1. Introduction
Vehicular communication networks are foundational to the development of intelligent transportation systems (ITS), enabling continuous and reliable wireless communication between vehicles, infrastructure, pedestrians, and cloud services [
1,
2,
3,
4]. These networks form the technological backbone for a wide range of applications, including advanced driver-assistance systems (ADAS), real-time traffic monitoring, autonomous driving, and in-vehicle infotainment [
5,
6,
7]. With the rise of connected and automated vehicles, the demand for high-throughput, low-latency, and ultra-reliable vehicular communication has become more critical than ever [
8]. Projections indicate that, by 2030, over 75% of vehicles globally will be equipped with communication capabilities, allowing for seamless data exchange in dense urban areas, highways, and smart mobility hubs [
9,
10,
11]. Vehicular networks also serve as an essential enabler for broader smart city ecosystems, where mobility, energy, and communication systems are deeply interwoven [
12,
13,
14]. Notably, the integration of vehicular networks with smart grid infrastructure supports emerging services such as vehicle-to-grid (V2G) energy trading, electric vehicle (EV) scheduling, and energy-aware routing, fostering a sustainable and efficient transportation-energy landscape [
15,
16,
17,
18,
19].
Among the various communication paradigms, vehicle-to-vehicle (V2V) communication plays a pivotal role in realizing cooperative and decentralized driving strategies [
20,
21,
22]. V2V enables vehicles to share key information, such as velocity, position, and driving intentions, which is vital for collision avoidance, coordinated lane-merging, and real-time hazard warnings. However, despite its criticality, V2V communication faces several technical challenges that hinder its practical deployment [
23,
24,
25]. One major limitation is signal blockage due to dynamic or static obstacles such as large vehicles, buildings, or terrain irregularities, which can disrupt line-of-sight (LoS) paths and introduce severe shadowing effects [
26]. Additionally, the limited transmission range of onboard antennas becomes problematic in high-mobility and dense environments, leading to unreliable and intermittent connectivity [
27,
28,
29]. More importantly, the open nature of wireless V2V links makes them susceptible to passive eavesdropping and active attacks [
30]. Ensuring the confidentiality and integrity of V2V messages is therefore a non-trivial task that requires new physical layer techniques to enhance the resilience and security of the network without compromising latency or efficiency [
31,
32,
33,
34,
35].
With the advent of 5G and the emergence of 6G, vehicular networks are expected to undergo a transformative shift in their capabilities, achieving ultra-reliable low-latency communication (URLLC), enhanced mobile broadband (eMBB), and support for massive machine-type communications (mMTC). These technologies serve as the foundational enablers of connected and automated mobility (CAM), where V2V communication plays a central role in cross-border transportation, traffic management, and autonomous driving scenarios [
36,
37]. Moreover, 5G-V2X and 6G-V2X architectures increasingly incorporate network slicing and edge computing to manage diverse service requirements, including real-time safety and infotainment [
38]. Despite these advances, physical layer security remains crucial, as higher-layer protections alone cannot fully mitigate the eavesdropping or signal manipulation risks inherent in wireless channels. Thus, this work proposes a PLS-aware framework aligned with the trajectory of future V2X systems.
Reconfigurable intelligent surfaces (RISs) have recently emerged as a transformative technology capable of significantly improving wireless communication performance through smart propagation control [
39,
40,
41]. An RIS consists of a large number of passive, electronically tunable elements that can reflect incident radio waves with adjustable phase shifts, thereby enabling the fine-grained manipulation of the wireless environment. In the context of vehicular networks, especially V2V systems, RISs offer a practical means to overcome common limitations, such as blockage, fading, and weak direct links [
42,
43,
44]. By intelligently configuring the reflection coefficients, RISs can create alternate paths around obstacles, enhance the received signal power, and reduce interference. Furthermore, due to their nearly passive operation, RISs consume very little power, making them particularly attractive for energy-constrained deployments along roadsides or urban infrastructure. Beyond performance gains, RISs also contribute to communication security by shaping wavefronts to minimize signal leakage toward potential eavesdroppers [
45,
46,
47]. As such, RIS-assisted architectures are rapidly gaining attention for their potential to improve spectral efficiency, energy consumption, and physical layer security (PLS) in next-generation vehicular communication networks [
48,
49,
50].
1.1. Related Works
Recent research has explored the integration of RISs into vehicular networks to address various communication and security challenges. In [
51], the authors studied socially aware RIS-aided V2X networks, where the joint optimization of power allocation, spectrum management, and RIS configurations was used to maximize the sum capacity of vehicle-to-infrastructure (V2I) links while ensuring stable V2V communication. Chen et al. [
52] developed robust transmission strategies for RIS-assisted mmWave vehicular systems that rely on statistical channel state information (CSI), significantly reducing signaling overhead in high-mobility environments. Chapala and Zafaruddin [
53] analyzed the impact of vehicle mobility and phase errors on RIS channels and derived closed-form average bit error rate (BER) expressions under generalized-K fading conditions. Security concerns have also been addressed through RIS-enhanced physical layer solutions. Kavaiya and Patel [
54] derived secrecy outage probability (SOP) metrics to evaluate the effectiveness of RIS in mitigating passive attacks in 6G-enabled V2I communications. Their findings demonstrated that RIS outperforms conventional access points in terms of secrecy enhancement. In [
55], Mensi and Rawat compared partial RIS selection with partial relay selection and provided analytical expressions for ergodic and secrecy capacities. Their results indicated that partial RIS schemes are particularly advantageous in high-mobility vehicular environments. The work in [
56] investigated both V2V and V2I links in RIS-assisted networks, confirming through closed-form SOP analysis that RIS can strengthen secrecy to protect against passive eavesdropping. Similarly, [
57] studied two scenarios involving eavesdropper proximity and RIS orientation, evaluating SOP and average secrecy capacity (ASC) for each case.
In [
58], the authors examined a secure STAR-RIS-aided NOMA network under both full and statistical CSI assumptions, formulating problems to jointly maximize the sum rate and minimize the SOP. A multi-RIS architecture was explored in [
59] to improve user coverage and quality-of-service (QoS), where approximate closed-form outage and capacity metrics were derived using the central limit theorem (CLT). In [
60], the authors formulated an optimization problem to minimize the mean square error (MSE) in multi-RIS systems, accounting for timing and phase distortions. Phan et al. [
61] analyzed symbol error probability (SEP) under Nakagami-
m fading in multi-RIS-assisted scenarios with direct transmitter–receiver links, showing performance gains compared to single-antenna setups. Further, the benefits of RIS diversity were examined in D2D-NOMA systems under Rician fading in [
62], where multi-RIS architectures significantly outperformed single-RIS counterparts in outage and throughput. A UAV-based transmitter setup was considered in [
63], where compact expressions for outage probability (OP) and achievable data rate (ADR) were obtained for RIS-aided NOMA links. Lastly, Tran et al. [
64] studied multi-RIS systems in the presence of hardware impairments, deriving expressions for OP, SEP, ADR, and throughput under Nakagami-
m fading, further confirming the resilience and utility of RIS in realistic deployments.
While many prior works have focused on performance analysis and optimization in single-RIS or non-cooperative dual-RIS settings, cooperative RIS architectures have more recently gained interest due to their potential to expand coverage and support edge users. In [
65], a cooperative multi-RIS downlink model was considered, where beamforming was optimized to maximize the sum rate. The authors showed that coordinated RIS reflection can enhance multiuser downlink communication by intelligently aligning passive elements. Building upon this model, Zhang et al. [
66] investigated a dual-RIS-aided MIMO system in which active beamforming, receive filtering, and passive RIS configuration were jointly optimized to minimize the mean square error (MSE). Similarly, the work in [
67] explored a multiuser mmWave uplink scenario assisted by two cooperating RISs, with the objective of maximizing system throughput through joint optimization of transmit power and active/passive beamforming. In [
68], a cooperative dual-RIS-assisted uplink NOMA system was introduced, incorporating inter-RIS reflections and formulating a total transmit power minimization problem. From an analytical perspective, Shaikh et al. [
69] studied a dual-RIS V2I communication model and derived closed-form expressions for OP, energy efficiency (EE), and spectral efficiency (SE) under Nakagami-
m fading. Their findings confirmed the superior performance of cooperative RIS designs in vehicular contexts.
Additionally, Ghadi et al. [
70] evaluated the performance of RIS and STAR-RIS in cooperative V2V scenarios under both NOMA and OMA schemes. Their analysis yielded closed-form expressions for OP, ergodic capacity (EC), and EE under Fisher–Snedecor
F fading using CLT-based approximations. The results showed that the NOMA configuration with STAR-RIS offers notable gains over its OMA counterpart in ITS environments. In a recent study, the authors in [
71] examined the PLS performance of a cooperative dual-RIS-assisted V2V communication system operating under the NOMA protocol. The proposed model places one RIS near the transmitter vehicle and another near the legitimate receiver vehicles, while accounting for the presence of an eavesdropper. To characterize the channel behavior between the RISs, the authors adopted the Fisher–Snedecor
F fading model. Using the CLT, they derived the marginal distributions of the equivalent cascaded channels and presented closed-form expressions for key PLS metrics, including ASC, SOP, and secrecy energy efficiency (SEE). Furthermore, an asymptotic analysis was conducted to provide deeper insights into system performance. The simulation results demonstrated that cooperative dual-RIS deployment under NOMA significantly improves security and transmission reliability in ITS.
1.2. Research Gaps and Motivations
According to the literature, RISs have emerged as a transformative solution for improving PLS and signal propagation in vehicular communication networks. However, a significant portion of the existing literature has focused primarily on single-RIS or non-cooperative multi-RIS deployments. While these architectures offer improvements in reliability and spectral efficiency, they often fall short in dynamic vehicular scenarios with severe line-of-sight obstructions and strict security requirements. Moreover, many existing approaches rely on static or limited-scope optimization methods, which are inadequate for adapting to the fast-varying nature of vehicular channels and the presence of mobile eavesdroppers. The lack of dynamic coordination between multiple RISs further restricts their performance benefits, especially in realistic cooperative V2V settings. Additionally, most related works do not account for the spatio-temporal variability in V2V environments or leverage dual-RIS architectures in a coordinated manner for secure communication. Another gap lies in the limited integration of deep learning-based optimization frameworks for joint beamforming and RIS configuration in secure vehicular networks. The joint design of transmit beamforming and RIS phase control in such cascaded setups is highly non-convex and computationally intensive.
Furthermore, only a few prior studies address the modeling of time-varying channels and the impact of vehicular mobility, especially at different speeds, on secrecy performance and system stability. Existing approaches typically assume either quasi-static or simplified mobility models, limiting their real-world applicability.
The absence of end-to-end learning-driven frameworks that can jointly optimize secrecy rate, temporal channel dynamics, and mobility-aware beamforming creates a substantial research gap.
These limitations motivate the need for intelligent, evolution-driven models capable of adapting to mobility-induced channel fluctuations while ensuring secure, stable communication in dual-RIS-assisted cooperative V2V systems.
1.3. Paper Contributions
To bridge the aforementioned research gaps, this paper presents a novel framework that integrates cooperative RIS-assisted V2V communication with learning-based optimization techniques to enhance secrecy rate performance. The key contributions are summarized as follows:
We propose a secure cooperative dual-RIS-aided V2V communication system that jointly optimizes the secrecy rate, transmit beamforming vector, and phase shifts of two RISs under a realistic vehicular environment with blocked direct links.
A novel Evolutionary Transformer-GRU (Evo-TST-GRU) model is developed, which combines the sequential modeling strength of gated recurrent units (GRUs) with the global attention mechanism of Transformer encoders to learn temporal channel behavior.
An improved gray wolf optimizer (IGWO) is employed to adaptively tune the beamforming vector and RIS phase shifts, addressing the non-convex secrecy rate maximization problem with high convergence efficiency.
Extensive simulations validate that the proposed framework significantly outperforms state-of-the-art schemes, achieving higher secrecy rate and faster convergence across various vehicular scenarios.
1.4. Paper Organization
The remainder of this paper is organized as follows:
Section 2 describes the system model and problem formulation for SEE maximization in CF m-MIMO-enabled IoT networks.
Section 3 presents the materials and methodology of the proposed hybrid DL framework.
Section 4 provides the simulation results, assessing the performance of the proposed solution.
Section 5 presents the discussion and comparison of the results with benchmark approaches, and finally,
Section 6 concludes the paper.
2. System Model and Problem Formulation
We consider a secure wireless vehicle-to-vehicle (V2V) communication network, as depicted in
Figure 1, where a source vehicle
intends to transmit confidential data to a legitimate receiver vehicle
, while an unauthorized eavesdropping vehicle
attempts to intercept the transmission. To enhance communication security, two reconfigurable intelligent surfaces (RISs) are deployed to assist in steering the signal towards the intended receivers and mitigating exposure to the eavesdropper. In practical V2V scenarios, the nature of sensitive information transmitted over such networks depends on the application context. Nonetheless, typical confidential messages include safety-related warnings, traffic congestion updates, cooperative maneuver instructions (e.g., merging or lane changes), and privacy-preserving location information. Protecting this data from unauthorized interception is vital to prevent malicious exploitation or interference.
Due to the presence of environmental obstacles, such as tall buildings, parked trucks, roadside infrastructure, or even terrain elevation changes, the direct line-of-sight (LoS) paths between
and both
and
are assumed to be blocked. This assumption is particularly valid in urban, suburban, or highly dynamic V2V scenarios, where LoS connectivity is often intermittent or entirely unavailable. To circumvent this,
, composed of
reflecting elements, is positioned near
, while
, consisting of
elements, is installed closer to
and
. We consider that all vehicles move at either low or nearly constant speeds, typical in urban traffic, which results in approximately constant Doppler shifts. Consequently, the effect of vehicle mobility on channel variation is considered negligible, as supported in prior studies [
56,
69]. Furthermore, we assume that the distances between
and
,
, between
and
,
, between
and
,
, and between the two RISs,
, are all sufficiently large. Therefore, the wireless links between the vehicles and RISs, and between the
kth element of
and the
ℓth element of
, are modeled as quasi-static fading channels.
Let
denote the confidential information symbol transmitted by the source vehicle
, with average power
,
P represent the transmit power, and
denote the beamforming vector applied at the multi-antenna transmitter
, such that the transmit signal is expressed as
with
. The channel between
and
is denoted by
, while the channel between
and
is modeled as
. The channels from
to the legitimate receiver
and the eavesdropper
are denoted by
and
, respectively. The diagonal reflection coefficient matrices of
and
are represented as
and
, where each element represents a controllable phase shift. The received signal at the legitimate receiver
is then given by
where
is the additive white Gaussian noise (AWGN) at
. Similarly, the received signal at the eavesdropper
is expressed as
where
denotes the AWGN at
. The entire transmission path includes double reflections via
and
, and both
and
observe the same cascaded link, except for the final hop, which differs spatially.
In this study, we consider, without loss of generality, that an advanced synchronization mechanism is employed at both RISs. This mechanism is capable of adaptively updating the phase shifts in real time according to variations in the wireless channel, thereby maintaining alignment even under fast-changing propagation conditions [
72]. Based on the received signals at
and
, the instantaneous signal-to-noise ratio (SNR) at each receiver can be expressed as follows. For the legitimate receiver
, the SNR is given by
where
denotes the noise power at
. Similarly, the SNR at the eavesdropper
is expressed as
where
is the noise power at
. These expressions represent the effective SNRs experienced by each node through the double-reflected RIS-assisted paths.
To account for a more realistic configuration where the RIS phase shifts are not assumed to perfectly align with the composite channel phases, we explicitly model the received SNRs at the legitimate receiver and the eavesdropper by incorporating the phase differences between the channel coefficients and the adjustable RIS elements. Let
and
denote the respective distances between the transmitter,
,
, the legitimate receiver, and the eavesdropper. Assuming a common path loss exponent
for all links, the large-scale attenuation is modeled by the product of inverse-distance terms raised to the power
. Accordingly, the received SNR at the legitimate receiver
is expressed as
and similarly, the SNR at the eavesdropper
is given by
The RIS phase shifts and , as well as the transmit beamforming vector , are left as free parameters to be optimized in the subsequent secrecy rate maximization framework.
Based on the received SNRs at the legitimate receiver and the eavesdropper, the instantaneous secrecy rate of the system is defined as
where
ensures the secrecy rate remains non-negative. This expression captures the rate at which confidential information can be securely transmitted from the source to the legitimate receiver without being decoded by the eavesdropper. The secrecy performance depends jointly on the transmit beamforming vector
and the phase shift configurations of
and
, which will be jointly optimized in the next section.
We now formulate the secrecy rate maximization problem by jointly optimizing the beamforming vector at the transmitter and the phase shift configurations of the two RISs. Let
,
, and
denote the optimization variables. The optimization problem is formulated as:
This problem is highly non-convex due to the multiplicative coupling between the beamforming vector and the RIS phase shifts, as well as the unit-modulus constraints imposed on the RIS elements. To efficiently solve this problem, we adopt a hybrid evolutionary learning framework. Specifically, we employ an improved gray wolf optimizer (IGWO) to optimize the beamforming vector and RIS phase shifts and , while the temporal dependencies in channel dynamics are captured using a transformer-enhanced gated recurrent unit (Evo-TST-GRU) model.
4. Results
In this section, we present the simulation results to evaluate the performance of the proposed Evo-TST-GRU-based secure cooperative dual-RIS-aided V2V communication system. The primary objective is to validate the effectiveness of our framework in maximizing the secrecy rate while adapting to vehicular dynamics and potential eavesdropping. Unless otherwise specified, the following system parameters were used throughout the simulations. The distance between the transmitter vehicle and the first RIS, denoted as , was set to 50 m, which is also equal to the distance between the second RIS and the legitimate receiver vehicles; that is, m. The eavesdropper was located closer to the second RIS, with a distance of m. The separation between the two RISs was fixed at m. The noise power levels at the legitimate receiver and the eavesdropper were dBm and dBm, respectively. A uniform path loss exponent of was considered for all wireless links. The target secrecy rate threshold was set at bits per channel use, and the vehicle transmit power was set to dBm to ensure adequate signal strength under realistic operating conditions. All simulations were conducted on a MacBook Air equipped with an Apple M1 processor and 16 GB of RAM. The entire simulation framework was implemented using Python 3.9.13. The reinforcement learning model was built and trained using the TensorFlow library, which enabled the efficient handling of deep neural network computations and real-time policy updates. Numerical computations, such as matrix operations and stochastic sampling, were performed using NumPy, while Matplotlib 3.5.2 was used to generate the performance plots and visualize the results in a clear and reproducible manner.
To rigorously assess the performance of the proposed Evo-Transformer-GRU architecture, we compare it with several well-established baseline models. These include the standard transformer encoder and the bidirectional encoder representations from transformers (BERT), both of which are renowned for their ability to model long-range dependencies and capture contextual relationships through self-attention mechanisms. In addition, we evaluate classical recurrent models such as the GRU and the LSTM, which are frequently used for sequential data processing in wireless communication tasks. To provide a learning-based optimization agent for use as a benchmark, we also include a deep reinforcement learning (DRL) model, trained to maximize the secrecy rate under the same simulation conditions.
The selection of these baseline models was based on their relevance to different aspects of our problem. Transformer and BERT serve as strong attention-based encoders, enabling a direct comparison with the transformer component of our proposed hybrid architecture. GRU and LSTM allow us to isolate the effectiveness of memory-based temporal modeling in capturing vehicular channel dynamics. The DRL model provides an adaptive baseline, demonstrating how policy-based decision-making alone performs without architectural enhancements or optimization. Collectively, these models offer a diverse and meaningful reference set, allowing us to highlight the advantages of the Evo-Transformer-GRU framework in terms of secrecy performance, convergence behavior, and robustness in dynamic vehicular environments.
In order to evaluate the quantitative performance of the proposed Evo-Transformer-GRU model and compare it against the baseline approaches, we utilized a comprehensive set of performance metrics. These included the root mean square error (RMSE), the coefficient of determination (
), mean absolute percentage error (MAPE), variance, execution time, convergence behavior, and statistical significance through the
t-test. Together, these metrics provide insights into the accuracy, stability, computational efficiency, and statistical reliability of the results across different methods. The RMSE was used to measure the absolute prediction error between the model’s output and the true target value. As defined in Equation (
33), RMSE penalizes larger deviations more heavily, making it a robust indicator of prediction quality:
where
is the observed value and
is the calculated value. A lower RMSE value indicates a more accurate model with fewer large errors.
To complement RMSE, we also report the coefficient of determination, which assesses how well the predictions approximate the actual values. As shown in Equation (
34), it represents the proportion of variance in the ground truth that is captured by the predictions:
where
and
denote the means of the actual and predicted values, respectively, and
,
are their standard deviations. An
value close to 1 implies strong predictive power. We also incorporated the MAPE as a supplementary metric to evaluate prediction accuracy. MAPE provides a normalized, percentage-based measure of prediction error, which is particularly useful when comparing across datasets or models with varying output scales. It expresses the average absolute difference between predicted and true values as a percentage of the true values:
MAPE is especially valuable when interpretability is needed—e.g., an MAPE of 5% means that the model’s predictions are off by 5% on average. In our context, this helps to quantify how closely the predicted secrecy rates match the actual values under varying vehicular communication conditions.
Variance was employed to evaluate the stability of the secrecy rate achieved across multiple independent runs. A lower variance suggests that the model consistently converges to similar performance levels and is not sensitive to random initialization or environmental dynamics. In scenarios involving stochastic learning, variance is critical for assessing robustness. Execution time is reported to demonstrate the computational efficiency of the training process. It provides an important practical dimension, especially in real-time or resource-constrained vehicular systems. Faster convergence with competitive accuracy highlights the scalability of the model. To further analyze convergence behavior, we present a learning curve showing the secrecy rate versus training iterations. This allows us to compare how quickly different models approached their optimal performance. A steeper convergence curve indicates faster learning, while a smooth plateau suggests stability and avoidance of overfitting. Lastly, to ensure that observed improvements are statistically significant and not due to chance, we performed a paired two-tailed t-test on the results of the proposed model and each baseline. A p-value less than 0.01 is considered statistically significant, confirming that the Evo-Transformer-GRU outperforms the competing methods with high confidence.
The selection and tuning of hyper-parameters play a critical role in determining the learning efficiency, convergence stability, and generalization capability of DL models. Inappropriately chosen parameters can lead to under-fitting, over-fitting, slow convergence, or unstable training dynamics—especially in highly dynamic environments such as V2V communication. Key parameters such as learning rate, number of layers, hidden units, dropout rate, and batch size directly influence how well the model captures temporal and spatial features while maintaining robustness under real-time constraints. Therefore, the careful and problem-specific optimization of these parameters is essential to extract the full potential of any deep model. In the proposed Evo-Transformer-GRU framework, hyper-parameters are optimized using the IGWO, which adaptively explores the parameter space to identify the best configuration for maximizing secrecy rate. This evolutionary approach allows the model to self-adjust critical values such as learning rate, attention heads, hidden units, and GRU depth without requiring manual intervention. In contrast, baseline models rely on conventional grid search, a brute-force method that evaluates all possible parameter combinations within a predefined range. While grid search is straightforward, it becomes computationally expensive and less effective in capturing non-linear interdependencies among parameters, especially when the search space is large.
The specific hyper-parameter settings for each model are presented in
Table 1. The Evo-Transformer-GRU uses a learning rate of 0.002, batch size of 64, and a transformer encoder with eight layers and 10 attention heads. The GRU subcomponent comprises two layers with 32 hidden units each, and a dropout rate of 0.2. These values were derived through IGWO to strike a balance between model expressiveness and training efficiency. The population size and number of iterations for IGWO were set to 100 and 300, respectively, reflecting a moderate search depth and computational budget. By comparison, the baseline models exhibited a range of manually selected or grid-searched values. For example, the Transformer baseline uses a higher learning rate of 0.003 and 12 attention heads, while the GRU and LSTM models have deeper recurrent structures with four layers and larger hidden sizes (64 units). BERT uses a longer input window (64 time steps), consistent with its architecture’s reliance on longer context. DRL, meanwhile, includes reinforcement-specific parameters such as discount factor (
) and
-greedy value (0.45). These differences underscore the necessity of tailored parameter tuning for each architecture and highlight the advantage of the IGWO-driven adaptive optimization used in the proposed model.
Figure 7 illustrates the impact of varying the transmit power of the source vehicle
on the secrecy rate under different RIS configurations. It can be clearly observed that increasing the transmit power
P from
dBm to 20 dBm consistently improves the secrecy rate across all configurations. This trend reflects the fundamental relationship between transmit power and the received signal strength at both legitimate and illegitimate receivers. As the transmit power increases, the signal quality at the intended receiver improves, thereby enhancing the secrecy capacity, provided that the eavesdropper does not benefit from the same gain due to channel asymmetry and RIS-based redirection. The presence and configuration of RISs play a critical role in further boosting the secrecy performance. Compared to the baseline case without any RIS deployment, all RIS-assisted configurations demonstrate substantial improvements in secrecy rate. This clearly demonstrates the benefit of leveraging RISs to strengthen the channel to legitimate receivers while weakening the signal path toward potential eavesdroppers. According to the results obtained with the RIS-assisted setups, using a larger number of reflecting elements at both
and
results in consistently higher achieved secrecy rates. For instance, the configuration
outperforms all others, achieving a secrecy rate of nearly 16 bps/Hz at 20 dBm, while the
setup reaches approximately 11 bps/Hz. Furthermore, by comparing mixed-element configurations, i.e.,
vs.
, it becomes evident that increasing the number of elements at
yields greater secrecy rate gains compared to increasing the size of
. This observation highlights the dominant role of
, which is placed closer to both the legitimate receiver and the eavesdropper. Since
directly influences the final signal path in both the constructive (to
) and destructive (to
) directions, its ability to steer and phase-align signals has a more pronounced impact on the overall secrecy performance. In contrast,
mainly serves as an intermediate reflecting surface in the cascaded channel; thus, its influence, while still beneficial, is relatively limited.
Figure 8 presents the impact of increasing the distance between
and the eavesdropper
, denoted as
, on the secrecy rate under four different RIS configurations. As expected, increasing
leads to a noticeable improvement in the secrecy rate across all scenarios. This behavior aligns with PLS principles, where enlarging the spatial separation between the RIS and the eavesdropper reduces the signal strength at the unintended node due to the higher path loss, thereby decreasing the likelihood of successful eavesdropping. All configurations with RIS deployment consistently outperform the baseline with fewer reflecting elements, demonstrating the significance of RIS-aided cascaded links in shaping the propagation environment. The highest secrecy rate is achieved when both
and
are equipped with 36 elements, confirming that increasing the number of passive reflecting elements enhances signal strength toward the legitimate receiver while allowing for better suppression or redirecting the signal to prevent it from reaching the eavesdropper. A closer comparison between the asymmetric setups, i.e.,
and
, again emphasizes the dominant role of
in secrecy enhancement. The configuration with more elements at
yields superior secrecy performance for the same
values, particularly at shorter distances. This is attributed to
being directly responsible for shaping the signal incident on both the legitimate vehicle and the eavesdropper. As
increases beyond 60 m, the performance gap among configurations narrows, since the
’s received power diminishes significantly and the secrecy rate becomes more dominated by the LR’s channel quality.
Figure 9 compares the secrecy rate performance of various algorithms as a function of the transmit power
P of the source vehicle
under a fixed RIS configuration with
. As the transmit power increases from
dBm to 20 dBm, all methods demonstrate improved secrecy rates, which is expected due to the higher SNR at the legitimate receiver. However, the rate of improvement varies notably among the different techniques. Among all compared methods, the proposed Evo-TST-GRU model consistently achieves the highest secrecy rate at all levels of transmit power. This superiority stems from its hybrid architecture, which combines the temporal modeling capabilities of GRUs with the global attention mechanism of Transformers, and is further enhanced by the adaptive optimization of beamforming and RIS phase shifts via IGWO. Notably, Evo-TST-GRU exhibits a considerable performance margin over the standalone Transformer and GRU models, indicating the advantage of learning both short- and long-term dependencies in the cascaded dual-RIS environment. The BERT and DRL-based models also perform well, with BERT slightly outperforming DRL, particularly at higher power levels. These results highlight the effectiveness of attention-based mechanisms in capturing contextual channel dynamics. Traditional recurrent architectures like LSTM and GRU exhibit a relatively reduced performance, which is attributed to their limited ability to model long-range dependencies and their lack of reinforcement-based policy updates. The GRU model, while simpler and efficient, provides the lowest secrecy rate among the learning-based approaches, reinforcing the need for more expressive and adaptive frameworks in RIS-aided secure vehicular communication. As a result, these findings demonstrate the clear advantage of the Evo-TST-GRU approach in maximizing the secrecy rate under dynamic conditions in secure V2V communications.
Figure 10 illustrates the variation in achievable secrecy rate as a function of vehicular velocity for multiple baseline algorithms, including Transformer, BERT, DRL, LSTM, and GRU, with both RIS units being configured as
. As expected, all models experienced a degradation in secrecy performance with increasing velocity due to intensified Doppler effects, faster time-variations in the channel, and reduced coherence time, which together hinder optimal beamforming and phase adaptation. However, the proposed Evo-TST-GRU model consistently outperforms the alternatives across all speed regimes. Notably, at 5 m/s, it achieves a secrecy rate exceeding 11 bps/Hz, while at 25 m/s, it maintains a performance above 4 bps/Hz, well ahead of the next-best method, Transformer. This resilience highlights the model’s superior temporal modeling capacity, enabled by the Transformer-GRU synergy, and its adaptivity via IGWO-based evolutionary tuning. In contrast, DRL, LSTM, and GRU-based baselines show a sharper decline in secrecy rate as velocity increases, underlining their limitations in capturing long-range dependencies and maintaining robustness under rapid environmental fluctuations. These results demonstrate that Evo-TST-GRU is not only effective in static or quasi-static scenarios, but also maintains high confidentiality under mobility-induced dynamics, a critical requirement for real-world vehicular communications.
Table 2 presents the comparative evaluation of the proposed Evo-Transformer-GRU model against five baseline architectures based on three widely used regression metrics: RMSE,
, and MAPE. These metrics collectively assess each model’s accuracy, stability, and reliability in predicting the secrecy rate under the vehicular communication scenario defined in our simulation setup. The proposed Evo-Transformer-GRU achieves a remarkably low RMSE of 0.05, significantly outperforming all baseline models. This low error value demonstrates the model’s ability to closely track the true secrecy rate values with minimal deviation. In contrast, Transformer and BERT show higher RMSE values of 3.86 and 5.41, respectively, while the purely recurrent models (LSTM and GRU) perform notably worse, with RMSEs of 10.29 and 12.33. This indicates that traditional sequential models are less capable of capturing the complex spatio-temporal dependencies required for effective secure communication in dynamic vehicular environments.
In terms of , Evo-Transformer-GRU again leads with a value of 0.96, indicating that it explains 96% of the variance in the ground truth secrecy rates. This reflects high model fidelity and alignment with actual system behavior. In comparison, Transformer and BERT achieve values of 0.89 and 0.87, while DRL, LSTM, and GRU progressively decline to 0.86, 0.83, and 0.81, respectively. These results highlight the importance of combining attention-based encoding with memory-aware sequential modeling, as neither component alone yields the same level of predictive precision. The MAPE scores further validate these findings. Evo-Transformer-GRU registers an MAPE of only 0.73%, confirming its outstanding generalization and low relative error. In contrast, all other models exceed 5%, with GRU reaching as high as 15.70%. Since MAPE provides an intuitive percentage-based interpretation of error, these values reinforce the notion that the proposed model maintains consistent accuracy across different sample points and is robust to local fluctuations in secrecy rate. Taken together, the quantitative results confirm both numerically and conceptually that the Evo-Transformer-GRU architecture is uniquely well-suited to modeling secrecy rate dynamics in V2V communication scenarios. Its hybrid structure enables it to extract rich contextual features via attention mechanisms while preserving temporal dependencies through GRU memory units. Moreover, the IGWO-driven hyper-parameter tuning contributed to optimal architectural balance, providing it a clear edge over models with static or manually tuned configurations.
Figure 11 illustrates a radar plot that visually compares the
R2 scores achieved by the six evaluated models. Each axis of the radar corresponds to one model, and the radial value on each axis indicates the respective
R2 score obtained in
Table 2. The radar plot provides a compact and intuitive visualization of model performance in terms of predictive accuracy, where higher values closer to the outer edge indicate a stronger correlation with ground truth data. The plot clearly highlights the superiority of the proposed Evo-Transformer-GRU model, which achieves the highest
R2 score of near 0.96, forming a dominant peak at the top of the radar. Transformer and BERT exhibit relatively strong but lower
R2 scores around 0.89 and 0.87, respectively, indicating a moderate capacity to capture underlying data variance. On the other hand, DRL, LSTM, and GRU show progressively weaker performance, with GRU reaching the lowest point at around 0.81. This visual confirms the quantitative results from
Table 2 and reinforces the effectiveness of combining transformer attention with recurrent learning and evolutionary hyper-parameter tuning for modeling secrecy rate dynamics in vehicular communication systems.
Figure 12 provides a visual representation of the RMSE and MAPE scores for each of the six models analyzed, offering a clear comparative perspective on prediction accuracy and relative error. The bar chart groups the results by metric, allowing for a side-by-side inspection of how each model performs with respect to absolute prediction error (RMSE) and percentage deviation from the ground truth (MAPE). The Evo-Transformer-GRU model achieves the lowest values across both metrics, with an RMSE close to zero and an MAPE under 1%, clearly setting it apart from the other methods. Transformer and BERT follow at a considerable distance, while DRL, LSTM, and GRU demonstrate visibly poorer performance. This visual contrast underscores the critical importance of combining attention-based context modeling with temporal memory and optimized hyper-parameter tuning.
Table 3 presents the results of statistical significance tests conducted using paired two-tailed
t-tests between the proposed Evo-Transformer-GRU model and each of the baseline architectures. This test evaluates whether the observed performance improvements are statistically meaningful or could have occurred due to random variation. The
p-values are compared against a significance threshold of
, with lower values indicating stronger evidence against the null hypothesis; that is, the assumption that there is no meaningful performance difference between the compared models. The
t-test is particularly relevant in this context because performance metrics like RMSE and MAPE can vary slightly across multiple runs due to randomness in model initialization, optimization, and data shuffling. The
t-test allows us to assess whether the differences in these metrics are consistent and reproducible. By confirming statistical significance, we can substantiate that Evo-Transformer-GRU provides not just better average results but also reliably superior outcomes compared to competing models.
As shown in
Table 3, all comparisons yield
p-values significantly below the 0.01 threshold, indicating that the improvements achieved by Evo-Transformer-GRU are statistically significant across all baselines. For instance, the comparison with Transformer yields a
p-value of 0.0007, confirming that the hybrid architecture’s advantage in modeling secrecy rate is not incidental. The results regarding BERT and DRL show even lower
p-values (0.0003 and 0.00008, respectively), further emphasizing the model’s consistent superiority in both attention-based and reinforcement learning comparisons. The strongest statistical distinction is observed in comparisons with LSTM and GRU, where
p-values drop to 0.00005 and 0.00002, respectively. These results underscore the limitations of traditional recurrent models in capturing complex spatio-temporal patterns in dynamic V2V communication scenarios. Overall, the
t-test analysis validates the robustness and reliability of the proposed model’s improvements and provides compelling evidence that Evo-Transformer-GRU consistently outperforms its counterparts with high statistical confidence.
Figure 13 illustrates the RMSE-based convergence behavior of the proposed Evo-Transformer-GRU model in comparison with five baseline architectures across 300 training epochs. This figure provides critical insight into the training dynamics of each model, allowing us to evaluate how quickly and effectively each approach minimizes prediction error over time. The lower RMSE values and steeper descent curves indicate faster and more stable convergence during training. As shown in the figure, the Evo-Transformer-GRU model achieves a significantly faster convergence rate compared to all baselines, reducing its RMSE sharply within the first 50 epochs and approaching near-zero error by epoch 100. In contrast, models such as GRU and LSTM converge much more slowly and still maintain high error levels even beyond 300 epochs. BERT and DRL exhibit intermediate convergence, while the standard Transformer shows better performance but still lags behind the proposed method. This indicates that Evo-Transformer-GRU not only learns more effectively but also requires fewer iterations to stabilize, making it highly suitable for real-time or latency-sensitive applications like secure V2V communication.
The improved convergence speed can be largely attributed to the role of the IGWO in optimizing critical hyper-parameters such as learning rate, hidden units, and layer configurations. By adaptively tuning these parameters during the training process, IGWO ensures that the model operates in a well-balanced regime that promotes fast learning without overfitting or oscillation. The search agents in IGWO, enhanced by the inclusion of the wolf, maintain a dynamic equilibrium between exploration (searching globally for better configurations) and exploitation (refining known good regions), allowing the model to efficiently descend the error surface. In the context of this problem, where secrecy rate prediction under dynamic vehicular conditions is highly sensitive to feature timing and attention accuracy, the rapid and smooth convergence of Evo-Transformer-GRU is particularly valuable. The model is able to quickly extract meaningful temporal and contextual dependencies, optimize them through recurrent feedback and attention, and stabilize its output. This efficiency directly translates into reduced computational cost and improved responsiveness, which are both essential in the deployment of secure learning-based strategies in vehicular networks where decision latency can compromise security.
5. Discussion
The discussion section provides a deeper analytical reflection on the broader implications of the results presented so far. Beyond reporting superior accuracy and convergence metrics, this section critically examines the real-world applicability of the proposed Evo-Transformer-GRU model by addressing three vital aspects: stability, scalability, and computational feasibility. In practical vehicular communication environments, where decisions must be both secure and time-sensitive, high accuracy alone is insufficient: models must also be consistent, efficient, and robust under varying system loads and channel dynamics. Accordingly, this section explores how the proposed model behaves in terms of output stability under multiple simulation runs, how it scales computationally with respect to system parameters, and how it performs in terms of training efficiency and runtime cost. These aspects are crucial for assessing the operational viability of the model in real-time, latency-constrained V2V communication scenarios, where fluctuating environments and mobile nodes introduce a high degree of uncertainty.
In addition, we compare the computational footprint of Evo-Transformer-GRU with other baseline models, analyzing not just how fast the model learns, but also how efficiently it utilizes resources. We argue that for a model to be realistically deployable in on-board vehicular processors or edge AI platforms, it must strike a balance between predictive strength and computational economy. Hence, this section bridges the gap between experimental performance and practical implementation. The goal of this discussion is not only to validate the technical superiority of the proposed framework but also to evaluate its long-term adaptability in next-generation vehicular networks. By highlighting its performance consistency, runtime profile, and scalability characteristics, we aim to provide a comprehensive picture of how Evo-Transformer-GRU can serve as a foundation for future secure and intelligent wireless systems.
Table 4 presents a quantitative comparison of the evaluated models in terms of stability and computational efficiency. Stability is measured using the statistical variance of output secrecy rates across multiple Monte Carlo simulations, while average run time reflects the time required to complete the training process under consistent hardware and software conditions. These two dimensions provide insight into each model’s practical viability in real-world deployments, where both output consistency and time-to-convergence are crucial. As shown in the table, the proposed Evo-Transformer-GRU model achieves a remarkably low variance of just 0.00008, indicating extremely stable performance across all runs. This stability far surpasses that of all other models, with Transformer and BERT exhibiting significantly higher variances (1.86 and 2.28, respectively), and LSTM and GRU showing the highest instability (5.08 and 6.48). The reduced variance of the proposed model underscores the reliability of its predictions under channel randomness and network dynamics, which is vital in secure V2V communication systems.
In terms of average runtime, Evo-Transformer-GRU completes training in 159 s, taking longer than GRU and Transformer but still being significantly more efficient than DRL (306 s), LSTM (259 s) and BERT (218 s). This suggests a balanced trade-off between computational cost and learning complexity. These findings reinforce the notion that Evo-Transformer-GRU is not only accurate and fast-converging but also robust and scalable, qualities that are essential for real-time vehicular applications. Its ability to maintain low variance demonstrates a high degree of generalization and insensitivity to initialization or random environmental shifts. Meanwhile, its moderate runtime, especially compared to DRL and deep recurrent networks, indicates its suitability for deployment on onboard vehicle processors or edge nodes without significant latency penalties.
Table 5 presents a comparative evaluation of algorithm efficiency based on the runtime required to achieve predefined RMSE thresholds (i.e., RMSE < 15, <10, <5, and <2.5). This table illustrates how rapidly each model converges to a certain level of prediction precision, providing a deeper perspective of learning efficiency and training scalability. The presence or absence of values across thresholds highlights not only the speed of convergence but also whether a model is capable of reaching high-precision performance at all. The Evo-Transformer-GRU model significantly outperforms all baselines in convergence efficiency, reaching RMSE < 15 in only 30 s and achieving RMSE < 2.5 in just 169 s—an outcome no other model accomplishes. While the Transformer and BERT models eventually attain RMSE < 5, they require substantially longer training durations (432 s and 269 s, respectively). Models like DRL, LSTM, and GRU struggle to cross the RMSE < 10 threshold and never reach higher-precision targets. These results validate that Evo-Transformer-GRU not only delivers better final accuracy but also requires significantly less time to reach those levels, demonstrating exceptional learning dynamics.
This performance advantage reflects the synergy between transformer attention, GRU-based temporal encoding, and hyper-parameter tuning via IGWO. The fast convergence of Evo-Transformer-GRU suggests that it can deliver accurate secrecy rate predictions under tight timing constraints, which is crucial for real-time vehicular communication scenarios. Furthermore, the ability to reach lower RMSE thresholds while others stall indicates robustness and efficiency in navigating complex error landscapes—making the proposed model a reliable solution for high-assurance, low-latency intelligent wireless systems. In light of these results, Evo-Transformer-GRU proves to be a strong candidate for future integration into 6G-era vehicular communication systems. Its combination of predictive accuracy, learning stability, and computational tractability positions it as a practical and forward-compatible solution. Such characteristics are critical not only for secure message transmission but also for enabling intelligent decision-making in autonomous and cooperative mobility ecosystems.
Moreover, the proposed Evo-Transformer-GRU model can be deployed in real-time vehicular systems by embedding it into edge units or vehicular onboard units (OBUs), leveraging model compression or quantization for latency reduction. Due to its modular design and reliance on physical-layer inputs, the framework can be integrated into existing V2X protocol stacks such as DSRC or C-V2X, supporting adaptive beamforming and RIS coordination under the constraints of current vehicular communication standards. In terms of deployment cost, the proposed Evo-Transformer-GRU model exhibits low inference latency due to its lightweight GRU structure and Transformer encoder with limited depth, making it feasible for execution on vehicular edge units with moderate computational capabilities. Although the training process is performed offline, energy-aware quantization and model compression techniques can be applied post-training to reduce runtime power consumption and memory footprint in real-world deployments.
6. Conclusions
In this work, we proposed a novel learning-based framework (referred to as Evo-Transformer-GRU) that combines the spatial attention modeling capability of a transformer encoder with the temporal sequence learning strength of GRU. To further enhance adaptability and learning efficiency, we integrated an IGWO to automatically tune critical hyper-parameters such as learning rate, architecture depth, and neuron configuration. The hybrid architecture was evaluated in the context of secrecy rate maximization within a cooperative dual-RIS-aided V2V communication system, offering an end-to-end solution tailored to secure and efficient vehicular wireless scenarios. The experimental evaluations clearly demonstrated the superiority of the proposed Evo-Transformer-GRU model across a diverse range of metrics. It achieved the lowest RMSE value of 0.05, indicating its exceptionally high prediction accuracy in modeling the secrecy rate under dynamic V2V conditions. The model also recorded the highest R2 score of 0.96, reflecting its ability to capture and explain nearly all the variance in the target outputs. In terms of robustness, Evo-Transformer-GRU showed a variance of only 0.00008 across multiple runs, which is significantly lower than all baseline models, confirming its stability and consistency under channel randomness and stochastic initialization. Furthermore, it achieved an MAPE of just 0.73%, highlighting its ability to deliver highly reliable predictions with minimal relative error. From a convergence and computational standpoint, the model consistently outperformed alternatives by converging within 100 epochs and achieving a secrecy rate prediction with RMSE below 2.5 in less than 170 s, something no other model accomplished. The convergence curve demonstrated both speed and smoothness, attributable to the integration of IGWO, which dynamically optimized the model’s hyper-parameters to balance exploration and exploitation. Compared to BERT, DRL, and deep recurrent models, Evo-Transformer-GRU required less training time while delivering more accurate and stable results, validating its practical applicability in latency-sensitive, resource-constrained vehicular systems.
The findings of this study highlight the critical importance of hybrid architectures that can jointly capture spatial attention and temporal dependencies for complex, security-sensitive wireless systems. By leveraging the transformer encoder’s ability to model global contextual interactions and integrating it with the sequential memory structure of GRUs, the proposed Evo-Transformer-GRU framework bridges two complementary learning paradigms. This fusion enables the model to operate effectively under the rapid channel variations and structural uncertainties inherent in V2V networks, offering a robust approach to physical-layer security optimization. The incorporation of IGWO further enhances this architecture by enabling dynamic, problem-specific hyper-parameter tuning—an often overlooked but essential aspect for achieving stable and efficient learning in real-world conditions. Beyond its strong performance in conventional metrics, the proposed framework demonstrates a compelling balance between accuracy, training efficiency, and system robustness, three pillars that are often difficult to optimize simultaneously. The model’s ability to converge quickly, remain stable under varying simulation runs, and maintain a low computational footprint suggests that it is not only theoretically sound but also practically viable. These characteristics make Evo-Transformer-GRU a promising candidate for deployment in next-generation vehicular communication systems where secure, real-time learning is indispensable. The framework also lays the groundwork for broader research into adaptive learning strategies that can generalize across varying network topologies and attack surfaces in future 6G ecosystems.
Limitations and Future Research Directions
One promising direction for future research is to extend the current framework toward online or continual learning under non-stationary channel environments. In real-world vehicular systems, channel conditions and network topology evolve rapidly due to mobility, interference, and environmental dynamics. Adapting the Evo-Transformer-GRU model to support real-time model updates without full retraining would significantly improve its practicality in large-scale deployments. This may involve integrating meta-learning or lightweight incremental update mechanisms, as well as exploring adversarial training schemes to further enhance resistance to active eavesdropping or jamming. On the architectural side, future work could explore multi-agent extensions of the proposed model, where each vehicle or node trains and shares its own Evo-Transformer-GRU instance in a federated or cooperative manner. This would be particularly beneficial in dense vehicular networks, where distributed security-aware optimization must occur under limited communication and computational budgets. Additionally, the IGWO component can be evolved into a self-adaptive, layer-specific optimizer, enabling fine-grained control over deeper transformer or GRU blocks.
Moreover, while the proposed Evo-Transformer-GRU framework demonstrates strong performance and adaptability for secure dual-RIS-aided V2V communication, several limitations remain, which warrant further exploration: (1) Channel Modeling and Mobility Assumptions: The model assumes quasi-static channels based on low or nearly constant vehicular speeds, which is realistic in urban environments but may not capture the full dynamics of high-speed highway or platooning scenarios. Although we included a sensitivity analysis under varying speeds, real-time Doppler effects, frequent handovers, and abrupt channel variations in highly mobile environments require more advanced modeling and adaptive strategies. (2) Input Sequence Length and Temporal Depth: The architecture is trained on short input sequences (length = 4), which may limit the richness of the temporal context available to the model. Although regularization, early stopping, and validation-based optimization help mitigate overfitting, extending the sequence horizon or incorporating memory-aware structures (e.g., attention buffers) may further improve temporal generalization. (3) Simulation-Based Evaluation: All evaluations are currently based on simulated channel conditions and synthetic mobility profiles. While these are grounded in realistic assumptions, real-world vehicular datasets and over-the-air testing would offer a more rigorous validation of the model’s practical effectiveness and robustness. (4) Real-Time Feasibility and Deployment Constraints: The computational requirements of the Transformer-GRU model and the IGWO-based optimization may cause challenges in its real-time deployment on resource-constrained vehicular nodes or roadside units. Future work will focus on model compression, quantization, and distributed edge inference techniques (e.g., MEC-based offloading) to improve practical scalability. (5) Generalization Across Diverse V2X Environments: Although the model performs well across varied simulations, additional testing across diverse V2X communication scenarios, such as mixed V2I/V2P/V2N networks, multi-eavesdropper settings, and non-line-of-sight topologies, would help validate its versatility and identify potential bottlenecks. Future research will extend this work by integrating online learning for adaptive retraining under evolving conditions, developing lightweight variants of the model for onboard inference, and validating the system on public vehicular communication datasets and testbeds. Moreover, we plan to explore reinforcement learning-based strategies to enable real-time policy adaptation in non-stationary vehicular environments.
In addition, it is worth noting that while the proposed cooperative dual-RIS-aided framework shows significant gains in secrecy rate at different speeds (as shown in
Figure 10), it assumes the presence of two RIS units with reliable LoS to both the source and destination vehicles for the duration of the transmission session. However, in real vehicular environments, particularly at normal driving speeds, this LoS condition may only hold for a few seconds due to the rapid displacement of vehicles and limited spatial coverage of each RIS. This temporal limitation introduces practical challenges for maintaining sustained RIS-assisted communication, as the physical alignment between the vehicle and RISs can quickly degrade or disappear. Without a dense deployment of RIS elements along the roadway or an RIS handover mechanism, the proposed setup may not maintain continuous performance over long vehicular trajectories. To address this concern, future work may explore dynamic RIS topologies, including RIS meshes along roadside infrastructure, vehicular-mounted RIS units, or drone-assisted RIS deployment. These approaches could ensure the spatial continuity of the reflective paths and support seamless handover between RIS nodes. Incorporating predictive mobility models and handover-aware optimization algorithms would also be essential for extending RIS-aided PLS to large-scale vehicular scenarios. We emphasize that the current study focuses on a single cooperative RIS-pair coverage window, and this broader generalization is left for future investigation.