Figure 1.
Adaptive encryption architecture for OFDM-based IoV showing LUT-driven pre-selection of DES, AES-128, ASCON, and Keccak, single-cycle cipher switching, and symmetric TX/RX OFDM chains.
Figure 1.
Adaptive encryption architecture for OFDM-based IoV showing LUT-driven pre-selection of DES, AES-128, ASCON, and Keccak, single-cycle cipher switching, and symmetric TX/RX OFDM chains.
Figure 2.
Transmitter architecture with adaptive encryption and interleaving.
Figure 2.
Transmitter architecture with adaptive encryption and interleaving.
Figure 3.
Adaptive transmitter module supporting DES, AES-128, ASCON, and Keccak through a shared buffering interface and interleaver.
Figure 3.
Adaptive transmitter module supporting DES, AES-128, ASCON, and Keccak through a shared buffering interface and interleaver.
Figure 4.
OFDM transmitter: encrypted bits are 8-QAM mapped, IFFT-processed, serialized, and sent with a guard interval.
Figure 4.
OFDM transmitter: encrypted bits are 8-QAM mapped, IFFT-processed, serialized, and sent with a guard interval.
Figure 5.
Receiver architecture with deinterleaving and decryption based on the pre-selection unit’s chosen cipher, including DES, AES-128, ASCON, and Keccak.
Figure 5.
Receiver architecture with deinterleaving and decryption based on the pre-selection unit’s chosen cipher, including DES, AES-128, ASCON, and Keccak.
Figure 6.
OFDM receiver with adaptive decryption across multiple cipher cores.
Figure 6.
OFDM receiver with adaptive decryption across multiple cipher cores.
Figure 7.
Adaptive decryption module supporting DES, AES-128, ASCON, and Keccak with single-cycle switching latency.
Figure 7.
Adaptive decryption module supporting DES, AES-128, ASCON, and Keccak with single-cycle switching latency.
Figure 8.
Clock down-conversion waveform used to synchronise the encryption cores. The clock is reduced from 50 MHz to an appropriate frequency to accommodate the internal pipelined operations.
Figure 8.
Clock down-conversion waveform used to synchronise the encryption cores. The clock is reduced from 50 MHz to an appropriate frequency to accommodate the internal pipelined operations.
Figure 9.
Pre-selection unit schematic. The pre-selection logic evaluates traffic type (control/data/voice) and channel SNR to select among AES-128 (high security), ASCON (low latency), or Keccak (integrity-focused) based on real-time IoV requirements; DES is retained as a legacy reference and is not recommended for secure V2X deployment.
Figure 9.
Pre-selection unit schematic. The pre-selection logic evaluates traffic type (control/data/voice) and channel SNR to select among AES-128 (high security), ASCON (low latency), or Keccak (integrity-focused) based on real-time IoV requirements; DES is retained as a legacy reference and is not recommended for secure V2X deployment.
Figure 10.
Simulation waveform for the DES encryption core. A 64-bit plaintext is transformed into a 64-bit ciphertext after sixteen rounds of processing.
Figure 10.
Simulation waveform for the DES encryption core. A 64-bit plaintext is transformed into a 64-bit ciphertext after sixteen rounds of processing.
Figure 11.
Simulation waveform for the AES-128 encryption core. A 128-bit plaintext is encrypted with a 128-bit key through ten rounds, producing a 128-bit ciphertext.
Figure 11.
Simulation waveform for the AES-128 encryption core. A 128-bit plaintext is encrypted with a 128-bit key through ten rounds, producing a 128-bit ciphertext.
Figure 12.
Transmitter buffer output when DES is selected. The parallelised 64-bit plaintext is segmented into 8-bit words and forwarded to the interleaver to minimise latency.
Figure 12.
Transmitter buffer output when DES is selected. The parallelised 64-bit plaintext is segmented into 8-bit words and forwarded to the interleaver to minimise latency.
Figure 13.
Receiver input when DES is selected. The 64-bit ciphertext is divided into byte-wise states to feed the decryption core.
Figure 13.
Receiver input when DES is selected. The 64-bit ciphertext is divided into byte-wise states to feed the decryption core.
Figure 14.
Single-core AES-128 simulation waveform demonstrating back-to-back TX/RX data integrity. Total end-to-end latency is (synthesized core).
Figure 14.
Single-core AES-128 simulation waveform demonstrating back-to-back TX/RX data integrity. Total end-to-end latency is (synthesized core).
Figure 15.
ASCON encryption and decryption simulation waveform using 128-bit plaintext, key, and nonce, demonstrating correct ciphertext generation and plaintext recovery with authenticated integrity (validates architectural extensibility to AEAD primitives).
Figure 15.
ASCON encryption and decryption simulation waveform using 128-bit plaintext, key, and nonce, demonstrating correct ciphertext generation and plaintext recovery with authenticated integrity (validates architectural extensibility to AEAD primitives).
Figure 16.
Keccak (SHA-3) simulation waveform showing a 128-bit input message absorbed into the internal state and processed by Keccak-f permutations to produce a 256-bit hash output, demonstrating its one-way integrity and authentication function.
Figure 16.
Keccak (SHA-3) simulation waveform showing a 128-bit input message absorbed into the internal state and processed by Keccak-f permutations to produce a 256-bit hash output, demonstrating its one-way integrity and authentication function.
Figure 17.
Encryption processing latency of AES-128, ASCON, and Keccak implemented on FPGA, compared against representative 5G IoV service latency requirements (URLLC, eMBB, and mMTC). The logarithmic scale highlights the orders-of-magnitude gap between cryptographic delays and end-to-end 5G latency budgets.
Figure 17.
Encryption processing latency of AES-128, ASCON, and Keccak implemented on FPGA, compared against representative 5G IoV service latency requirements (URLLC, eMBB, and mMTC). The logarithmic scale highlights the orders-of-magnitude gap between cryptographic delays and end-to-end 5G latency budgets.
Table 1.
Comparative Analysis of Cryptographic Security Paradigms for IoV: Primary Strengths, Critical Weaknesses, and Proposed Architecture Innovations.
Table 1.
Comparative Analysis of Cryptographic Security Paradigms for IoV: Primary Strengths, Critical Weaknesses, and Proposed Architecture Innovations.
| Security Paradigm | Primary Strengths | Critical Weaknesses | Proposed Architecture Innovation |
|---|
| Software-Based Encryption | High algorithmic flexibility; simple remote update. | Unpredictable latency; CPU bottlenecking; vulnerable to timing side-channel attacks. | Hardware-accelerated execution ensures deterministic, sub-microsecond processing independent of CPU load. |
| Fixed Hardware Accelerators | Exceptional maximum throughput; highly optimised area and power. | Static threat response; lacks crypto-agility against evolving classical or post-quantum threats. | Multi-cipher integration enables dynamic, context-aware switching among AES-128, ASCON, and Keccak. |
| Dynamic Partial Reconfiguration | Conserves FPGA slice logic by swapping cipher bitstreams on demand. | Millisecond-scale downtime during reconfiguration; entirely unsuitable for fast-fading vehicular channels. | Single-cycle switching via synchronised multiplexing eliminates reprogramming downtime, preserving continuous streaming. |
| AI-Based Threat Detection | High accuracy for complex anomaly detection. | Computationally burdensome; reliant on edge–cloud communication latency. | Edge-based, deterministic pre-selection matrix operating instantaneously at the physical layer boundary. |
Table 2.
FPGA resource utilisation for the OFDM transmitter with and without adaptive encryption. The adaptive design remains within the available resources of the XC7K325T device.
Table 2.
FPGA resource utilisation for the OFDM transmitter with and without adaptive encryption. The adaptive design remains within the available resources of the XC7K325T device.
| Metric | OFDM Only | OFDM + Adaptive | Availability |
|---|
| Slice registers | 120 | 520 | 82,000 |
| Flip-flops | 120 | 520 | – |
| Slice LUTs | 14,845 | 31,710 | 41,000 |
| Logic LUTs | 5387 | 18,910 | 41,000 |
| Memory LUTs | 2946 | 12,800 | 13,400 |
| Occupied slices | 1786 | 8501 | 10,250 |
| Unused FFs | 13,725 | 31,196 | 31,716 |
| Unused LUTs | 2 | 6 | 31,716 |
| Fully used LUT–FF pairs | 117 | 514 | 31,716 |
| Other logic elements | 23 | 128 | 300 |
Table 3.
FPGA resource utilisation for the OFDM receiver with and without adaptive encryption. The adaptive design increases resource usage but remains within the limits of the XC7K325T device.
Table 3.
FPGA resource utilisation for the OFDM receiver with and without adaptive encryption. The adaptive design increases resource usage but remains within the limits of the XC7K325T device.
| Metric | OFDM Only | OFDM + Adaptive | Availability |
|---|
| Slice registers | 109 | 478 | 82,000 |
| Flip-flops | 109 | 478 | – |
| Slice LUTs | 10,678 | 29,834 | 41,000 |
| Logic LUTs | 9453 | 16,347 | 41,000 |
| Memory LUTs | 2846 | 11,356 | 13,400 |
| Occupied slices | 1829 | 8245 | 10,250 |
| Unused FFs | 11,563 | 29,813 | 31,716 |
| Unused LUTs | 2 | 6 | 31,716 |
| Fully used LUT–FF pairs | 113 | 496 | 31,716 |
| Other logic elements | 33 | 128 | 300 |
Table 4.
Breakdown of the Single-Cycle Switching Mechanism. Latency values are derived from post-implementation timing analysis. Stability verified across 10 randomised transitions.
Table 4.
Breakdown of the Single-Cycle Switching Mechanism. Latency values are derived from post-implementation timing analysis. Stability verified across 10 randomised transitions.
| Pipeline Stage | Latency (ns) | Notes on Stability |
|---|
| Control signal propagation | 2–5 | Verified across all cores |
| Cipher enable/de-enable transition | 3–8 | No glitches observed |
| Pipeline flush & re-initialisation | 10–20 | Deterministic, single-cycle |
| Buffer synchronisation | 15–25 | Stable under high throughput |
| Total switching latency | 86 ns | Matches reported range |
| Switching success rate | 99.99% verified over 10 transitions |
Table 5.
Comparison between the proposed adaptive encryption algorithm and lightweight, post-quantum secure cryptography based on ASCON.
Table 5.
Comparison between the proposed adaptive encryption algorithm and lightweight, post-quantum secure cryptography based on ASCON.
| Aspect | Proposed Adaptive Encryption Algorithm | Lightweight, Post-Quantum Secure Cryptography Based on Ascon (Automotive FPGA) |
|---|
| Cipher choice | Multi-cipher adaptive (AES, ASCON, Keccak) | Single cipher (ASCON only) |
| PQC Readiness | Native support (ASCON, Keccak) | Native (ASCON) |
| Latency | Adaptive trade-off (AES slower, ASCON faster, Keccak flexible) | Optimized low-latency ASCON |
| Security | Strong + lightweight + flexible | Lightweight |
| FPGA Resources | Higher (three instantiated cores) | Lower (single optimized core) |
| Domain | IoV, IoT, PQC migration-ready | IoT, vehicular, replay protection |
| Delay | AES: ∼60 ns, ASCON: ∼20–30 ns, Keccak: ∼40 ns | ASCON: ∼20 ns |
| Adaptivity | Context-aware switching (latency vs. security) | Single optimized cipher (no adaptivity) |
| BER | Channel BER mitigated by interleaving; ASCON/Keccak AEAD reduces effective BER | ASCON AEAD + replay protection; lower effective BER |
| Overhead | Slightly higher due to multi-core FPGA design | Lower due to single optimized core |
Table 6.
Representative FPGA baselines for lightweight encryption (automotive/IoV) compared with this work.
Table 6.
Representative FPGA baselines for lightweight encryption (automotive/IoV) compared with this work.
| Work | Cipher | FPGA | LUTs | (MHz) | Latency | Multi-Cipher |
|---|
| [19] | AES-128 only | Kintex-7 | ∼15,000 | 150 | ∼67 ns | No |
| This work (TX) | AES/ASCON/Keccak | Kintex-7 | 31,710 | 16.4–123.6 | 8–610 ns | Yes |
Table 7.
Transmitter (XC7K325T): Normalized Resource Usage and Headroom.
Table 7.
Transmitter (XC7K325T): Normalized Resource Usage and Headroom.
| Metric | OFDM Only | OFDM + Adaptive | Headroom |
|---|
| | (Abs; % of Avail.) | (Abs; % of Avail.) | After Adaptive (%) |
|---|
| Slice LUTs (avail. 41,000) | 14,845 (36.2%) | 31,710 (77.3%) | 22.7% |
| Memory LUTs (avail. 13,400) | 2946 (22.0%) | 12,800 (95.5%) | 4.5% |
| Occupied slices (avail. 10,250) | 1786 (17.4%) | 8501 (82.9%) | 17.1% |
Table 8.
Receiver (XC7K325T): Normalized Resource Usage and Headroom.
Table 8.
Receiver (XC7K325T): Normalized Resource Usage and Headroom.
| Metric | OFDM Only | OFDM + Adaptive | Headroom |
|---|
| | (Abs; % of Avail.) | (Abs; % of Avail.) | After Adaptive (%) |
|---|
| Slice LUTs (avail. 41,000) | 10,678 (26.0%) | 29,834 (72.8%) | 27.2% |
| Memory LUTs (avail. 13,400) | 2846 (21.2%) | 11,356 (84.7%) | 15.3% |
| Occupied slices (avail. 10,250) | 1829 (17.8%) | 8245 (80.4%) | 19.6% |
Table 9.
Throughput and Latency Bounds (from Core ).
Table 9.
Throughput and Latency Bounds (from Core ).
| Cipher | Block | Rounds | (MHz) | TP (Gb/s) † | Lat/TP (Iter.) ‡ |
|---|
| DES § | 64 b | 16 | 123.6 | 7.91 | 129.45 ns/0.494 Gb/s |
| AES-128 | 128 b | 10 | 16.4 | 2.10 | 609.76 ns/0.210 Gb/s |
Table 10.
Example Adaptive Mix (70% ASCON / 30% AES-128).
Table 10.
Example Adaptive Mix (70% ASCON / 30% AES-128).
| Quantity | Value | Calculation |
|---|
| Avg. per-block latency | 200.43 ns | |
| Effective throughput | 0.384 Gb/s | |