across 5G, LoRaWAN, and LoRa P2P networks demonstrates that secure LoRa P2P achieves the highest packet-delivery reliability, energy efficiency, and resilience under attack conditions [14,15].
The rest of this article is structured as follows. Section 2 reviews the related work. Section 3 describes the proposed model’s components in detail. Section 4 outlines the experimental setup and the evaluation of experimental results. Lastly, Section 5 provides the main conclusions and directions for future research.

3. Proposed Methodology

This section describes the overall design of the proposed secure TPMS and IoV communication framework, as shown in Table 2. The implementation integrates hardware-level sensing, encrypted serial communication, and low-power wireless data transmission, followed by MATLAB-based simulation for large-scale performance evaluation.
Table 2. Summary of the three evaluation areas and corresponding experimental setup.

3.1. System Overview

Figure 1 illustrates the proposed architecture with three major components.
Figure 1. Proposed system architecture.
  • A sensing and acquisition unit implemented on an STM32 Nucleo-L4R5ZI microcontroller.
  • An Autonomous Control Unit implemented on a Raspberry Pi 3B+ that performs encryption and LoRa transmission.
  • A remote Raspberry Pi-LoRa receiver node that collects, verifies, and forwards data for analysis.
The experimental and simulation evaluation framework is outlined as follows.
A comprehensive assessment of the designed secure TPMS architecture is achieved by three complementary evaluations, which include embedded hardware verification in addition to multi-node security analysis and large-scale IoV simulation. Table 2 lists the evaluation areas together with their target and experimental settings. Such a systematic methodology guarantees the validation for the proposed framework on both real real-world embedded environment and a scalable network condition.
The tabled evaluation structure promotes openness and reproducibility by clearly specifying the used hardware, communication properties, security features, as well as simulation settings for each step of the analysis. This architecture allows for consistent comparison between various communication technologies and deployment scenarios.
The working principle is as follows: the air-pressure values of four tires are monitored using HX710B pressure differential sensors connected to an STM32 controller. The readings are processed and formatted, and is transmitted through the UART to the ACU. Raspberry Pi ACU Encrypts input frames using AES-128 (Advanced Encryption Standard) in CBC mode and appends an HMAC-SHA256 (Hash-based Message Authentication Code using SHA-256) tag for integrity. The encrypted data is then transmitted via LoRa SX1278 (Semtech) to a remote receiver node for storage, display and synchronization in MATLAB. This multi-stage process has the advantage that both wired and wireless links become protected against tampering, replay, or spoofing attacks.

3.2. Hardware Architecture

TPMS Control Unit

The sensing layer is based on the STM32 Nucleo-L4R5ZI (STMicroelectronics, Geneva, Switzerland) board, which also acts as the controller of the TPMS. The pressure of each tire is sensed by 4 HX710B digital air-pressure sensors (AVIA Semiconductor (Xiamen) Co., Ltd., Xiamen, China). The HX710B sensor offers high-resolution 24-bit digital output, thus allowing very small differential voltage changes on tire-pressure sensing elements to be quantified accurately. For low-voltage automotive applications, such a high ADC resolution becomes mandatory to minimize the effect of quantization noise and thus of SNR (Signal-to-Noise Ratio), to allow accurate pressure measurements without employing high-gain analog amplification. This enables sensing to be achieved with high reliability, while keeping power consumption and measurement precision low.
A differential voltage for tire pressure is supplied by every sensor. The sensors are connected to the STM32 via GPIO and analog input channels utilizing HX710B serial data (DOUT) and clock (PD_SCK) pins. The STM32 requests a sensor conversion and reads the digital output at 10 samples per second.
High-frequency tire-induced noise or road roughness is attenuated by a simple finite impulse response (FIR) filter. The pressure readings are then translated into a normalized unit (PSI or kPa) and embedded with their timestamp and sensor identifier.
The STM32 outputs a telemetry frame with the following structure:
D f r a m e = [ I D , P 1 , P 2 , P 3 , P 4 , T s ]
where P i is the air pressure of tire i, and T s is the timestamp.
The ID is a pseudonym that allows sensor data to be mapped to its authentic source while offering privacy-by-design. It includes authentication, replay protection and key mapping, and periodically changes to block long-term tracking.

3.3. Data Transmission via UART Interface

The STM32 sends data to the Raspberry Pi using a UART serial connection (TX, RX, GND). The baud rate was set to 115,200 bps to minimize delay and guarantee the reliable transmission of a 64-byte data frame.
For frame delimiter detection, an end-byte and a start byte are used on every payload/datagram transmission. For the high-level communication interface, UART is used due to its simplicity and low power, as well as its native support on STM32 and Raspberry Pi. The STM32 performs light coverage checksums on each frame before transmission for local integrity to reduce errors caused by noise in the UART channel.
The frame structure sent is given below:
U A R T f r a m e = [ STX , D f r a m e , CHK , ETX ]
Wherein Dframe serves as a sensor data payload sent from the STM32 to the Raspberry Pi. It includes a full set of tire-pressure readings plus the vehicle’s temporary identifier and timestamp, STX and ETX are start/end delimiters, and CHK is a 1-byte XOR checksum.

3.4. Autonomous Control Unit

The intelligent gateway and main processing unit (ACU) is the Raspberry Pi 3B+.
It performs three primary operations:

3.4.1. Decryption and Pre-Processing

The ACU reads serial data from the STM32, validates a checksum, and reconstructs structured data fields (pressures, time stamp, node ID).

3.4.2. Encryption and Authentication

The payload is encrypted with AES-128 Cipher Block Chaining (CBC) to prevent data sniffing.
C t = A E S K e ( D f r a m e I V )
Here, I V is a random initialization vector per session, K e being the symmetric key exchanged between sender and receiver. Then a HMAC-SHA256 tag is computed for message integrity/authenticity:
H = HMAC K h ( C t )
ACU adds an encrypted transmission frame at last:
F t x = [ I V , C t , H ]

3.4.3. Wireless Transmission via LoRa SX1278

The encrypted frame is written on the SPI to the LoRa transceiver. The conventional LoRa modulation (SF = 9, BW = 125 kHz) is adopted to achieve reliable and long-range communication with low power consumption.
LoRa P2P mode (peer to peer) frees users from the need for gateways and leads to lower latency and higher robustness in infrastructure-free IoV scenarios.

3.5. Remote LoRa Receiver

The second Raspberry Pi 3B+ carrying an SX1278 LoRa module decodes the received encrypted transmission frame. After receipt, the packet passes through the following validation and recovery steps:
  • HMAC Verification: The recipient recalculates the HMAC with shared integrity key K h . If the computed tag H’ is not equal to the received tag H, the packet is discarded as tampered:
    H H Packet Rejected ( Corrupted ) .
  • AES-128 CBC Decryption: When the HMAC is valid, the ciphertext C t is decrypted with shared encryption key K e and received IV:
    D rec = AES K e 1 ( C t ) I V .
    Here, AES−1 is block-wise AES decryption, and the recovered plaintext block is bitwise-XORed with the corresponding IV (previous ciphertext block in the case of subsequent ones) according to CBC mode.
    After decryption, the receiver reconstructs the original frame:
    D r e c = [ I D , P 1 : P 4 , T s ] .
    Only those frames that pass integrity and decryption checks are routed for display, storage, and MATLAB alignment.
    Once verified, the frame is stored locally in CSV format and sent through a local TCP socket for synchronization with the MATLAB V2X simulator for visualization, attack injection, and large-scale replay.

3.6. Security Framework

The model implemented by the system is multilayered for security:
  • Privacy—The UART or LoRa commands are AES-128 crypted to avoid eavesdropping.
  • Integrity/authenticity—HMAC-SHA256 will detect bit-level tampering when the data is transmitted.
  • Access Control and Authorisation—Extending our previous work on USB-based physical authorization, the encryption and LoRA modules are only enabled for authenticated hardware settings that shield the ACU against untrusted reprogramming or key cloning.
  • Anti-Replay and Session Randomization—There is a nonce N t derived from the current time in every frame to prevent replaying old messages:
    C t = AES K e ( D f r a m e N t )
    The receiver drops any packet with the same nonce and that is older.
This kind of security building helps to reduce computer load during attack prevention, both at the physical and at the network level.
The USB-based physical access technique is used during boot up or setup, not packet by packet or transmission by transmission. This serves to create a trusted cryptography context by ensuring that only physically authorized devices are permitted to load keying material and enter secure communication. With the trust being established, in this step, all subsequent data transfer transmissions of TPMS are only based on cryptographic authentication and encryption, so that continuous physical access is not necessary.
Although integrity mechanisms (e.g., message/codes) can identify data alteration, they cannot stop passive eavesdropping. The AES-128 encryption is used in our system to protect the privacy of TPMS telemetry, and is secure enough against untrusted attackers who may analyze the sensor patterns or build up an undesirable injection strategy. The chosen cryptographic primitives impose little computational and energy costs compared to wireless transmission latency, which are applicable to resource-limited TPMS nodes in embedded systems.

3.7. Cloud Synchronization and ThingSpeak Integration

To reach over the edge level into a real-time cloud monitoring system, an encrypted data synchronization interface between the work and ThingSpeak server will be incorporated in the proposed solution. ThingSpeak is a cloud service for IoT devices and sensors that allows easy data aggregation, analysis and visualization from anywhere, at any time. It was to guarantee accessibility and visualization of tire-pressure telemetries for analysis, diagnostics, and redundancy.
Once successfully verified and decrypted at the remote Raspberry Pi receiver, the verified data frame is posted to the ThingSpeak IoT analytics platform using an HTTPS-secured REST API call. Each node is provided with a unique API key and channel ID for authenticated communication to the cloud.
The data is being sent in CSV format every 2 s and looks as follows:
T S f r a m e = [ N o d e I D , P 1 , P 2 , P 3 , P 4 , T s , I n t e g r i t y F l a g ]
Here, the Integrity_Flag tells us if the received frame was successfully verified by HMAC (1 for YES, 0 for NO).
ThingSpeak offers real-time visualization with HTTPS upload, allowing users/visitors to securely see the data in graph or chart format remotely. Color-coded graphs, as well as indicators, show the pressure values, timestamps and tamper-detection status per vehicle in the cloud dashboard.
In order to reduce the risk of data leakage, all uploads to ThingSpeak are done only after successful integrity verification and decryption at the receiver side. No untrusted sensor data is ever shared with third parties. The JSON responses at the native platform level are polled promptly by the local Raspberry Pi node to receive updates and compare anomalies.
Integration with ThingSpeak offers the following three advantages:
  • Safe Cloud Backup: Verified TPMS information is replicated to avoid permanent loss in case of local problems.
  • Remote Visualization: Pressure readings and tamper alerts can be monitored in real time using graphical indicators on the dashboard.
  • Data Sharing for MATLAB Analysis: Same ThingSpeak channel data are made available through MATLAB ThingSpeak API to easily bridge verified live dataset to the V2X simulation framework and reproduce on a large scale.
This combination fills the gap between the physical sensing and analytical levels, thereby realizing the proposed system as an actual IoV node that can perform secure data collection, identity-based communication in an authentic form, confidentiality-preserved information transmission and cloud-supported data representation.

3.8. MATLAB Simulation and Evaluation Framework

For verifying the scalability, the experimentally collected TPMS data is leveraged as input seeds for a MATLAB-based V2X simulator. The simulator models 100 vehicles in three environments (urban, rural and hill), with latency, attack probability and energy consumption parameterized from experiments.
The Matlab implementation does not consider the ideal setting of a fully saturated single-channel LoRa P2P network with all vehicles transmitting at the same time. Instead, vehicle uplink transmissions are temporally separated with random inter-packet intervals to simulate event-based telemetry and eliminate artificial channel collision. This allows for comparing relative communication reliability and security performance in similar traffic conditions rather than absolute PHY layer capacity constraints.
The simulation investigates network-level performance metrics, in terms of Packet Delivery Ratio (PDR), latency and energy consumption, for 5G, LoRaWAN and LoRa P2P technologies. In order to achieve statistically meaningful results, a Monte-Carlo simulation technique was followed. All experiments have been conducted for several independent runs with randomized vehicle mobilities, attack injection times and network conditions. Performance parameters like PDR, latency, and energy consumption, among others, were averaged over these repeated runs to avoid bias due to single-run variability. Although the performance of the TPMS scheme is experimentally verified with LoRa-based devices, testing of 5G communication is only performed using simulations. This approach is motivated by practicality for deployment, as 5G vehicular private testbeds are limited by regulation, license and infrastructure in numerous locations. Therefore, a MATLAB 5G communication module is used in order to have fair comparison and controlled results among LoRaWAN and LoRa P2P under similar traffic load, mobility models, and attack scenarios.

3.9. Workflow Summary

The presented solution provides an end-to-end secure vehicular sensor data collection and dissemination pipeline, as described in Algorithm 1. The STM32 works as a specialized detection controller, the RPi is responsible for an independent data encryption gateway, while long-distance low power transmission is realized via LoRa P2P.
Algorithm 1 Secure TPMS Data Transmission Workflow
  1:
Initialise the Sensors and UART interfaces
  2:
for each sampling interval do
  3:
   Obtain P 1 , P 2 , P 3 , P 4 from HX710B module.
  4:
   Build frame
    D f r a m e = [ ID , P 1 , P 2 , P 3 , P 4 , T s , N t ]
  5:
   Send D f r a m e to Raspberry Pi using UART
  6:
   Ciphertext frame generated: AES-128 encryption → C t
  7:
   Compute HMAC tag: H = HMAC K h ( C t )
  8:
   (LoRa-SX1278) Send { I V , C t , H }
  9:
   Receiver verifies the HMAC and decrypts C t
10:
   If condition is true, send data to MATLAB simulation
11:
end for
That is, dual cloud synchronization through ThingSpeak and MATLAB provides reliable and more in-depth analysis with confidentiality, integrity, and authenticity guarantee using the AES-HMAC method. This stacked architecture also serves as the basis for a secure, cloud-integrated IoVTPMS ecosystem, which scales from single vehicle to multi-vehicle urban deployments.

3.10. Experimental and Simulation Setup

The hardware setup, software tools, and simulation components of the proposed secure TPMS framework are detailed in this section, providing the necessary foundation to support and extend the research.
Hardware Configuration: The sensor node developed in the experiment comprises an STM32 Nucleo-L4R5ZI microcontroller connected to four HX710B differential pressure sensors for tire-pressure measurement. For wireless transmission, a Raspberry Pi 3B+ serves as an autonomous control unit (ACU), encrypts (AES-128/CBC) and message authenticates (HMAC-SHA256) the data before sending over LoRa SX1278 transceivers in peer-to-peer mode. A second Raspberry Pi–LoRa node acts as the receiver, verifying, decrypting and storing authenticated telemetry.
Software Stack: The embedded firmware for the STM32 is developed on STM’s agnostic IDE, STM32CubeIDE, with Python 3.12 services running on the Raspberry Pi performing encryption/decryption, packet verification and visualizers for dashboards and logs. The cloud synchronization and authenticated data visualization are carried out in the ThingSpeak IoT analytics platform.
Simulation and Visualization: Simulations are performed with the Matlab simulation environment, which presents 100 virtual vehicles in various environments (urban, rural and hill). The simulator uses real TPMS data obtained from a hardware testbed as a base input and compares the communication performance, attack scenario combinations and effective mitigations among 5G, LoRaWAN and LoRa P2P technologies. Real-time packet delivery, latency, power consumption and security event monitoring are provided by visual dashboards and plots.

3.11. End-to-End Secure TPMS Workflow

The entire authorized TPMS framework end-to-end workflow is described as follows: The tire-pressure values are obtained through HX710B differential pressure sensors connected to the microcontroller STM32 Nucleo-L4R5ZI. The raw sensor readings are digitized, normalised, and packaged in structured data-frame formats, including time stamps and generic vehicle identity information.
Then, the STM32 sends the framed TPMS data to a Raspberry Pi 3B+ ACU (Autonomous Control Unit) through a UART interface. At the ACU, incoming views are verified for formatting and transmitted in a manner that is secure manner. The payload is encrypted with AES-128 in CBC mode, and a message authentication code (HMAC-SHA256) is created to guarantee message integrity and source authentication.
The encrypted and authenticated payload is sent out of the device through a wireless SX1278 LoRa transceiver in P2P mode. On the receiver’s LoRa module, the received packet is re-transmitted to a second metastation on the Raspberry Pi node prior to verification using HMAC. Packets that do not pass integrity are dropped with a potential tamper attempt logged. Decrypted valid packets are recycled to a set of original TPMS measurements.
The authenticated TPMS data is logged locally in structured log files and, if desired, uploaded to a secure cloud-based analytics platform for real-time visualization and monitoring. Meanwhile, the authenticated TPMS datasets acquired from the hardware testbed are employed as base inputs of a MATLAB-based large-scale Internet of Vehicles (IoV) simulator. To this end, the simulator is used for modeling 100 vehicles in urban, rural, and hill areas to analyze the cooperation performance in terms of communication overhead, attack scenarios, as well as mitigation success under 5G and LoRaWAN and LoRa peer-to-peer.

4. Performance Evaluation

This section provides a comprehensive evaluation for the proposed secure tire Pressure Monitoring System (TPMS) architecture by coupling real-time embedded acquisition, secure LoRa-based communication and MATLAB-based large-scale vehicular simulation. The experiments aim at validating the security, dependability and performance of our framework in different network environments—5G, LoRaWAN and LoRa P2P—as well as on diversified terrains.
The global evaluation followed three incremental steps:
(1)
Real-time localhost test framework for evaluating sensor reliability and identifying manipulation attacks.
(2)
A ThingSpeak-based cloud storage service for distant data validation.
(3)
A large-scale MATLAB simulation involving 100 virtual vehicles driving on various terrains.
The experimental hardware platform implemented shows that this work is based on a previously proposed prototype implementation of the authors. Hence, some auxiliary sensors, like an ultrasonic module, are also equipped in the testbed for the consistency and context check. The subsystems are not used for tire-pressure measurement, cryptography relexamination, or comms speed testing. All the findings in this work are obtained only with HX710B TPMS sensors, and STM32–Raspberry Pi–LoRa-based telemetry pipeline.

4.1. Hardware Prototype and Secure Data Path (TX → RX)

Figure 2 presents the physical IoV testbed implemented to prototype the end-to-end TPMS pipeline before computer-intensive MATLAB simulations could be performed on a massive scale.
Figure 2. Hardware prototype for secure TPMS telemetry. (a) TX assembles sensor frames, encrypts (AES-128/CBC), authenticates (HMAC-SHA256), and transmits via LoRa P2P. Transmitter node (TX): HX710B → STM32 → Pi (ACU) → LoRa SX1278. (b) RX verifies HMAC, decrypts, and stores only validated measurements, feeding both local dashboards and cloud logging. Receiver node (RX): LoRa SX1278 → Pi (verify and decrypt) → storage/visualization. Auxiliary sensors visible in the prototype (e.g., ultrasonic modules) originate from the continuation of prior experimental research and are retained for contextual or compatibility purposes. However, they are not involved in TPMS sensing, security evaluation, or performance analysis in this study.
To obtain consistent, reliable and noise-free tire-pressure values during the experimentation, the TPMS sensing stage is realized with wired HX710B modules hooked to an STM32 microcontroller. The use of this wired connection is only for the purpose of providing reproducible ground-truth measurements and does not affect the wireless communication results. All wireless activity—encryption overhead, LoRa link performance, attack resilience and PDR—are fully dictated by the LoRa SX1278 transmission and by the MATLAB IoV simulations, thus keeping comparison with 5G, LoRaWAN and LoRa P2P unaffected by wired sensing interface.
On the transmitter side (TX), four HX710B differential pressure sensors communicate via an STM32 Nucleo-L4R5ZI with several transceiver, which interprets measurements and sends them through UART to a RaspberryPi3B+ works like the ACU.
At the ACU, each frame is encapsulated and/or wrapped in a secure envelope by performing AES-128 in CBC mode for confidentiality and computing an HMAC-SHA256 integrity tag. And further, the encryption key ( K e ) and the HMAC key ( K h ) are separate and independently generated because re-using a single key for both encryption and authentication, known as an anti-pattern in security, as it undermines message integrity and confidentiality. The resultant cipher and HMAC are sent over a LoRa SX1278 radio.
On the receiver side (RX), another Raspberry Pi (with an SX1278 module) receives packets, validates them and removes the cryptographic envelope. It also stores authenticated samples for later rendering on localhost dashboards (and optional cloud synchronization via ThingSpeak).
The wired pressure sensors HX710B are used to allow controlled and repeatable experiments in a laboratory situation. This selection permits precise emulation of TPMS data streams in conjunction with the separation of security and communication overhead from wheel-mounted commercial TPMS devices that are subjected to mechanical and power-harvesting limitations. Therefore, this prototype is not a production-ready TPMS device but a working testbed for research purposes.

End-to-End Flow (Device to Cloud)

  • Sensing and framing: HX710B measurements are aggregated on STM32 and serialized to the ACU over UART.
  • Edge protection: The ACU encrypts payloads (AES-128/CBC) and appends an HMAC-SHA256 tag bound to the plaintext and metadata (vehicle pseudonymous ID).
  • Low-power uplink: Ciphertext frames are transmitted over LoRa SX1278 (P2P) to the RX node.
  • Verification at ingress: RX checks HMAC before decrypting; any failure triggers tamper events and quarantine.
  • Persistence and visibility: Only verified samples are written to the local store, rendered on the locally exposed dashboards, and optionally synchronized four-way to ThingSpeak over HTTPS.
This Hardware-in-the-Loop (HIL) environment is used to formulate the ground-truth dataset by which we conduct analyses in the subsequent sub-sections:
(i)
Tamper behavior across Nodes A/B/C (unauthorized tamper host vs. authorized insecure vs. authorized secure)
(ii)
Cloud validation on ThingSpeak
(iii)
Performing Scaled MATLAB evaluations over 100 virtual vehicles each for 5G, LoRaWAN, and LoRa P2P through urban/rural/hills.

4.2. Baseline IoV Cross-Road Junction Simulation

The assessment is performed based on the basic MATLAB simulation model of a four-way intersection: cross-road (Figure 3). This condition is especially important for testing in the IoVs, where the arrival of a set of cars at a specific location is simulated, and TPMS messages or any other V2V messages are continually interacting. The crossbar creates a challenging environment, which includes cross-link interference (XLI), latency-sensitive packet handling and real-time safety updates.
Figure 3. Cross-road baseline scenario showing concurrent vehicle nodes communicating via 5G, LoRaWAN, and LoRa P2P links. The scenario stresses multi-node synchronization and concurrent packet exchange under dynamic load. Red circles indicate attacker vehicles or malicious events detected by the IDS/IPS engine.
Under the evaluated simulation assumptions, LoRa P2P demonstrates higher packet delivery reliability and lower energy consumption compared to the infrastructure-based 5G uplink model considered in this study. At 1200 tx’s, the LoraP2P network was able to achieve a PDR of 96.9% and, with its mitigation rate of 91%, outperformed both 5G and LoRaWAN. For 5G, the latency remains lower, while reliability was degraded due to contention and multi-hop coordination. LoRaWAN had performance issues at gateways even with moderate node density. This state-of-the-art makes LoRaP2P a valuable technology for secure V2V direct telemetry.

4.3. Localhost IoV Testbed Architecture and Tamper Evaluation

The hardware IoV testbed was designed for verifying the end-to-end performance of the proposed secure TPMS scheme against real tampering conditions before it was extended to MATLAB simulations.
As previously mentioned, 4 HX710B sensors measure tire pressure and transmit an analog output to the STM32 Nucleo-L4R5ZI board, which subsequently digitizes the captured measurement and sends it over UART to the Raspberry Pi 3B+ ACU.
The ACU encrypts the payload of each packet with AES-128 (CBC mode), calculates an HMAC-SHA256 tag for integrity, and sends the ciphertext via LoRa using an SX1278 module.
Three logical nodes were considered for analysis:
  • Node A—Compromised Host: Enters an invalid login and changes input raw data or inserts false sensor frames.
  • Node B—Known Insecure Host: Legitimately receives data, but without cryptographic proof of data validity, thus presenting authentic and tampered values.
  • Node C—Trusted Secure Host: It decrypts the AES frame, checks HMAC, highlights in red tampered frames, and the cloud prevents uploading.
The dashboards during a tampering test are shown in Figure 4. The figure illustrates the live behavior of all three nodes under attack conditions. The trusted secure host (Node C) promptly recognises the abnormality with visual notices and terminates it at the cloud side.
Figure 4. Real-time dashboards of each node. Node A allows falsified data entry, Node B reproduces corrupted readings, and Node C detects anomalies and preserves authentic values. Data marked with an asterisk (*) represents tampered or maliciously altered values.
As depicted in Figure 5, tampering with tire pressures is manually tuned to misbehave at Node A using the local developer control interface in order to simulate data tampering. The injected faults are verified by the serial console logs. As Node B cannot authenticate the received data, its dashboard shows spurious values indicating how classic ECUs without cryptographic protection can be tricked.
Figure 5. Source tampering and non-cryptographically secure replication. (a) Adjustment of tire-pressure values at Node A via local developer control interface. Data marked with an asterisk (*) represents tampered or maliciously altered values. (b) Screenshot of the Serial console output with altered sensor payloads. (c) Node B suffers from tampered pressure readings as no integrity and authenticity checking is involved.

4.4. Comparative Performance and Security Summary

Figure 6 demonstrates the robustness of the protection scheme demonstrated in this paper.
Figure 6. Protection results from the secure node. (a) Node C automatically blocks manipulated frames and raises a red alert. (b) Local tamper log confirms rejection. (c) ThingSpeak C_T records the event with timestamps and vehicle ID.
If tampering is detected after the AES–HMAC validation, Node C instantly rejects the packet.
The verified sensor values are stable, whereas the dashboard is signaled to set off an alarm.
All the incidents are recorded locally (local server) and in the cloud at the dedicated C_T channel over HTTPS for post-mortem forensics. Out of 200 tampering trials, all 100% modified packets were detected in less than one transmission cycle (<2 s). No false positives were seen, indicating that the cryptographic validation delays are low and will confirm integrity. These real-time results confirm that lightweight AES–HMAC protection is already feasible, even on low-power embedded devices, before full-scale simulations.

4.5. MATLAB-Based IoV Simulation

The validated Node C dataset is then used to extrapolate for simulating 100 vehicles over different terrains, Urban, Rural and Hill Station, which have been attacked with the same set of conditions. All simulated nodes preserved the same encryption (with AES-128 CBC), authentication, and replay protection layers.

4.5.1. Urban Environment

The urban environment, as described in Figure 7a, Figure 8a, Figure 9a and Figure 10a, emulates dense network operation (up to 60 simultaneous vehicles per km2), multi-path fading and heavy interference from infrastructure Wi-Fi and mobile-base communication systems (e.g., 3G, 4G/LTE, etc.). As shown in Figure 7a and Figure 8a, LoRaP2P achieved a 96.1% PDR, which is 9% higher than that of LoRaWAN. Jamming attacks and packet drop attacks were possible attacks in this approach because of the frequency of jamming. The mitigation ratio (Figure 10a) converged to 90%, with the help of adaptive retransmission and AES-level check.
Figure 7. Telemetry patterns of 100 vehicles across terrains. LoRa P2P maintains consistent performance with minimal latency fluctuation, even in dense or obstructed regions.
Figure 8. PDR comparison across urban, rural, and hill environments for 5G, LoRaWAN, and LoRa P2P technologies. The results reflect vehicle-to-network uplink communication performance and not intra-vehicle sensor transmission. Results correspond to controlled, non-saturated traffic conditions with temporally staggered vehicle transmissions.
Figure 9. Cumulative detection plots. Each rise corresponds to a detected tampering or replay attempt. The steady gradient underlines consistent detection accuracy across all terrains.
Figure 10. Attack vs. mitigation comparison. LoRa P2P consistently mitigates over 90% of attacks across all terrains, ensuring secure data exchange even under interference.

4.5.2. Rural Environment

The rural topology, sketched in Figure 7b, Figure 8b, Figure 9b and Figure 10b, included line-of-sight communication with low-fidelity noise. It is observed that the propagation delay variance increased for long-range transmissions even with a lower network density. LoRaP2P attained 99.5% PDR and sustained a constant energy cost of 1.8 mJ per packet transmission. Fewer assaults were recorded in this area; nevertheless, it still managed to identify and alleviate the spoofing and replay attempts.

4.5.3. Hill Station Environment

The hill environment (Figure 7c, Figure 8c, Figure 9c and Figure 10c) is the Non-Line-of-Sight (NLoS) propagation, reflections and shadowing. Reply and spoofing attacks have risen by a factor of 1.4 with respect to urban deployments. Despite this, LoRaP2P achieved a PDR of 99.5%, and a sustained mitigation success rate was up to 91%, whereas the PDR reduced down to 80.9% in the case of 5G because of signal blockage, as well as reliance on the cellular tower for communications.
The reported packet delivery ratio (PDR) results in this section correspond to vehicle-to-network communication, rather than intra-vehicle sensor communication. The TPMS sensors communicate locally with the vehicle edge processing units, while 5G, LoRaWAN and LoRa P2P communicate via the uplink establishment between the vehicle node and external network infrastructure.
The system performance was also tested under dynamic network load, where the number of active vehicles, packet-generation intervals and interference patterns were changed in real time to simulate a practical experienced traffic scenario (e.g., spikes of incoming transmissions when cars enter deep turns or tunnels). With such varying conditions, the data integrity performance of Node C consistently remained suitable by dropping incorrect or late-arriving packets, while Node B experienced a large drift by simply accepting every frame.
The reported PDRs are relative to a controlled traffic scenario with interleaved sending and should, therefore, be seen as systems comparatives rather than satisfying the full channel load.
The ideal characteristics of 5G in higher throughput and lower latency are well pronounced for broadband usage, but these are underutilized in TPMS-style micro-telemetry, where packet sizes are very small (<60 bytes is typical), traffic is periodic, and the communication occurs on short bursts. In such low-payload, low-duty-cycle cases, the 5G standard itself introduces a high amount of signaling overhead, mandatory control-plane interactions and network-side scheduling delays, which all bring down its effective reliability. In addition, the MATLAB 5G profile employed in this work emulates practical deployment constraints, such as next-generation Node B scheduling windows, the HARQ cycles and PRACH access delay, which also disadvantage small IoV packets with respect to the lightweight LoRa P2P protocol that does not require network attachment nor any base-station dependency or handover maintenance.
As such, 5G does not appear to be an efficient choice, not because of limitations in the technology itself, but because TPS telemetry is not well accommodated by its bandwidth-intensive design in dense or obstructed environments, resulting in performance comparable to—or even worse than—that of LoRa-based systems to date.
Thus, the results do not indicate that 5G is worse; however, in TPMS telemetry for small, energy-sensitive applications like those of this experiment, smart LoRa P2P physical layer stacks offer a more stable and efficient link than 5G with unnecessary protocol overhead and infrastructure dependency.

4.6. Attack Scenarios and Mitigation Strategies

To verify resilience, a considerable number of cyber and network-layer attacks to which IoV systems are commonly exposed were inflicted on the system. These cases were injected in both the localhost and MATLAB simulation, as in Figure 11.
Figure 11. Attack type distributions. Urban networks face higher jamming/drop attacks, while hill environments suffer from replay/spoof dominance due to propagation delay.
  • Tampering Attack:
    A attacker would modify real-time pressure information from a compromised transmitter.
    Rundown: Dashboard display lies can lead to unwanted alerts or mess up actual warnings.
    Mitigation: Verify AES + HMAC tag so that an altered bit in the ciphertext results in failed authentication. Node C immediately identifies the entrance and traps it.
  • Spoofing Attack:
    A malicious node pretends to be a legitimate node with the aid of such forged identities.
    Impact: Injection of false telemetry without consent, with content resembling that of realvehicles.
    Mitigation: It is infeasible for the attacker to forge identity, since they do not have the AES encryption key and HMAC integrity key. Without those secrets, it cannot form a packet with a correct HMAC tag and so all spoofed frames are rejected.
  • Replay Attack:
    Legitimately captured frames are later injected again to confuse the adversary.
    Implications: Incorrect or conflicting estimation prevents real-time decision-making.
    Mitigation: Nonce and sequence time validation allows for automatic dismissal of old packets.
  • Jamming Attack:
    In both LoRa-based and 5G-based vehicular links, intentional or unintentional RF interference can lead to the appearance of RF self-interference being created by neighboring devices or adversarial jammers. In 5G, scheduling in the uplink and scalable power control assist in alleviating short bursts of interference, but coverage holes and NLoS scenarios still lead to retransmissions. Compared to LoRa, which is able to achieve long-range links on sub-GHz unlicensed bands with lower transmitting powers but has vulnerability to continuous wideband noise, leading to higher packet loss and reduced QoS unless retransmission strategies or adaptive spreading factors are performed.
    Impact: High packet loss, retransmission causes, and bad QoS for the network.
    Mitigation: Despite LoRa’s frequency hopping, retransmission scheduling maintains communication reliability.
  • Drop Attack:
    The eavesdrops for the intermediate nodes, drop the packet on purpose to skew availability.
    Mitigation: Checking for sequence numbers to determine missing frames, retransmissions of lost packets until these are acknowledged.
Further, in addition to digital types of attacks, a USB-based authorization module—used in earlier works—was used to add security at the physical layer. It authenticates that only certified people can access ECU debugging or firmware downloading, thus ending the physical attack surface.

4.7. Cloud Validation on ThingSpeak (Authenticated Telemetry)

The RX node only passes validated samples to ThingSpeak over HTTPS to ensure only authenticated telemetry leaves the local network. Three channels were considered:
(i)
Node B channel (data is tampered with but viewable since no verification);
(ii)
Node C channel (verified originals only);
(iii)
Node C_T channel (tamper events/alerts). Figure 12 summarises these cloud views as given below:
Figure 12. ThingSpeak validation plots. The coloured dots represent individual tyre-pressure measurements and the connecting lines show their evolution over time (timestamped samples on the horizontal axis). (a) Node B cloud view (insecure but authorized): tampered values appear as normal due to lack of cryptographic verification. (b) Node C cloud view (secure authorized): only AES-128 + HMAC-verified measurements are uploaded. (c) Node C_T tamper stream: red/flagged points indicate rejected packets, logged with timestamps and pseudonymous vehicle IDs for audit/forensics. Minor overlaps arise from dense time-series samples but do not affect the scientific interpretation, since the quantitative analysis relies on the underlying logged data rather than visual spacing.
  • Communication integrity: NodeC only spits out messages for which HMACs denote integrity, and Node B spits out anything it receives. The difference between Figure 12a,b illustrates the security bound introduced by–HMAC gate.
  • Non-repudiation and forensics: Tamper attempts are submitted to a dedicated C_T channel along with timestamps and the weekly rotated pseudonymous vehicle ID, preserving privacy but supporting audits.
  • Strong analytics: The distinction between positive (C) and negative (C_T) telemetry value ensures that counters are not skewed while also preventing false alerts on the analyses downstream.
  • Operational controls: The TX→RX pipeline places rate limiting and durable queuing on the receiver, as a means to prevent transient issues in the network from leading directly to loss or integrity bypass.
The aggregate of localhost dashboards and ThingSpeak charts demonstrate that (1) adversarial edits made at NodeA are intercepted by the unsecure consumer (NodeB); (2) they are recognized and halted by the secure consumer (Node C) even before cloud ingress; and that (3) the policy is enforced up to the cloud level in a transparent manner, allowing only valid data to pass through while attacks are logged separately.
In a hilly scenario, sparse base-station deployment and terrain-induced shadowing—often leading to NLoS propagation—effectively affect mainly the infrastructure-dependent technologies such as 5G and lead to reduced uplink reliability despite the presence of locally wired sensor interfaces.
The overall experimental results gathered from localhost experiments, validation over ThingSpeak, and simulations in MATLAB endorse that the secure LoRa P2P pipeline provides the best tradeoff among reliability, energy consumption, and security. With low latency comes 5G, and gateway-assisted coverage is for LoRaWAN, but they are both more vulnerable to replay, spoofing, and jamming in densely populated or blocked areas. In comparison, the AES–HMAC–protected LoRa P2P approach preserves consistently high PDR in all terrains and is able to defend more than 90% injected attacks already with maximum Rx Time; it also incurs the lowest energy cost per transmission.
To summarize these findings, Table 3 presents a summary of the comparative performance across environments of 5G, LoRaWAN and LoRa P2P communication protocols and in Table 4, a comparison between General TPMS/IoV systems security with the proposed secure architecture is listed. Both these tables show the operational feasibility and advantages of the cryptographic LoRa P2P telemetry platform for future IoV safety applications.
Table 3. Performance comparison across communication technologies and environments.
Table 4. Security feature comparison: conventional vs. proposed secure TPMS framework.

5. Conclusions

While the proposed secure TPMS scheme is strong in terms of reliability, energy efficiency, and attack tolerance, it has a few limitations. The first limitation is that the 5G communication system is evaluated only by simulation, and there are no experimental-based results. This is mainly because of regulatory limitations and the unfeasibility of accessing private vehicular 5G infrastructure for large-scale prototype testing. Secondly, based on MATLAB simulations, which are used to extrapolate experimental TPMS testbed data, the literature covers the large-scale behavior of IoV. Although it facilitates controlled and repeatable testing on various environments and attack models, it may not completely capture real vehicle mobility dynamics and environmental uncertainties. Third, our current implementation concerns only TPMS telemetry; other vehicle sensors (e.g., braking and turning sensors) would also affect security and latency performance. Moreover, the hardware prototype does not accurately simulate the size, power requirement and mounting limitations that apply to wheel-mounted battery-powered TPMS sensors. These aspects are critical for commercial applications but are out of scope for this work, which emphasizes secure telemetry delivery, vehicle-to-everything (V2X) communication reliability, and attack prevention at the IoV level. The 5G communication design taken in this work is based on infrastructure-based cellular uplink and does not explicitly model C-V2X PC5 sidelink or URLLC links. Therefore, the comparisons provided in this study are physical antenna specific with reference to the chosen simulation scenarios and shall not be assumed as a general perspective for all 5G V2X communication modes.
The paper proposed a secure and energy-efficient TPMS framework serving for the connection of things purposes. The design overcomes various barriers between the sensor/capture processing, AES-128 encryption, HMAC-SHA256 authentication tags, and LoRa P2P communication channels to realize a single end-to-end security pipeline. Based on an STM32 Nucleo-L4R5ZI and Raspberry Pi 3B+ with LoRa SX1278, it guarantees secure tire data from sensing to cloud uploading.
Real-time measurements using three nodes—unauthorized (Node A), insecure authorized (Node B), and secure authorized (Node C)—proved that the framework can detect and block tampering, spoofing, and replay attacks in less than two seconds without any false positives. Simulations using MATLAB with 100 virtual vehicles also confirmed that LoRa P2P has the maximum reliability (approx 98% PDR), attack prevention (>90%), and minimum energy consumption, among urban, rural, and hill scenarios over 5G and LoRaWAN. The quantitative comparison shows that, in the context of controlled traffic and the evaluation scenario studied so far, LoRa P2P offers better security for telemetric TPMS than the infrastructure-centric 5G uplink solution under consideration in this work with respect to reliability and energy consumption.
The results show that the combination of lightweight cryptography, authenticated LoRa P2P telemetry, and secure cloud logging is promising to harden over-the-air IoV communication.As future work, the proposed framework can be enriched with AI-based intrusion detection and hybrid LoRa–5G switching to improve scalability and adaptability for next-generation autonomous driving. The presented simulation framework does not account for MAC-layer scheduling or channel contention on fully saturated LoRa P2P. Thus, the presented performance figures are to be viewed relative to other levels of performance under given traffic scenarios, not as network capacity bounds. Our future work will integrate MAC-layer contention modeling, as well as adaptive scheduling approaches and further vehicular sensors to investigate system operation under high network load and more realistic scenarios.

Author Contributions

Conceptualization, D.K.N. and M.S., methodology, D.K.N., software and implementation, D.K.N., experimental validation and simulation, D.K.N., data analysis, D.K.N. and W.T., writing—original draft preparation, D.K.N., writing—review and editing, M.S. and W.T., supervision, M.S. and W.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

The authors gratefully acknowledge Sri Mata Amritanandamayi Devi (Amma), Chancellor, Amrita Vishwa Vidyapeetham, for her inspiration and for providing financial support for the Article Processing Charges (APC) of this publication.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ACUAutonomous Control Unit
ADCAnalog-to-Digital Converter
AESAdvanced Encryption Standard
CANController Area Network
CPSCyber-Physical System
ECUElectronic Control Unit
HMACHash-Based Message Authentication Code
IoVInternet of Vehicles
LPWANLow-Power Wide-Area Network
LoRaLong Range
LoRaWANLong Range Wide Area Network
P2PPeer-to-Peer
PDRPacket Delivery Ratio
RFRadio Frequency
TPMSTire Pressure Monitoring System
TXTransmitter
RXReceiver

References

  1. Fortune Business Insights. Asia Pacific Internet of Vehicles 2019–2032; Fortune Business Insights: Pune, India, 2025. [Google Scholar]
  2. Rajagopal, S.M.; M., S.; Buyya, R. FedSDM: Federated learning based smart decision making module for ECG data in IoT integrated Edge–Fog–Cloud computing environments. Internet Things 2023, 22, 100784. [Google Scholar] [CrossRef]
  3. Tiberti, W.; Civino, R.; Gavioli, N.; Pugliese, M.; Santucci, F. A Hybrid-Cryptography Engine for Securing Intra-Vehicle Communications. Appl. Sci. 2023, 13, 13024. [Google Scholar] [CrossRef]
  4. Niranjan, D.K.; Supriya, M. Assessing Security Weakness Through IoT Sensor Data Manipulation. In Proceedings of the Hybrid Intelligent Systems, Online, 12–14 December 2023; Bajaj, A., Mishra, P.M., Abraham, A., Eds.; Springer: Cham, Switzerland, 2025; pp. 330–341. [Google Scholar]
  5. Naveed, A.; Marotta, A.; Tiberti, W.; Santucci, F.; Marco, P.D. Ensemble Learning-Based Anomaly Detection for Automotive in-Vehicle Networks. In Proceedings of the 2025 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 28–30 May 2025; pp. 18–23. [Google Scholar] [CrossRef]
  6. Muthuraman, S.; Niranjan, D.K. System and Method for Providing Emergency Healthcare Services Using IoT Integrated Smart Vehicles. Indian Patent 202541021959, June 2025. [Google Scholar]
  7. Sahana, Y.P.; Gotkhindikar, A.; Tiwari, S.K. Survey on CAN-Bus Packet Filtering Firewall. In Proceedings of the 2022 International Conference on Edge Computing and Applications (ICECAA), Tamilnadu, India, 13–15 October 2022; pp. 472–478. [Google Scholar] [CrossRef]
  8. Markovic, S. Future Security Concerns. 2025. Available online: https://www.helpnetsecurity.com/2025/04/04/cybersecurity-risks-cars (accessed on 2 January 2026).
  9. Khan, S.K.; Shiwakoti, N.; Stasinopoulos, P.; Chen, Y. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions. Accid. Anal. Prev. 2020, 148, 105837. [Google Scholar] [CrossRef] [PubMed]
  10. Jeong, S.; Ryu, M.; Kang, H.; Kim, H.K. Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux. In Proceedings of the CODASPY ’23: Thirteenth ACM Conference on Data and Application Security and Privacy, New York, NY, USA, 24–26 April 2023; pp. 201–212. [Google Scholar] [CrossRef]
  11. Pastor-Vargas, R.; Tobarra, L.; Robles-Gómez, A.; Martin, S.; Hernández, R.; Cano, J. A WoT Platform for Supporting Full-Cycle IoT Solutions from Edge to Cloud Infrastructures: A Practical Case. Sensors 2020, 20, 3770. [Google Scholar] [CrossRef] [PubMed]
  12. Xun, Y.; Deng, Z.; Liu, J.; Zhao, Y. Side Channel Analysis: A Novel Intrusion Detection System Based on Vehicle Voltage Signals. IEEE Trans. Veh. Technol. 2023, 72, 7240–7250. [Google Scholar] [CrossRef]
  13. Zhang, K.; Ni, J.; Yang, K. IoT security: Ongoing challenges and research opportunities. In Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, Japan, 17–19 November 2014. [Google Scholar]
  14. Ficzere, D.; Varga, P.; Wippelhauser, A.; Hejazi, H.; Csernyava, O.; Kovács, A.; Hegedűs, C. Large-Scale Cellular Vehicle-to-Everything Deployments Based on 5G—Critical Challenges, Solutions, and Vision towards 6G: A Survey. Sensors 2023, 23, 7031. [Google Scholar] [CrossRef] [PubMed]
  15. Noura, H.; Hatoum, T.; Salman, O.; Yaacoub, J.P.; Chehab, A. LoRaWAN security survey: Issues, threats and possible mitigation techniques. Internet Things 2020, 12, 100303. [Google Scholar] [CrossRef]
  16. Vaszary, M.; Slovacek, A.; Zhuang, Y.; Chang, S.Y. Securing Tire Pressure Monitoring System for Vehicular Privacy. In Proceedings of the 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Virtually, 9–12 January 2021; pp. 1–6. [Google Scholar] [CrossRef]
  17. Fechtner, H.; Spaeth, U.; Schmuelling, B. Smart Tire Pressure Monitoring System with Piezoresistive Pressure Sensors and Bluetooth 5. In Proceedings of the 2019 IEEE Conference on Wireless Sensors (ICWiSe), Penang, Malaysia, 19–21 November 2019; pp. 18–23. [Google Scholar] [CrossRef]
  18. Rana, M.; Mamun, Q.; Islam, R. Lightweight cryptography in IoT networks: A survey. Future Gener. Comput. Syst. 2022, 129, 77–89. [Google Scholar] [CrossRef]
  19. He, H.; Maple, C.; Watson, T.; Tiwari, A.; Mehnen, J.; Jin, Y.; Gabrys, B. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Proceedings of the 2016 IEEE Congress on Evolutionary Computation (CEC), Vancouver, BC, Canada, 24–29 July 2016; pp. 1015–1021. [Google Scholar] [CrossRef]
  20. Pranave, K.C.; Shreya Shree, S.; Reddy Challa, V.K.; Panda, N. System Search Service Implementation Based on a Custom Lexical Search. Procedia Comput. Sci. 2024, 235, 1548–1557. [Google Scholar] [CrossRef]
  21. Liu, J.; Zhang, S.; Sun, W.; Shi, Y. In-Vehicle Network Attacks and Countermeasures: Challenges and Future Directions. IEEE Netw. 2017, 31, 50–58. [Google Scholar] [CrossRef]
  22. Almehdhar, M.; Albaseer, A.; Khan, M.A.; Abdallah, M.; Menouar, H.; Al-Kuwari, S.; Al-Fuqaha, A. Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks. IEEE Open J. Veh. Technol. 2024, 5, 869–906. [Google Scholar] [CrossRef]
  23. Aissioui, A.; Ksentini, A.; Gueroui, A.; Taleb, T. On Enabling 5G Automotive Systems Using Follow Me edge-Cloud Concept. IEEE Trans. Veh. Technol. 2018, 67, 5302–5316. [Google Scholar] [CrossRef]
  24. Santos, L.; Bruschi, S.; Souza, P.; Ueyama, J.; De Jesus dos Santos, A.; Barbosa, J. Performance analysis of a Vehicular Ad Hoc network Using LoRa technology and IoT devices in Amazon Rivers. Ad Hoc Netw. 2023, 152, 103301. [Google Scholar] [CrossRef]
  25. Gutiérrez-Gómez, A.; Rangel, V.; Edwards, R.; Davis, J.; Aquino, R.; Cruz, J.; Mendoza-Cano, O.; Lopez-Guerrero, M.; Geng, Y. A Propagation Study of LoRa P2P Links for IoT Applications: The Case of Near-Surface Measurements over Semitropical Rivers. Sensors 2021, 21, 6872. [Google Scholar] [CrossRef] [PubMed]
  26. Anwar, K.; Rahman, T.; Zeb, A.; Khan, I.; Zareei, M.; Vargas-Rosales, C. RM-ADR: Resource Management Adaptive Data Rate for Mobile Application in LoRaWAN. Sensors 2021, 21, 7980. [Google Scholar] [CrossRef] [PubMed]
  27. Di Renzone, G.; Parrino, S.; Peruzzi, G.; Pozzebon, A. LoRaWAN in Motion: Preliminary Tests for Real Time Low Power Data Gathering from Vehicles. In Proceedings of the 2021 IEEE International Workshop on Metrology for Automotive (MetroAutomotive), Virtual, 1–2 July 2021; pp. 232–236. [Google Scholar] [CrossRef]
  28. Sobhi, S.; Elzanaty, A.; Selim, M.Y.; Ghuniem, A.M.; Abdelkader, M.F. Mobility of LoRaWAN Gateways for Efficient Environmental Monitoring in Pristine Sites. Sensors 2023, 23, 1698. [Google Scholar] [CrossRef] [PubMed]
  29. Al mojamed, M. On the Use of LoRaWAN for Mobile Internet of Things: The Impact of Mobility. Appl. Syst. Innov. 2022, 5, 5. [Google Scholar] [CrossRef]
  30. Sheikh, M.S.; Liang, J.; Wang, W. A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs). Sensors 2019, 19, 3589. [Google Scholar] [CrossRef] [PubMed]
  31. Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Commun. Surv. Tutorials 2015, 13, 584–616. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.