Preprint
Article

This version is not peer-reviewed.

Adaptive Hybrid Consensus Engine for V2X Blockchain: Real-Time Entropy-Driven Control for High Energy Efficiency and Sub-100 ms Latency

A peer-reviewed article of this preprint also exists.

Submitted:

29 December 2025

Posted:

30 December 2025

You are already at the latest version

Abstract
We present an adaptive governance engine for blockchain-enabled Vehicular Ad Hoc Networks (VANETs) that manages latency-energy-coherence trade-offs under rapid topology changes3. We introduce (i) an Ideal Information Cycle as an operational abstraction of information injection and validation and (ii) a modular VANET Engine implemented as a real-time control loop in NS-3.354. The Engine monitors normalized Shannon entropies—informational entropy $S$ over active transactions and spatial entropy $H_{spatial}$ over occupancy bins (both on [0, 1])—and adapts the consensus mode (PoW versus signature/quorum-based modes such as PoS/FBA) together with key rigor parameters via calibrated policy maps5. Governance is cast as a constrained operational objective that trades per-block resource expenditure (radio + cryptography) against a Quality-of-Information (QoI) proxy derived from delay/error tiers, subject to timeliness and ledger-coherence pressure6. Cryptographic cost is explicitly traceable through counted operations, $E_{crypto} = e_h n_{hash} + e_{sig} n_{sig}$, and coherence is tracked via an LCA/LCP-normalized ledger-divergence metric7. We evaluate the framework under urban/highway mobility, scheduled partitions, and bounded adversarial stressors (Sybil identities, Byzantine proposers), using 600 s runs with 30 matched random seeds per configuration and 95% bootstrap confidence intervals8. In high-disorder regimes ($S \ge 0.8$), the Engine reduces total per-block energy (radio + cryptography) by more than 90% relative to a fixed-parameter PoW baseline tuned to the same latency target9. A consensus-first triggering policy further lowers agreement latency and increases throughput compared with broadcast-first baselines10. Under high mobility ($v=30$ m/s) in the emphasized urban setting, the Engine bounds orphaning ($\le 10\%$), keeps finality within sub-150 ms ranges, and reduces average ledger divergence below 0.07 at high spatial disorder11. Scope and security envelope: the main evaluation is limited to $N \le 100$ vehicles under full PHY/MAC fidelity12. PoW targets are intentionally latency-feasible and are not intended to provide cryptocurrency-grade majority-hash security; operational security and mode-transition considerations are discussed explicitly in Section 413.
Keywords: 
;  ;  ;  ;  ;  ;  ;  ;  ;  ;  

1. Introduction

Vehicular Ad Hoc Networks (VANETs) enable time-critical vehicle-to-vehicle and vehicle-to-infrastructure communication to enhance road safety, optimize traffic flows, and support cooperative services [1,2]. However, high mobility, rapidly changing topologies, intermittent connectivity, and short-lived communication windows make integrity, availability, and timely agreement difficult to achieve in practice [3,4]. In such environments, the core systems problem is not merely choosing a consensus algorithm but designing governance: deciding when and how strongly to validate and commit information under strict V2X timeliness constraints and mobility-driven fragmentation.
Blockchain-style ledgers have been proposed to improve auditability, integrity, and coordination in VANETs, yet existing approaches typically emphasize isolated objectives: consensus performance under fixed parameters [5,6], entropy-inspired indicators without closed-loop control [7], or single-algorithm evaluations under restricted conditions [8]. What remains missing is a unified operational framework that (i) makes injection–validation dynamics explicit under deadline constraints, (ii) measures spatial dispersion in real time (a key driver of partitions, forks, and coherence loss), and (iii) adapts consensus regime and validation rigor to instantaneous disorder rather than relying on fixed-parameter baselines.
  • Ideal Information Cycle (High-Level Intuition)
We model VANET ledger governance as a control loop with two antagonistic legs: (i) message/transaction injection that increases informational disorder, and (ii) consensus validation that consumes resources to compress disorder and improve an operational Quality-of-Information (QoI) proxy. In our notation, injection tends to increase S (informational entropy) and is exacerbated by topology fragmentation captured by H spatial (spatial entropy), whereas validation is the “work” leg that reduces effective disorder (rejecting stale/invalid microstates) and stabilizes convergence under deadlines. The Ideal Information Cycle (Figure 1) is therefore used strictly as an operational governance abstraction that motivates the monotonicity/stability constraints imposed during policy-map calibration, rather than as a claim of physical thermodynamic equivalence.
  • Proposed Framework
We introduce two complementary constructs: the Ideal Information Cycle and the VANET Engine. The cycle is an operational abstraction of injection (disorder growth) and validation (disorder compression) under V2X deadlines. Building on it, the VANET Engine is a decentralized, cluster-local control loop (e.g., per intersection/segment/connected subgraph) that monitors normalized Shannon entropies: informational entropy S over active transactions and spatial entropy H spatial over occupancy bins (both on [ 0 , 1 ] by normalization to their maxima). The Engine adapts (a) the consensus mode (PoW vs. signature/quorum-based modes such as PoS/FBA) and (b) key rigor parameters via calibrated policy maps. Governance is cast as a constrained operational objective trading per-block resource expenditure (radio + cryptography) against a QoI proxy derived from delay/error tiers, under timeliness and ledger-coherence pressure (formal statement in Section 3.6.8). Cryptographic cost is made explicitly traceable through operation counts, E crypto = e h n hash + e sig n sig .
  • Scope & Security Envelope
Our claims are limited to operational security and performance for V2X-oriented ledgers under mobility and churn, with full PHY/MAC fidelity up to N 100 vehicles. We do not claim physical equivalence between thermodynamic and informational quantities; entropies are used strictly as measurable governance signals. Moreover, PoW targets are calibrated to be latency-feasible (to respect freshness constraints) and therefore do not provide cryptocurrency-grade majority-hash security in open permissionless settings. Security implications of the latency-feasible regimes, mode transitions, and entropy manipulation are addressed explicitly in Section 4.
  • Scope and Claims (Operational, Not Thermodynamic)
We do not claim physical equivalence between thermodynamic variables and network measurements. Entropy is used strictly as an operational governance signal for real-time adaptation. Our evaluation therefore focuses on measurable VANET objectives: agreement latency, per-block energy, throughput, orphan/fork rates, finality, and ledger coherence under mobility and churn. Furthermore, signature/quorum-based modes (PoS/DPoS/FBA) are interpreted in a permissioned/consortium sense (validator sets and quorum slices are configured), consistent with realistic V2X deployments involving RSUs and credentialing. PoW, when used, operates under latency-feasible targets required by V2X timeliness envelopes; it is not presented as cryptocurrency-grade Nakamoto security (see Section 4).
  • From Design Objective to Implementable Policy
Governance is expressed as a constrained objective that trades per-block resource expenditure (radio + cryptography) against the QoI proxy, subject to latency and ledger-coherence constraints (formalized in Section 3.6.8). To implement this objective, the Engine applies adaptive maps
D = g ( S , H spatial ) , T = f ( S , H spatial ) ,
where D denotes the PoW target register on a 256-bit scale (dimensionless; smaller implies harder PoW) and T denotes a dimensionless stake/quorum rigor threshold anchored by T 0 . We instantiate g and f via constrained policy approximation: a function-class search with 5-fold cross-validation on simulation traces (Section 3.6.5), subject to stability constraints that reflect the control objective, namely (i) a non-decreasing envelope in S (stronger validation as informational disorder increases) and (ii) a Lipschitz-bounded response in H spatial to avoid unstable reactions under mobility. Low-order Fourier structure in H spatial is included only when it improves out-of-sample fit, capturing empirically observed non-monotone sensitivity (e.g., clustering versus fragmentation). All coefficients, base scales ( D 0 , T 0 ) , and diagnostics are reported once for reproducibility.
  • Traceable Resource Accounting
Cryptographic cost is made explicitly traceable through operation counts,
E crypto = e h n hash + e sig n sig ,
so the reported cryptographic energy directly links to PoW hashing effort and/or signature/quorum operations under the selected regime. Total per-block energy combines NS-3 radio models with this analytical cryptographic term (Section 5.7); no host-side power tools are used in reported figures or statistics.
  • Research Hypotheses
To match the empirical tests in Section 6, we evaluate the following hypotheses using matched-seed contrasts:
H1: 
Under PoW, cryptographic energy per block increases with informational entropy S, whereas signature/quorum-based modes (PoS/DPoS/FBA) are comparatively weakly coupled to S in the latency-feasible regime.
H2: 
A consensus-first (CF) policy (validate immediately when S > S th ) reduces agreement latency and packet overhead and increases throughput relative to broadcast-first (BF) baselines with dwell τ .
H3: 
Increasing spatial disorder ( H spatial ) degrades timeliness and validation accuracy under static settings; the adaptive Engine mitigates this degradation by tightening rigor where dispersion is highest.
H4: 
Increasing mobility (speed v) increases orphan/fork rates and finality under static schemes; the adaptive Engine limits these increases via entropy-driven mode/parameter updates.
H5: 
Under high spatial disorder, the adaptive Engine preserves microstate consistency by reducing ledger divergence (LCA-normalized) relative to static baselines.
  • Validation Overview
We implement the Engine [9] across urban and highway settings with 30 matched random seeds per configuration and 600 s runs (unless otherwise stated), evaluating scenarios up to N 100 vehicles under full PHY/MAC fidelity. We include scheduled partitions (controlled k-cut disconnections) and bounded adversarial stressors (Sybil-like pseudonyms, Byzantine proposers, and eclipse windows) as sensitivity analyses; parameters and definitions are reported where used (Section 5 and Section 3.6.5). Ledger coherence is quantified via an LCA-normalized divergence metric averaged pairwise across nodes; the exact definition used for all curves and statistics is given in Section 3.1.1 (and reiterated in Appendix A for completeness). Reproducibility artifacts (scenario drivers, seed lists, configuration files, and plotting scripts) are released in the public repository snapshot described in Section 5.6.
Main Contributions
  • Control-inspired injection–validation abstraction. We introduce an Ideal Information Cycle that provides a consistent operational interpretation of injection, validation effort, and QoI under V2X deadline constraints.
  • Entropy-aware, decentralized governance loop. We propose a modular VANET Engine that monitors normalized entropies ( S , H spatial ) and adapts consensus regimes and rigor parameters in real time.
  • Stability-constrained policy maps for hybrid consensus. We instantiate non-linear mappings D = g ( S , H spatial ) and T = f ( S , H spatial ) through cross-validated function-class search under monotonicity and Lipschitz stability constraints, avoiding manual tuning and fixed-parameter hybrids.
  • Prototype and evaluation under mobility and stressors. We provide an integration and an evaluation with 30 matched seeds and 95% bootstrap confidence intervals, reporting latency, per-block energy, throughput, finality, and coherence dynamics under mobility, partitions, and bounded adversarial stressors.

2. Related Work and Fundamental Principles

This section surveys blockchain–VANET (IoV/V2X) integration under mobility and churn, summarizes consensus choices commonly proposed for vehicular settings, and distills the security/latency pressures that motivate a lightweight governance layer. We then position our use of normalized Shannon entropies as operational observables for closed-loop adaptation. Formal objectives and structural properties are given in Section 3.6.8, and implementation/instrumentation details are in Section 5 and Section 5.5.

2.1. Blockchain in VANETs/IoV: Overview and Limitations

A growing body of work leverages blockchain to support secure data transactions, auditability, and accountability in vehicular and vehicular-IoT settings, often complemented with smart contracts to automate authorization, conditional data sharing, incentives, and compliance workflows across heterogeneous stakeholders (vehicles, RSUs, authorities, service providers). However, surveys and systematizations consistently report that many blockchain-for-IoV proposals optimize a single axis (e.g., security, throughput, or latency) under fixed consensus parameters and relatively stable validator assumptions, which do not hold under VANET churn, mobility-driven partitions, and fast role changes. Consequently, the practical gap is not the availability of blockchain primitives per se, but the lack of a closed-loop governance layer that (i) monitors disorder observables in real time—including spatial dispersion—and (ii) adapts consensus mode and rigor under V2X deadlines with explicit latency/energy accounting. Table 1 summarizes representative directions and highlights limitations most salient for closed-loop (state-driven) governance under mobility and churn.
Overall, the gap is not the absence of blockchain mechanisms per se, but the absence of a closed-loop governance layer that (i) monitors disorder observables in real time (including spatial dispersion) and (ii) adapts consensus mode and rigor under V2X deadlines with explicit latency/energy accounting.

2.2. Consensus Mechanisms for VANETs and Adaptive Baselines

Consensus under VANET dynamics faces a structural tension: stronger integrity mechanisms typically increase coordination and cryptographic work, while mobility degrades quorum formation and block propagation, amplifying forks and delayed finality. Prior studies emphasize that consensus outcomes are parameter-sensitive and regime-dependent (network load, contention, validator availability, and target latency), motivating comparisons at the level of scaling forms and operational envelopes rather than single-point constants. This motivates our design choice to treat consensus selection and rigor as control variables conditioned on measured disorder, rather than as fixed configuration knobs. Since concrete outcomes depend on parameterization, network load, PHY/MAC contention, and target latency, Table 2 reports scaling forms and regime-level considerations (rather than fixed constants). Unless stated otherwise, “energy” below refers to the cryptographic component; radio energy is accounted separately by NS-3 device models and is reported jointly with crypto energy in the expanded comparisons (Section 6.8).

Baseline clarity and naming.

To avoid ambiguity across sections, we use the following terms consistently: (i) Static PoW/PoS refers to single-family consensus with fixed parameters (no state feedback); (ii) Vanilla Hybrid refers to a two-mode hybrid that may switch families but uses fixed thresholds and fixed parameters (no calibration, no stability constraints); (iii) Hybrid Engine refers to the proposed closed-loop controller that adapts both mode and rigor parameters via g ( S , H spatial ) and f ( S , H spatial ) .

2.3. Security and Latency Constraints in VANETs

VANETs disseminate safety-critical messages (e.g., cooperative awareness and event notifications) over DSRC/802.11p or C-V2X under stringent latency budgets and intermittent connectivity [3,14]. In practice, high-load non-safety traffic must not degrade safety performance, and governance mechanisms must remain robust under contention, link breaks, and component-wise operation [4]. Table 3 structures canonical challenges as governance triggers and the impacts that a control layer must react to.

2.4. Information-Theoretic Principles for Governance (Operational View)

We quantify network disorder using true Shannon entropies as operational observables for closed-loop governance: (i) informational entropy S over the distribution of active transactions across nodes within a sampling window, and (ii) spatial entropy H spatial over vehicle dispersion across spatial bins/clusters. Both are computed with natural logarithms (nats) over normalized distributions and then reported on [ 0 , 1 ] by division by their respective maxima (e.g., S = S / ln K and H = H spatial / ln M for K active transactions and M spatial bins). For readability, we reuse symbols S and H spatial for the normalized values in plots and tables; the raw/normalized distinction is made explicit in Section 6 and Appendix A.8. These quantities are dimensionless after normalization and are not equated with thermodynamic entropy; thermodynamic terminology (“cycle”, “work”) is used strictly as an engineering analogy for resource–quality trade-offs. Energy is accounted in Joules via NS-3 radio models plus an analytical cryptographic term (Section 5.5); host-side power tools are not used in reported figures or statistics.

Positioning

Recent literature increasingly explores adaptive and learning-assisted components for vehicular consensus (e.g., RL-guided peer selection and learning-enabled pipelines). These trends motivate a principled and reproducible governance loop that uses explicit, interpretable state observables and reports complete parameter provenance and accounting. The subsequent sections provide our optimization-guided design, the calibrated control maps, and the NS-3 implementation/instrumentation used to produce the reported results.

3. Hypothesis Formulation and Methodology

This work targets secure, low-latency governance in VANETs by combining a control-inspired Ideal Information Cycle—used strictly as an engineering analogy for resource–quality trade-offs—with a modular VANET Engine deployed per geographic cluster. The Engine actively monitors system disorder to adapt the consensus mode and rigor in real time. To minimize redundancy, formal metric definitions are provided in Section 3.1, while symbols are summarized in Table 4.
To operationalize the control loop, we utilize two normalized Shannon entropies (mapped to [ 0 , 1 ] ) as the primary real-time observables:
(i)
S ( t ) , representing the entropy of the active transaction microstate distribution; and
(ii)
H spatial ( t ) , representing the entropy over spatial occupancy bins.
These observables quantify the disorder that the system must counteract. The resulting governance cycle, where validation rigor balances the injected disorder to maintain Quality-of-Information (QoI), is illustrated in Figure 1.

3.1. Core Metrics, Normalization, and Boundedness

We operate on four observables. Informational and spatial disorder are captured via normalized Shannon entropies in [ 0 , 1 ] , while QoI and ledger divergence provide operational performance and coherence signals.

Informational Entropy S ( t )

Let T ( t ) be the set of distinct pending transactions at time t and let c i ( t ) be the number of nodes currently holding transaction id i T ( t ) . Define the normalized copy distribution
p ˜ i ( t ) = c i ( t ) k T ( t ) c k ( t ) , i T ( t ) p ˜ i ( t ) = 1 ,
and the bounded Shannon entropy
S ( t ) = i T ( t ) p ˜ i ( t ) ln p ˜ i ( t ) ln | T ( t ) | [ 0 , 1 ] .
We apply Laplace smoothing c i c i + ε with ε = 10 6 to avoid numerical issues; results are insensitive to ε .
We use natural logarithms (nats) and normalize by ln | T ( t ) | so that S ( t ) [ 0 , 1 ] by construction. For reviewer traceability, the normalization/boundedness is restated verbatim in Appendix A.8.

Spatial Entropy H spatial ( t )

Partition the area into M spatial bins; let n j ( t ) be the number of vehicles in bin j and N ( t ) = j = 1 M n j ( t ) . With q j ( t ) = n j ( t ) / N ( t ) ,
H spatial ( t ) = j = 1 M q j ( t ) ln q j ( t ) ln M [ 0 , 1 ] .
Spatial binning uses a fixed M per scenario (Table 8), and normalization by ln M ensures H spatial ( t ) [ 0 , 1 ] . For reviewer traceability, the normalization/boundedness is restated verbatim in Appendix A.8.

QoI Proxy (Delay and Validity Tiers)

For each transaction t i , we record (i) end-to-end delay Δ t i (ms) and (ii) a binary validity indicator ϵ i { 0 , 1 } , where ϵ i = 1 denotes an invalid signature, stale timestamp, or failed format/consistency check. QoI is operationalized through delay/error tiers (Section 3.6.5) and used in candidate-set formation (prioritize small Δ t i , discard ϵ i = 1 ). QoI is an engineering proxy and is not interpreted as a physical quantity.

3.1.1. Ledger-Divergence Metric and Fork/Orphan Detection

Ledger Divergence D ledger ( t ) .

For nodes u , v with heads h u ( t ) , h v ( t ) at time t, let lca ( h u , h v ) be their lowest common ancestor and depth ( · ) block depth. We define the pairwise normalized divergence
δ u , v ( t ) = depth ( h u ( t ) ) + depth ( h v ( t ) ) 2 depth ( lca ( h u ( t ) , h v ( t ) ) ) max { 1 , depth ( h main ( t ) ) } ,
and the instantaneous average
D ledger ( t ) = 2 N ( N 1 ) u < v δ u , v ( t ) .
This LCA-normalized form makes D ledger ( t ) comparable across runs with different block production rates and prevents artificial inflation early in the run when chain depth is small.

Fork/Orphan Rate

We report orphan/fork rate O as the fraction of produced blocks that do not lie on the final main chain at simulation end (logged via orphan_flag; see Table 9).

3.1.2. Ledger Divergence D ledger ( t ) (Microstate Coherence)

Let L u ( t ) denote the ordered block sequence (main-chain view) at node u at time t, and let h u ( t ) = | L u ( t ) | be its height. For any pair of nodes u v , define LCP ( u , v , t ) as the length of the longest common prefix of L u ( t ) and L v ( t ) . We quantify instantaneous pairwise divergence as
δ ( u , v , t ) = 1 LCP ( u , v , t ) max { 1 , max ( h u ( t ) , h v ( t ) ) } , δ ( u , v , t ) [ 0 , 1 ] ,
and define the network-average ledger divergence by
D ledger ( t ) = 2 N ( t ) ( N ( t ) 1 ) u < v δ ( u , v , t ) [ 0 , 1 ] ,
where N ( t ) is the number of active nodes at time t.

Interpretation and Edge Cases

D ledger ( t ) = 0 implies identical prefixes across all nodes (perfect coherence), while larger values indicate greater disagreement in committed history. The max { 1 , · } safeguard avoids division by zero during initialization (empty ledgers). In all figures and statistical analyses, “ D ledger ( t ) ” refers to this LCP-normalized definition.
This is the quantity labeled D ledger ( t ) in all figures and statistical analyses and matches the definition in Section 3.1.1.

3.2. Ledger-Divergence Metric and Fork/Orphan Detection

Purpose

We quantify microstate consistency across nodes through an instantaneous, bounded divergence metric that captures how far node-local ledgers have drifted due to mobility, partitions, and competing commits. This complements the end-of-run orphan/fork rate by providing a time-resolved coherence signal used in Figure 9 and related analyses.

Ledger Representation

Let L u ( t ) = B 0 , B 1 , , B h u ( t ) denote the ordered block sequence (from genesis B 0 to the current head) at node u at time t, where h u ( t ) is the node’s current chain height.

Longest Common Prefix and Pairwise Divergence

For two nodes u v , let LCP ( u , v , t ) be the length (in blocks) of their longest common prefix at time t, i.e., the maximum such that
B k ( u ) ( t ) = B k ( v ) ( t ) for all k { 0 , 1 , , 1 } .
We define the pairwise, height-normalized divergence
δ ( u , v , t ) = 1 LCP ( u , v , t ) max { h u ( t ) , h v ( t ) } + 1 [ 0 , 1 ] ,
where the + 1 ensures that the normalization is in blocks (including genesis) and avoids division-by-zero when heights are zero.

Network-Average Divergence

With N ( t ) active nodes at time t, the instantaneous ledger divergence is
D ledger ( t ) = 2 N ( t ) N ( t ) 1 u < v δ ( u , v , t ) [ 0 , 1 ] .
A value near 0 indicates that most nodes share long common prefixes (high coherence), while larger values indicate persistent forks/partitions or delayed convergence.

Time Aggregation Used in Plots

For seed-wise summaries, we compute D ¯ ledger as the discrete-time average over the evaluation window (after warm-up):
D ¯ ledger = 1 | W | t W D ledger ( t ) ,
where W contains the sampled timestamps (default: 1 s sampling and key events, aligned with Section 3.4). For Figure 9, we bin each seed’s samples by H spatial (equal-width bins) and report the mean across seeds with 95% BCa bootstrap confidence intervals.

Fork/Orphan Rate (End-of-Run)

We report orphan/fork rate O as the fraction of produced blocks that do not lie on the final main chain at simulation end:
O = | B orphan | | B total | ,
where B orphan are blocks not on the selected main chain at t end . This metric is computed from the logged orphan_flag (Section 5.5).

Computation from Logs (Reproducibility)

We reconstruct L u ( t ) from per-event logs by storing each committed block hash and its parent pointer for every node. The LCP ( u , v , t ) is then obtained by walking back from the heads to the first common ancestor and translating that depth to a prefix length; since blockchain histories form rooted trees, this is equivalent to the depth of the last common block plus one (including genesis). All plots and statistics use this single definition.

3.3. Nomenclature

A compact list of symbols is provided in Table 4 to avoid re-defining variables throughout the Methods.

3.4. The VANET Engine: Entropy-Driven Governance

Sampling, smoothing, and triggers.

Every Δ T (default 1 s), each cluster-local Engine samples S ( t ) and H spatial ( t ) and applies exponential smoothing (EMA) to avoid thrashing around thresholds (Appendix A, Algorithm A1). If either smoothed observable exceeds its threshold ( S th or H th ), the Engine increases validation rigor (e.g., selecting a signature/quorum-based mode and tightening parameters); otherwise it relaxes rigor. Thresholds and Δ T are selected and validated as described in Section 3.6.5.

Adaptive Mappings (Policy Approximation)

For implementability, consensus rigor is instantiated via calibrated maps:
D g ( S , H spatial ) , Θ f ( S , H spatial ) ,
where D is the PoW target and Θ denotes the mode-specific rigor parameter (e.g., stake/quorum threshold, quorum-slice requirements). The maps are selected by cross-validated function-class search under monotonicity and stability constraints (Section 3.6.5), consistent with the constrained optimization objective in Section 3.6.8.

Mode Selection

mode = Signature / quorum - based ( rigorous ) if S > S th or H spatial > H th , PoW ( lower coordination cos t ) otherwise .
Candidate sets prioritize fresher transactions (small Δ t i ) and discard invalid/stale ones ( ϵ i = 1 ) before consensus.
Algorithm 1 VANET Engine (cluster-local control loop)
1:
Repeat every Δ T : sample S , H spatial ; compute D g ( S , H spatial ) and Θ f ( S , H spatial )
2:
if S > S th or H spatial > H th then
3:
    mode ← signature/quorum-based
4:
else
5:
    mode ← PoW
6:
end if
7:
Build a QoI-aware candidate set; execute the selected consensus; append block
8:
Purge invalid transactions; update local state; loop

3.5. Hypotheses

We test the following hypotheses using matched-seed contrasts across identical mobility/load conditions.
H1 (Energy vs. informational disorder). As S increases, PoW crypto energy per block increases steeply through the expected hash trials, while signature/quorum-based modes scale primarily with the number of signature/verification operations. An entropy-driven controller therefore reduces total energy under high S by down-selecting PoW and/or tightening rigor efficiently.
H2 (Consensus-first under high disorder). Triggering validation when S > S th (Consensus-First) reduces end-to-end agreement latency and packet overhead compared with dwell-based broadcast-first policies.
H3 (Spatial disorder effects). Increasing spatial disorder ( H spatial ) degrades propagation and quorum stability, increasing latency and reducing accuracy/coherence in static schemes; localized adaptation mitigates these effects.
H4 (Mobility, orphans, and finality). Under higher mobility, static schemes experience increased orphaning and delayed finality, whereas entropy-adaptive mode/rigor tuning limits orphan rate O and finality F.
H5 (Ledger coherence under extreme disorder). At high S and high H spatial , the Engine maintains lower D ledger ( t ) (and thus higher coherence) than non-adaptive schemes.

3.6. Detailed Methodology

3.6.1. Simulation environment and implementation

All reported experiments use NS-3.35 [9]. The baseline PHY/MAC stack is IEEE 802.11p/WAVE (WaveHelper); additional C-V2X experiments, when reported, use an explicitly versioned integration layer described in Section 5 (to ensure reproducibility across NS-3 releases). The Engine runs as an application-layer process interfacing with packet sockets and a metrics service; consensus routines are pluggable via a common ConsensusModule interface (Appendix A). Radio energy is modeled with BasicEnergySource and WifiRadioEnergyModel. Cryptographic energy is added analytically using per-hash and per-signature constants (Table 5). Metrics are sampled at 1 s and on key events (block commit, mode switch) and aggregated per run.

Forks/Orphans and Finality (Operational Definitions)

A block is marked orphaned if it is not on the final main chain at simulation end; the orphan rate O is the fraction of orphaned blocks over produced blocks (logging flag orphan_flag=1). Finality F is measured as time-to-stable-commit: for PoW, the time until the block is buried by k subsequent blocks (default k reported alongside results); for signature/quorum-based modes, the time from proposal to reaching the required quorum/commit threshold. Unless otherwise stated, metrics are computed after a 60 s warm-up (window: 60–600 s).

3.6.2. Mobility and Dynamic Conditions

We generate mobility traces with BonnMotion [20] for: (i) an urban grid (1 km×1 km, 50–100 vehicles, 5–15 m/s, pause 0–3 s) and (ii) a highway (5 km, 100–200 vehicles, 15–30 m/s, pause 0–1 s). Dynamics include churn (join/leave), controlled partitions, and bursty transaction loads. Each configuration runs for 600 s with 30 matched seeds; 95% confidence intervals are computed via bootstrap (Section 3.6.7).

3.6.3. Partition and Adversarial Stressors (Sensitivity Analysis)

We include scheduled partitions and adversarial stressors to assess sensitivity and failure modes. Parameters are fully disclosed for reproducibility. The emphasized stressor results are reported in Section 6, while extended cases and implementation hooks are documented in Appendix A and Section 5.9.

3.6.4. Experimental Metrics

We record agreement latency (mean; 95% CI), per-block energy E block (J; radio+crypto), throughput (tx/s), orphan rate O (%), finality F (ms), and ledger divergence D ledger ( t ) . Metrics are computed per run and aggregated across matched seeds.

3.6.5. Parameterization and Calibration

Energy constants and hardware mapping.

Per-hash cost e h = 5  nJ/hash and per-signature cost e sig = 1 μ J/op (Table 5) represent software cryptography on embedded OBU-class hardware. We sweep e h [ 1 , 10 ]  nJ and e sig [ 0.5 , 2 ] μ J in sensitivity checks; qualitative trends remain unchanged. Host-level measurements are not used in reported energy curves or statistics.

PoW Energy Accounting (Difficulty-Traceable)

Let D = g ( S , H spatial ) denote the PoW target (smaller ⇒ harder). Under uniform hashes, the expected trials satisfy E [ n hash ] 2 256 / D . Define effective difficulty bits
d eff = log 2 2 256 D = 256 log 2 D , E PoW e h 2 d eff .
Targets are calibrated to meet V2X-oriented latency constraints in the simulated environment; security implications of the chosen regimes are discussed in Section 4.
Targets are calibrated for timeliness (V2X-oriented confirmation/finality latency constraints) in the simulated NS-3 environment and are not intended to match cryptocurrency-grade PoW hardness. The security implications of these latency-feasible target regimes, under the stated threat model, are discussed in Section 4.

Trigger Thresholds

We select S th = 0.50 and H th = 0.60 via a grid scan over [ 0 , 1 ] 2 on a training subset of seeds, using knee detection where latency increases nonlinearly and delivery drops below 95%. Robustness is evaluated on held-out seeds; ± 0.05 perturbations yield < 5 % variation in headline metrics.

Policy-Map Selection

To instantiate g and f, we perform a constrained function-class search with 5-fold cross-validation over mobility and load profiles. Candidate families include low-order polynomial, exponential/log, and spline bases; Fourier terms in H spatial are admitted only if they improve out-of-sample fit without violating stability constraints. We enforce: (i) a non-increasing PoW target with S (i.e., higher disorder never makes PoW easier), (ii) bounded sensitivity to H spatial via a Lipschitz cap to prevent thrashing, and (iii) positivity/feasibility of control registers ( D , T ) within ( D min , D max ) and ( T min , T max ) . The final fitted coefficients, goodness-of-fit, and stability checks are reported for reproducibility in Section 3.6.6 and Appendix B.

3.6.6. Fitted Policy Maps and Coefficients

Final Map Forms (Reported)

We report the final closed-form maps used by the Engine. Both maps are bounded by design to avoid unstable excursions:
D Clamp g ( S , H spatial ) , D min , D max , T Clamp f ( S , H spatial ) , T min , T max .

PoW target map g ( S , H spatial ) .

We model the PoW target on a log-scale for numerical stability:
log 2 D = β 0 + β S S + β H H spatial + β S H S H spatial + β H 2 H spatial 2 + β sin sin ( 2 π H spatial ) + β cos cos ( 2 π H spatial ) ,
and set g ( S , H spatial ) = 2 log 2 D . If Fourier terms are not selected, we set β sin = β cos = 0 .

Stake/quorum rigor map f ( S , H spatial ) .

We model the rigor register as an anchored, dimensionless threshold:
T = T 0 · 1 + α S S + α H H spatial + α S H S H spatial + α H 2 H spatial 2 ,
followed by clamping to [ T min , T max ] .

Coefficient Reporting

Table 6 presents the fitted coefficients employed in the released artifact. The adversary profiles, capabilities, and parameter ranges for the sensitivity analysis are summarized in Table 7. Furthermore, diagnostics such as fold-wise losses, constraint checks, and sensitivity metrics are reported in Appendix B.

3.6.7. Statistical Procedures

All figures report means over 30 matched seeds with 95% BCa bootstrap confidence intervals (10,000 resamples). Seeds are matched across conditions (blocking by mobility/load), and Holm–Bonferroni correction is applied for multiple pairwise contrasts. For headline comparisons we additionally report paired contrasts across matched seeds (Appendix A).

3.6.8. Theoretical Formulation and Validation Protocol

Operational Free-Governance Potential

We model governance as a control decision taken at discrete times k (period Δ T ), based on the observed disorder state x k = ( S k , H k , Q k ) , where S k [ 0 , 1 ] is normalized informational entropy, H k [ 0 , 1 ] is normalized spatial entropy, and Q k [ 0 , 1 ] is the operational QoI proxy (higher is better) derived from delay/error tiers. The governance action is
u k = m k , θ k , π k ,
where m k { PoW , PoS / DPoS , FBA } is the consensus mode, θ k = ( D k , T k ) are mode-dependent rigor registers (PoW target D k on a 256-bit scale; stake/quorum threshold T k in normalized stake units), and π k { CF , BF ( τ ) } denotes the triggering policy (Consensus-First vs. Broadcast-First dwell τ ).
We define a free-governance potential that trades resource cost against QoI under timeliness and coherence pressure:
Φ ( u k x k ) = E E tot ( u k ) η E Q ( u k ) + λ L E [ L ( u k ) L ] + + λ D E [ D ledger ( u k ) D ] + + λ O E [ O ( u k ) O ] + ,
where [ z ] + = max { z , 0 } , L is agreement/commit latency, D ledger is the LCA/LCP-normalized divergence used throughout the paper, O is orphan/fork rate, and ( L , D , O ) define the operational envelope for V2X timeliness and coherence.

Traceable energy model.

The total per-block energy decomposes into radio plus analytical crypto cost:
E tot = E radio + E crypto , E crypto = e h n hash + e sig n sig ,
where E radio is obtained from NS-3 device energy models and ( e h , e sig ) are fixed per-operation constants (Table 5). PoW logs realized n hash per committed block; signature/quorum modes log n sig (proposal+vote/endorsement+verification operations).

Constraints and stability requirements.

Governance choices are constrained to avoid unstable or unsafe control behavior:
( C 1 ) Bounded registers : D k [ D min , D max ] , T k [ T min , T max ] .
( C 2 ) Timeliness envelope : E [ L ( u k ) ] L ( or penalized via ( ) ) .
( C 3 ) Coherence envelope : E [ D ledger ( u k ) ] D , E [ O ( u k ) ] O ( or penalized ) .
( C 4 ) Monotone disorder response : log 2 D S 0 , T S 0 . ( C 5 ) Lipschitz response in H : log 2 D ( S , H 1 ) log 2 D ( S , H 2 ) L D | H 1 H 2 | ,
T ( S , H 1 ) T ( S , H 2 ) L T | H 1 H 2 | .
( C 6 ) Anti thrashing switching : mode changes apply hysteresis and a minimum dwell time τ min .
(C4) formalizes the design principle that higher transaction disorder should not lead to weaker validation; (C5)–(C6) ensure control-loop stability under mobility-driven fluctuations.

From Constrained Objective to Implementable Maps

The ideal controller would choose u k = arg min u k Φ ( u k x k ) under (C1)–(C6). Because exact online optimization is impractical in VANET control planes, we implement a compact policy approximation:
D k Clamp g ( S ^ k , H ^ k ) , D min , D max , T k Clamp f ( S ^ k , H ^ k ) , T min , T max ,
where ( S ^ k , H ^ k ) are EMA-smoothed observables and ( g , f ) are selected by function-class search with 5-fold cross-validation under explicit enforcement of (C4)–(C6) (Section 3.6.6 and Appendix B).

Proof Sketch (Formal But Concise)

(i) Boundedness and well-posedness. By (C1) and clamping, ( D k , T k ) remain in compact intervals for all k, hence the induced crypto cost in (2) is finite and the control law is well-defined.
(ii) No chattering (control stability). Let u k = ( m k , θ k , π k ) be the decision sequence. EMA smoothing makes ( S ^ k , H ^ k ) a contraction of the raw measurements. Under (C5), θ k is Lipschitz in ( S ^ k , H ^ k ) , so θ k + 1 θ k is bounded by a constant times ( S ^ k + 1 , H ^ k + 1 ) ( S ^ k , H ^ k ) . Together with hysteresis and minimum dwell (C6), the number of mode switches on any finite horizon is finite, preventing oscillations around thresholds.
(iii) Structural monotonicity. The monotone envelope (C4) ensures that increasing disorder S cannot lead to a weaker PoW target (in log 2 D ) nor a lower signature/quorum rigor T, aligning the implemented policy with the directionality implied by (1) when the latency/coherence penalties dominate in high-disorder windows.
(iv) Validation protocol. We validate the effect of (a) mode adaptation and (b) parameter adaptation by comparing: (1) Adaptive Engine (mode + ( g , f ) ), (2) Static PoW (fixed D), (3) Static signature/quorum-based (fixed T), and (4) Vanilla Hybrid (switching with fixed ( D 0 , T 0 ) ; formal definition provided alongside the baselines), under matched seeds and identical mobility/load.

State, Controls, and Observables

At cluster scope, the Engine observes at decision instants t the entropy state x t = ( S t , H t ) , where S t is informational entropy and H t = H spatial , t is spatial entropy (both normalized to [ 0 , 1 ] as defined in Section 2.4 and Appendix A). The Engine selects an action a t = ( m t , u t ) with discrete mode m t { PoW , PoS , DPoS , FBA } and mode-specific control register
u t = D t [ D min , D max ] , m t = PoW T t [ T min , T max ] , m t { PoS , DPoS } Q t ( slice choice / size , bounded ) , m t = FBA
where D t is a 256-bit PoW target (smaller ⇒ harder) and T t is a dimensionless stake/quorum-rigor register anchored at T 0 .

Performance Variables and QoI Proxy

Given ( a t , x t ) , the simulator yields random outcomes per confirmed block: total energy E block ( total ) = E block ( radio ) + E block ( crypto ) , confirmation latency L, validation accuracy α (fraction of valid payloads admitted), orphan/fork indicator, and ledger divergence D ledger (Section 3.1.1). The QoI proxy Q [ 0 , 1 ] is computed from delay and validity tiers (Section 3.6); we use ( 1 Q ) as a penalty for stale/invalid microstates.

Free-Governance Potential (Variational Objective)

We define an operational free-governance potential as an expected-cost functional that trades resource expenditure against QoI under timeliness and coherence constraints:
F ( a ; x ) = E E block ( total ) a , x + μ E ( 1 Q ) a , x + λ L E ( L L max ) + a , x + λ D E ( D ledger D max ) + a , x ,
where ( z ) + = max { z , 0 } and ( μ , λ L , λ D ) 0 are Lagrange-style penalty weights. The Engine’s myopic control law is the pointwise minimizer
a ( x ) = arg min a A F ( a ; x ) , A = { bounded registers and enabled modes } .
This makes explicit the manuscript’s “governance potential” claim: the Engine is the optimizer of (1) under bounded control registers, with QoI and coherence entering as constraints/penalties (not as thermodynamic conjugates).

A Compact “Proof Sketch” for the Structural Constraints Used in Calibration

The calibration constraints imposed on g ( S , H ) and f ( S , H ) (monotone envelope in S and Lipschitz-bounded response in H) follow from mild monotonicity assumptions on the simulator’s risk surfaces.
Assumption A (stress monotonicity). For fixed action a, expected stress increases with disorder:
S E [ L a , x ] 0 , H E [ L a , x ] 0 , S E [ D ledger a , x ] 0 , H E [ D ledger a , x ] 0 .
These inequalities hold empirically in our sweeps (Figure 7 and Figure 9).
Assumption B (rigor reduces coherence risk). Define a scalar rigor  ρ that increases with harder PoW targets or stronger quorum/stake requirements, e.g.,
ρ PoW ( D ) = log 2 D , ρ PoS ( T ) = log ( T / T 0 ) ,
and assume E [ D ledger a , x ] / ρ 0 (higher rigor reduces divergence and orphaning at the cost of higher crypto/message work).
Claim (monotone optimal rigor). Under Assumptions A–B and bounded registers, any minimizer of (10) can be chosen such that the selected rigor is non-decreasing in S:
S 1 S 2 ρ ( S 1 , H ) ρ ( S 2 , H ) .
Sketch. Consider two states ( S 1 , H ) and ( S 2 , H ) with S 2 > S 1 . If a candidate action at S 2 uses rigor ρ lower than the optimal rigor at S 1 , then by Assumption A the constraint-penalty terms in (9) cannot decrease, while the energy/QoI penalties cannot improve enough to compensate once ( L L max ) + or ( D ledger D max ) + activates. Therefore, in any optimal (or Pareto-minimal) solution, the minimal rigor satisfying the active constraints is non-decreasing in S. This directly motivates the monotone envelope in S imposed during function-class search.
Lipschitz response in H (stability). Since H can fluctuate rapidly under mobility, we additionally impose a bounded sensitivity | ρ / H | K H . With EMA smoothing ( S ^ , H ^ ) = EMA ( S , H ; λ ) (Appendix A), and a K H -Lipschitz policy, the induced control variation satisfies
ρ ( S ^ t , H ^ t ) ρ ( S ^ t 1 , H ^ t 1 ) K H x ^ t x ^ t 1 ,
which prevents threshold thrashing and justifies the stability constraint in calibration.

From the Variational Policy to the Reported Maps g and f

The explicit optimizer (10) is not computed online; instead we approximate a ( x ) with parametric maps: (i) a PoW target map D = g ( S , H ) and (ii) a stake/quorum rigor map T = f ( S , H ) (Section 3.6.6). The function-class search with 5-fold cross-validation selects a low-complexity basis that approximates the minimizer of (1) over the sampled mobility/load profiles, subject to the monotonicity and Lipschitz constraints justified above. In other words, the maps are data-fitted approximations of a clearly stated constrained objective, not claims of closed-form thermodynamic laws.

Validation Protocol (Comparators)

Validation compares four policies under identical mobility/load and matched random seeds: (i) Adaptive (Engine) using the fitted g , f and mode selection; (ii) Static PoW with fixed D; (iii) Static signature/quorum-based (PoS/FBA) with fixed T or fixed slices; and (iv) Vanilla Hybrid (fixed mode thresholds and fixed parameters, i.e., no entropy-conditioned tuning). All reported experiments use NS-3.35 with 600 s runs, 30 matched seeds, and BCa bootstrap confidence intervals (Section 3.6.7).

Baseline: Vanilla Hybrid (VH) — Fixed-Threshold, Fixed-Parameter Hybrid

We define Vanilla Hybrid as a non-adaptive switching baseline that uses the same mode-selection rule as the Engine (i.e., the same ( S th , H th ) triggers), but keeps all rigor parameters fixed. Concretely, it switches between PoW and signature/quorum-based consensus when S > S th or H spatial > H th , yet uses constant parameters ( D , T ) equal to their nominal mid-range values ( D 0 , T 0 ) throughout the run. Thus, Vanilla Hybrid isolates the effect of mode switching alone without the adaptive tuning induced by the learned maps g ( · ) , f ( · ) .
To separate the benefit of continuous entropy-conditioned tuning (policy maps g , f ) from the simpler benefit of mode switching, we define a non-adaptive hybrid baseline, termed Vanilla Hybrid (VH). VH observes the same real-time disorder signals as the Engine, namely informational entropy S ( t ) and spatial entropy H spatial ( t ) , but it does not use the fitted policy maps g ( · ) and f ( · ) and does not retune consensus rigor parameters online.
Formally, VH applies a fixed-threshold switching rule
mode VH ( t ) = PoW , if S ( t ) S th H spatial ( t ) H th , Sig / Quorum , otherwise ,
where ( S th , H th ) are the same thresholds reported in Table 8 (and used by the Engine). Crucially, the rigor parameters are fixed within each mode:
D VH ( t ) D 0 ( PoW target ) , T VH ( t ) T 0 ( stake / quorum rigor register ) .
In other words, VH is a two-regime hybrid with static  ( D 0 , T 0 ) and a binary switching surface in the ( S , H spatial ) plane; it does not implement the Engine’s smooth adaptation, coefficient-calibrated maps, or stability-constrained continuous control. All other shared mechanisms (transaction validation checks and logging/instrumentation) follow the common implementation described in Section 5.4 and Section 5.5.

4. Security Analysis and Threat Model

Scope & security envelope (what we do and do not claim).

Our objective is operational security for V2X-oriented ledgers: integrity at admission, timeliness under churn, and convergence/coherence within cluster-local connectivity windows. We do not claim cryptocurrency-grade, permissionless Nakamoto security. In particular, PoW targets in our experiments are calibrated to satisfy V2X timeliness constraints (Section 3.6.8); therefore, PoW in this paper must be interpreted as a latency-feasible mechanism rather than a stand-alone defense against sustained majority-hash adversaries.

4.1. Threat Model and Assumptions

We consider a vehicular environment with intermittent connectivity, mobility-driven partitions, and open message injection. Adversarial capabilities include packet injection/replay/delay/drop, bounded Sybil behavior (multiple pseudonyms), bounded Byzantine proposers (equivocation/double-propose), and transient eclipse windows. Our experiments implement bounded stressors (Section 6.7); fully adaptive coalitions with global coordination and learning are out of scope.
We assume a basic cryptographic baseline: transactions and control messages are signed and subject to timestamp/freshness checks; invalid or stale items are labeled ( ϵ i = 1 ) and handled by QoI-aware admission (Section 3.1). Signature/quorum-based modes (PoS/DPoS/FBA) are treated as permissioned/consortium-style modes (validator sets/quorum slices defined by configuration), consistent with V2X deployments where RSUs/authorities or membership services exist.

4.2. Low PoW Difficulty and Explicit 51% Risk (Addressing the Reviewer’s Concern)

Why our PoW Targets Are Intentionally “Easier”.

To meet sub-second (often sub-100 ms) V2X freshness constraints, PoW targets are calibrated so that expected mining/confirmation latency fits the timeliness envelope. This necessarily implies targets that are much easier than cryptocurrency-scale PoW.

Explicit Consequence: A Majority-Hash (“51%”) Adversary Would Be Feasible Under These Targets

Let E [ n hash ] = 2 256 / D be the expected number of hashes until success (uniform hash assumption). In our calibrated regime, E [ n hash ] is on the order of 10 11 per committed block (Section 7 magnitude sanity check). A modern GPU can reach 10 9 hashes/s for simple hashes; thus, a resourceful adversary could out-mine honest OBUs quickly if PoW were deployed as a permissionless security anchor. Therefore:
  • We do not claim PoW-based Sybil/majority resistance comparable to Bitcoin/Ethereum security assumptions.
  • PoW in this paper is a best-effort, latency-feasible mode suitable only under a restricted security envelope: (i) credentialed miners, (ii) RSU anchoring/checkpointing, or (iii) limited adversarial exposure.
  • In adversarially exposed deployments, PoW should be disabled or strictly constrained, and the Engine should prefer permissioned signature/quorum modes (PoS/FBA) as the security-bearing consensus family.

4.3. Mode Transitions (Addressing Safety Across Switching)

A reviewer concern is whether transitions between modes can introduce double-commit or allow adversaries to exploit weaker regimes. We address this explicitly by enforcing a transition barrier:
  • Epoch boundary. A mode is fixed for an epoch of length at least τ min (minimum dwell time), preventing rapid oscillations.
  • Commit barrier. Before a switch, nodes finalize the current candidate/commit attempt under the current mode (or time out), then freeze the epoch state (mempool snapshot + last committed header).
  • Prefix consistency check. The next epoch starts only from a ledger head that extends the last committed header (no backward reorg beyond the barrier), which bounds reorganization depth across transitions.
Operationally, the barrier ensures that switching does not create ambiguous concurrent commits under multiple modes. In our NS-3 implementation, transition events are logged and included in the divergence/orphan computation (Table 9).

4.4. Entropy Manipulation (Addressing “Can an Attacker Force Mode Selection by Changing S or H spatial ?)

A second reviewer concern is whether adversaries can strategically manipulate entropy observables to push the Engine into weaker regimes. We make two explicit points.
(1) The policy is conservative under disorder. The Engine switches away from PoW and increases validation rigor when either S or H spatial rises above thresholds. Thus, an attacker who inflates disorder observables cannot force the system into a weaker validation regime; the dominant failure mode is instead a DoS-like overhead increase (forcing conservative validation more often), not a security bypass.
(2) Hardening against adversarial entropy inflation. To mitigate entropy-inflation attempts (e.g., Sybil-induced dissemination noise or transaction flooding), the implementation supports:
  • Robust entropy estimation: compute S and H spatial from validated events only (signed, freshness-checked), optionally using trimmed means across cluster reports to limit outlier influence.
  • Rate limiting/admission control: cap per-credential transaction injection and per-epoch candidate-set growth, limiting the ability to inflate S through flooding.
  • Hysteresis & smoothing: EMA + two-threshold hysteresis reduces the effect of short-lived spikes on mode selection (Section 3.6.8, constraints C5–C6).
These mechanisms bound the impact of entropy manipulation to performance degradation rather than consensus compromise within the stated security envelope.

4.5. What Our Evaluation Secures (and Non-Claims)

Within the stated envelope, we empirically evaluate: (i) integrity at admission via QoI-aware filtering (invalid/stale exclusion), (ii) timeliness improvements under CF vs. BF policies, and (iii) convergence/coherence improvements under partitions/eclipses via reduced divergence and bounded orphaning.
We explicitly do not claim robustness to: (i) sustained majority-hash adversaries in PoW under latency-feasible targets, (ii) fully adaptive collusion that learns and exploits control dynamics globally, or (iii) permissionless cryptoeconomic security without external membership/identity services. For deployments requiring stronger guarantees, we recommend permissioned validator governance (PoS/FBA), RSU anchoring/checkpointing to bound reorg depth, Sybil-resistant admission controls, and eclipse-resistant peer rotation as natural extensions.

5. NS-3 Implementation

We validate the proposed entropy-driven governance loop with a modular NS-3.35 framework [9]. Our implementation encapsulates the cluster-local VANET Engine (metric sampling, mode/rigor selection, and state updates) into a reusable helper (VanetEngineHelper) and a node application (NodeApp). Consensus is pluggable (PoW, PoS, DPoS, FBA) through a unified ConsensusModule interface, and a structured logging pipeline records all observables required to reproduce figures and tables.

Reproducible Run Protocol

All results in Section 6 and Section 7 use a single execution profile: NS-3.35, 600 s per run, 30 matched seeds per configuration, and 95% confidence intervals computed via BCa bootstrap (Section 3.6.7). The exact simulator configuration, command-line flags, and per-event logs are versioned in the public artifact described in Section 5.6; each run stores a run_id and the repository git_commit in the CSV header for traceability.

5.1. General Configuration and Simulation Parameters

We consider two mobility settings with identical communication stacks and Engine sampling policies: an urban grid (1 km×1 km) and a highway segment (5 km). Unless explicitly stated otherwise, the communication stack uses IEEE 802.11p/WAVE via WaveHelper. Experiments involving additional C-V2X/LTE-V2X integrations are reported only when explicitly flagged and are fully versioned in the artifact (to avoid ambiguity across NS-3 releases).
Safety messaging is emulated at the application layer: we generate periodic CAM-like beacons at 10 Hz (100 ms) and DENM-like event-driven alerts, which allows controlled freshness constraints without claiming a full ETSI ITS-G5 stack.
Radio energy is modeled with BasicEnergySource and WifiRadioEnergyModel. Cryptographic energy is added analytically using the per-operation constants in Table 10 (Section 3.6.5). Entropy metrics follow the normalized definitions in Section 3.1. QoI tiers are derived from delay and validity indicators (Section 3.1).
Table 8. NS-3 configuration (aligned with Section 3.6).
Table 8. NS-3 configuration (aligned with Section 3.6).
Parameter Value / Description
Simulator / version NS-3.35 (IEEE 802.11p/WAVE via WaveHelper; other stacks only if explicitly reported and versioned)
Area Urban: 1 × 1  km; Highway: 5 km two-lane segment
Vehicles Urban: 50–100; Highway: 100–200
Mobility BonnMotion traces [20]; churn (join/leave)
M (spatial bins for H spatial ) Urban: M = 25 (5×5 grid over 1 km×1 km); Highway: M = 50 (50 longitudinal bins over 5 km). Configurable via run flags.
S th 0.50 – Informational-entropy trigger (knee-selected under V2X latency constraints)
H th 0.60 – Spatial-dispersion trigger (knee-selected to prevent divergence spikes)
Speeds Urban: 5–15 m/s; Highway: 15–30 m/s
Safety messaging CAM-like periodic beacons: 10 Hz; DENM-like alerts: event-driven
Engine sampling Every 1 s and on packet reception events
Consensus modes PoW, PoS, DPoS, FBA (pluggable modules)
Block size 10 tx per block (QoI-aware candidate selection)
Block production trigger Attempt commit when | T k | = 10 or per-mode timeout τ max expires (no fixed Δ t block )
Energy model WifiRadioEnergyModel + analytical crypto term
Metrics logged S, H spatial , QoI tier, consensus latency, orphan flag, finality, D ledger ( t ) , run header (seed, knobs, git_commit)
Duration / seeds 600 s per run; 30 seeds; 95% CIs (BCa bootstrap)

5.2. VanetEngineHelper and NodeApp Workflow

Figure 2 summarizes the helper and application pipelines. Each cluster-local Engine instance retrieves S and H spatial from a shared metrics service, compares them against ( S th , H th ) , and selects the active ConsensusConfig (mode and rigor parameters). To reduce control-plane chatter, our implementation optionally disseminates the selected configuration to neighboring nodes; however, the policy is deterministic given the logged observables, and any node can compute the same decision locally.
The per-tick computational cost is O ( n + M ) over local pending transactions and spatial bins; in our settings, this overhead is negligible relative to PHY/MAC processing and consensus execution.

5.3. Partition and Adversary Plugins

We expose explicit Partition and Adversary plugins for controlled stress testing.

Partition modeling (k-cuts, claiming).

Our primary (claiming) partition mechanism is a scheduled k-cut over NetDevice links: during a partition window, selected links are programmatically disabled (Tx/Rx) to separate the network into disconnected components, and then re-enabled to measure recovery. All partition schedules (start time, duration, affected link sets, and realized component sizes) are logged per run. Alternative fading-style partitions (e.g., corridor fades) are used only as sensitivity checks and are explicitly flagged when reported.

Adversary hooks (sensitivity analyses).

Sybil identities, Byzantine proposers, eclipse windows, and corrupted transactions are injected via an AdversaryModule wrapper around NodeApp send/receive paths and consensus callbacks. Stressor parameters (e.g., Sybil ratio ρ sybil , Byzantine proposer rate λ bz , eclipse probability ρ ecl , and corruption rules) are logged and summarized in the artifact tables. These stressors are used to characterize robustness and failure modes; headline figures focus on baseline mobility/load unless a stressor is explicitly stated.

5.4. Consensus Modules

All algorithms implement a unified ConsensusModule interface exposing GenerateBlockCandidate() and ValidateBlockCandidate(). For PoW, the mining routine iterates hashes until a valid nonce is found, and we log the realized number of hash attempts n hash for each committed block. For signature/quorum-based protocols (PoS/DPoS/FBA), we instrument and log the full cryptographic workload—proposal signing, vote/endorsement signing, and all verification operations—aggregated as n sig . Radio energy is obtained directly from the NS-3 device energy models, while cryptographic energy is added as an analytical per-operation term using ( e h , e sig ) (Section 5.7). Figure 3 summarizes the resulting class layout and call/callback relations.

5.5. Instrumentation and Logging

All results are derived from per-event logs written in a normalized CSV schema (Table 9). Each row corresponds to a single event (transaction receipt, candidate assembly, consensus step, commit, or fork resolution), enabling seed-wise pairing and reproducible post-processing.
Table 9. Normalized per-event CSV logging schema used for all results (deterministic under fixed seed). Each row corresponds to a key event (tx reception, block proposal, commit, mode switch). The CSV header stores run_id and git_commit for traceability (Section 5.6).
Table 9. Normalized per-event CSV logging schema used for all results (deterministic under fixed seed). Each row corresponds to a key event (tx reception, block proposal, commit, mode switch). The CSV header stores run_id and git_commit for traceability (Section 5.6).
Field Meaning
run_id Unique run identifier (stored in header; repeated in post-processing metadata)
git_commit Repository commit hash (stored in header)
seed NS-3 RNG seed for matched-seed pairing
time_s Simulation time (s) at event timestamp
node_id Node identifier that generated the log entry
cluster_id Geographic/connected-component cluster identifier
event Event type: {rx_tx, propose_block, commit_block, mode_switch}
S Normalized informational entropy S ( t ) [ 0 , 1 ]
H_spatial Normalized spatial entropy H spatial ( t ) [ 0 , 1 ]
mode Active consensus mode: {PoW, PoS, DPoS, FBA}
D_target PoW target D (256-bit scale; smaller ⇒ harder) if PoW
T_rigor Stake/quorum threshold T if signature/quorum mode
qoi_tier QoI tier derived from delay/error bins
tx_delay_ms Per-transaction delay Δ t i (ms) at reception/commit
tx_valid Validity flag (1 valid, 0 invalid/stale; corresponds to ϵ i )
n_hash Realized number of hashes in PoW for the committed block
n_sig Number of signature operations (proposal+votes+verify) per block
block_id Committed/proposed block identifier
orphan_flag 1 if block becomes orphan at end-of-run, else 0
finality_ms Finality time F (ms) measured per operational definition
lcp_len Longest common prefix length used to compute D ledger ( t )

Command-Line Reproducibility

All knobs are exposed via NS-3 CommandLine (e.g., –Seeds=30 –BlockSize=10 –EngineDt=1s –Sth=0.5 –Hth=0.6 –Adversary=Sybil:0.05). The artifact provides a script enumerating the full factorial design used in the paper (Section 5.6).

5.6. Reproducibility Artifact

To enable exact replication of all reported figures and tables, we release a versioned artifact that bundles: (i) the NS-3 scenario drivers and helper/application code (VanetEngineHelper, NodeApp); (ii) the full set of configuration files (mobility/load profiles, thresholds, and default parameters); (iii) explicit seed lists per experimental condition (seeds.csv) and the script that enumerates the factorial design used in the paper; (iv) the normalized per-event CSV logging schema and parsers; and (v) the Python post-processing pipeline that generates every plot/table from raw logs.

Provenance Metadata (Run-Level Traceability)

Each simulation run writes a deterministic run_id and the repository git_commit hash in the CSV header, together with the full command-line string (all flags) and a normalized configuration snapshot. This provenance block ensures that every data point in Section 6 can be traced to an immutable code revision and a unique seed/configuration tuple.

Repository Layout (High-Level)

The artifact follows a fixed directory structure: /ns3/ (scenario drivers, helpers, and modules), /configs/ (scenario and policy parameters), /seeds/ (matched seed lists), /logs/ (raw per-run CSV outputs, indexed by run_id), and /analysis/ (Pandas/Matplotlib scripts producing all figures/tables). This layout is used consistently throughout the paper and is sufficient to regenerate all results from raw logs.

Replication Protocol

To reproduce the main results, one executes the provided run script to generate logs for the declared design (600 s runs; 30 matched seeds per configuration), and then runs the plotting pipeline on the generated CSVs. The post-processing uses only the logged observables (including S, H spatial , QoI tiers, orphan flags, finality, and chain-prefix fields) and the provenance metadata stored in the CSV header, ensuring that all results are derived from recorded, seed-indexed events rather than from manual interventions.

5.7. Crypto-Energy Accounting

Cryptographic energy per block is computed as
E block ( crypto ) = e h n hash + e sig n sig ,
with constants ( e h , e sig ) from Table 5. For PoW under a 256-bit target scale D, the hit probability is p hit = D / 2 256 and E [ n hash ] = 2 256 / D ; we log realized n hash (attempts until success) and compute per-block crypto energy from the same accounting. For PoS/DPoS/FBA, we set n hash 0 and count signature operations in n sig (proposal + votes/endorsements + verifications).

Total energy.

Total per-block energy reported in the Results is
E block ( total ) = E block ( radio ) + E block ( crypto ) ,
where E block ( radio ) is logged from NS-3 radio energy models and aligned to the block-commit event. No host-side power tools are used in reported energy curves, tables, or confidence intervals.
Table 10. Cryptographic energy constants used in analytical accounting. Values are embedded-class software-level constants on the NS-3 energy scale and are used only for relative comparisons.
Table 10. Cryptographic energy constants used in analytical accounting. Values are embedded-class software-level constants on the NS-3 energy scale and are used only for relative comparisons.
Symbol Value Unit Meaning / usage
e h 5 nJ/hash Energy per hash (PoW). Used in E crypto ( PoW ) = e h n hash .
e sig 1 μ J/op Energy per signature/verification op (PoS/DPoS/FBA). Used in E crypto ( sig ) = e sig n sig .
e h range [ 1 , 10 ] nJ/hash Sensitivity span used for robustness checks.
e sig range [ 0.5 , 5 ] μ J/op Sensitivity span used for robustness checks.

5.8. Default Parameter Rationale and Sensitivity

Table 9 summarizes the rationale for default values and the sensitivity checks used to verify robustness of qualitative trends.

5.9. Post-Processing and Visualization

After each run, CSV logs and FlowMonitor outputs are processed with Python (Pandas [21], Matplotlib [22]) to generate all figures and summary tables. The repository organizes raw logs, derived summaries, and plotting scripts in a fixed layout to support exact replication.

5.10. Scalability Harness (Algorithmic Profiling)

To facilitate profiling beyond full PHY/MAC fidelity, we provide an auxiliary harness with simplified PHY and FlowMonitor-only instrumentation to scale to 500+ nodes. Results from this harness are reported only as algorithmic profiling and are not used for the headline claims in this paper.

Reproducibility and measurement scope.

All reported results are produced with NS-3.35 using matched-seed configurations and a single energy accounting pipeline: NS-3 radio device models plus an analytical cryptographic term parameterized by ( e h , e sig ) computed from operation counts. No host-side power profilers are mixed with simulated energy values; versioning, seeds, and configuration manifests are provided in the artifact repository.

6. Results

Reporting and endpoints. Unless otherwise noted, results are means over 30 matched seeds with 95% confidence intervals from BCa bootstrap (Section 3.6.7). Symbols and units follow Table 4. Throughout this section, S and H spatial denote the normalized entropies defined in Section 3.1. We report energy per confirmed block and distinguish the cryptographic component E block ( crypto ) when isolated. Latency-related metrics are reported for three endpoints: (i) agreement/commit latency (from consensus trigger to block commit), (ii) transaction confirmation latency (from tx admission to inclusion/confirmation, mode-dependent), and (iii) finality F as defined in Section 3.6.1.
Scenario anchor for headline deltas. Unless explicitly stated otherwise, quoted percentage improvements refer to the urban, N = 50 configuration with S th = 0.5 , Broadcast-First dwell τ = 100  ms, and the default adaptive maps f , g from Section 3.6.5. We do not extrapolate beyond N 100 ; an auxiliary (non-claiming) scalability harness is described in Section 5.10.

6.1. H 1 — Entropy-Conditioned Crypto-Energy Scaling

Objective.

Test the hypothesis that cryptographic expenditure per confirmed block increases sharply with informational disorder under Proof-of-Work (PoW), whereas signature/quorum-based modes (PoS/DPoS/FBA) remain comparatively weakly coupled to S.

Experiment (conditional aggregation over S bins).

Because S ( t ) is an observable (not a directly settable treatment), we aggregate per-block cryptographic energy conditionally on realized entropy. We partition observed S ( t ) values into five bins centered at { 0.1 , 0.3 , 0.5 , 0.7 , 0.9 } (equal-width windows around each center), and compute the mean E block ( crypto ) for PoW, PoS, DPoS, and FBA within each bin. All points aggregate 30 matched seeds using the parameters in Table 10 and the calibration in Section 3.6.5.

Results

Figure 4. Crypto -energy per confirmed block vs. realized S (conditional bin means). Means over 30 seeds; 95% CIs. Total energy (radio+crypto) is reported in Figure 11.
Figure 4. Crypto -energy per confirmed block vs. realized S (conditional bin means). Means over 30 seeds; 95% CIs. Total energy (radio+crypto) is reported in Figure 11.
Preprints 191890 g004

Interpretation.

PoW exhibits a steep increase with disorder (from ∼100 J at low-S to ∼600 J at high-S), consistent with higher expected trials and orphaning pressure under unstable propagation. In contrast, PoS/DPoS/FBA remain nearly flat (sub-Joule to single-digit Joule regimes), supporting H 1 and motivating entropy-aware avoidance of PoW in high-S regimes.

Sanity check (magnitude and aggregation level).

Energy is reported per confirmed block aggregated over the cluster participants, i.e., the sum of cryptographic work attributed to block production/verification events logged for that committed block. Using E block ( crypto ) = e h n hash + e sig n sig with e h = 5 × 10 9  J/hash (Table 5), a PoW block at 600  J implies n hash 1.2 × 10 11 aggregate hash attempts across participating miners over the block-production window. With a 256-bit target scale, E [ n hash ] = 2 256 / D , hence the effective D used in the PoW baseline is calibrated (via g and the mode timeouts) to operate in a deadline-constrained regime rather than Bitcoin-level difficulty.

6.2. H 2 — Consensus-First Trigger vs. Broadcast-First Dwell

Objective

Compare Consensus-First (CF: start consensus as soon as S > S th ) versus Broadcast-First (BF: delay consensus by a dwell time τ ) in terms of (i) agreement/commit latency, (ii) confirmed throughput, and (iii) message overhead.

Experiment

Urban topology; N { 10 , 50 , 100 } ; S th = 0.5 ; τ = 100  ms; 30 matched seeds. Metrics are defined in Section 3.6. Latency L ¯ here denotes agreement/commit latency (trigger → block commit), and thus includes dwell time in BF by design.

Results

Figure 5. CF vs. BF across density (30 seeds; 95% CIs).
Figure 5. CF vs. BF across density (30 seeds; 95% CIs).
Preprints 191890 g005

Interpretation

In the urban, N = 50 baseline, CF reduces agreement/commit latency from ∼300 ms to ∼150 ms (95% CI: 135–165 ms), increases confirmed throughput from ∼120 tx/s to ∼200 tx/s (95% CI: 185–215 tx/s), and halves normalized message overhead (Figure 6). Across densities, latency reductions range 33–57%, supporting H 2 . We emphasize that the sub-100 ms target pertains to stringent V2X-style deadlines and is achieved in favorable regimes (lower disorder/dispersion and density), whereas the stated baseline under τ = 100  ms and the given load yields mean commit latencies above 100 ms.

6.3. H 3 — QoI Filtering Reduces Wasted Work

Objective

Test whether early filtering of low-QoI transactions (high delay Δ t i and/or ϵ i = 1 ) reduces wasted consensus work (invalid blocks/forks) and improves latency.

Experiment (ablation)

Urban scenario ( N = 50 ), default thresholds ( S th , H th ) = ( 0.5 , 0.6 ) . We compare the Engine with QoI filtering ON (candidate set excludes stale/invalid transactions; Section 3.4) versus QoI filtering OFF (candidate set is FIFO without QoI screening). All other parameters (sampling, f , g , and modules) are unchanged; 30 matched seeds.

Results (summary)

Table 11. QoI filtering ablation at urban N = 50 (30 seeds; mean ± 95% CI).
Table 11. QoI filtering ablation at urban N = 50 (30 seeds; mean ± 95% CI).
Metric QoI filtering OFF QoI filtering ON (Engine default)
Invalid tx share (%) 9.8 ± 1.2 2.1 ± 0.6
Invalid-block share (%) 6.4 ± 1.0 1.9 ± 0.5
Wasted crypto energy (% of E block ( crypto ) ) 24 ± 4 9 ± 2
Agreement latency L ¯ (ms) 165 ± 12 145 ± 10
Orphan rate O (%) 11.3 ± 1.4 9.9 ± 1.2

Interpretation

QoI filtering substantially reduces invalid traffic admitted to consensus and lowers the share of wasted cryptographic work, while improving agreement latency and reducing forks. These effects support H 3 and justify retaining QoI-aware candidate selection as a default Engine policy.

6.4. Spatial dispersion effects (governance signal supporting H 4 H 5 )

Objective

Quantify how spatial entropy H spatial affects latency and validation quality, and whether entropy-aware adaptation mitigates degradation.

Experiment (conditional aggregation over H spatial bins).

Urban scenario ( N = 50 ). We compare static PoW (fixed difficulty D 0 ) against the adaptive Engine (entropy-driven g , f ). Because H spatial ( t ) is an observable, we bin observations into four equal-width bins and report means at bin midpoints. Accuracy α denotes the fraction of transactions admitted to the candidate set that (i) pass payload validation and (ii) appear on the final main chain by run end (computed from valid_flag and chain membership logs).

Results

Figure 7. Impact of spatial entropy on latency and validation accuracy (30 seeds; 95% CIs).
Figure 7. Impact of spatial entropy on latency and validation accuracy (30 seeds; 95% CIs).
Preprints 191890 g007

Interpretation

Under static PoW, dispersion drives latencies up to ∼250 ms and accuracy down to ∼80%. The adaptive Engine mitigates this degradation by tightening validation where dispersion is greatest. This supports the role of H spatial as a governance signal and motivates the mobility/coherence evaluations in H 4 H 5 .

6.5. H 4 — Mobility, Orphans, and Finality

Objective

Evaluate orphaned-block rate O and finality F under increasing mobility (v) for static PoW/PoS vs. the adaptive Engine.

Experiment

Urban ( N = 50 ), v { 10 , 20 , 30 }  m/s; 30 matched seeds. Finality follows the operational definitions in Section 3.6.1 (mode-dependent by design).

Results

Figure 8. Mobility impact (30 seeds; 95% CIs).
Figure 8. Mobility impact (30 seeds; 95% CIs).
Preprints 191890 g008

Interpretation

At 30 m/s, static PoW reaches O 22 % and F 310  ms, whereas the adaptive Engine holds O 10 % and F 140  ms by modulating consensus rigor based on instantaneous entropy. This validates H 4 and provides an operational link between mobility-induced disorder and Engine control actions. Notably, the Engine approaches the sub-100 ms target in less adverse regimes (lower mobility/dispersion), while the worst-case reported here remains within ∼140 ms.

6.6. H 5 — Microstate Consistency (Ledger Divergence)

Objective

Relate H spatial to ledger divergence and assess whether the adaptive Engine preserves microstate coherence under high dispersion.

Experiment (binned by H spatial ).

Urban ( N = 50 ); static PoW vs. adaptive Engine. For each seed, we time-average D ledger ( t ) (Section 3.1) within four equal-width bins of H spatial , then report the mean across seeds with 95% BCa bootstrap CIs; markers are placed at the bin midpoints (0.2, 0.5, 0.8, 1.0).
Figure 9. Average ledger divergence vs. H spatial (30 seeds; 95% CIs).
Figure 9. Average ledger divergence vs. H spatial (30 seeds; 95% CIs).
Preprints 191890 g009

Results

Interpretation

Without adaptation, divergence rises to 0.18 at high dispersion. The Engine caps divergence below 0.07 by strengthening validation where spatial entropy is largest. This supports H 5 and demonstrates improved ledger coherence under stress.

6.7. Stress Tests: Adversaries and Partitions (Sensitivity Analyses)

Objective

Quantify robustness under Sybil, Byzantine proposers, eclipse windows, and scheduled partitions.

Setup

Urban, N = 50 ; Sybil rate 5 % (3–5 pseudonyms/attacker); Byzantine proposers double-propose within 200 ms; eclipse: drop non-colluding peers for 5–10 s; partitions: scheduled k-cuts (link-disabling windows) for 10–30 s (details in Section 5.3).

Findings (summaries)

(i) Sybil: median orphan rate increases by + 2.8  pp for static PoW and + 1.6  pp for static PoS; the Engine rises from 9.0 % to 10.4 % (IQR [ 8.8 , 11.2 ] % ).
(ii) Byzantine proposers: finality tails widen (95th percentile + 18  ms) for PoS; the Engine’s CF policy limits dwell-induced amplification (95th + 9  ms).
(iii) Eclipse: transient divergence spikes (peak + 0.02 in D ledger ) decay within ∼1.2 s under the Engine vs. ∼2.4 s for static PoW.
(iv) Partitions: mean recovery time to pre-partition D ledger is 3.6  s (static PoW) vs. 1.7  s (Engine), with F reduced from > 250  ms to ∼140 ms once reconnected.

6.8. Expanded Comparative Evaluation

Objective

Compare five consensus options in a 100-vehicle urban scenario (5–15 m/s): pure PoW, pure PoS, FBA, a non-adaptive hybrid, and the proposed Hybrid Engine.

Right-censoring note (PoW)

When a method fails to confirm within the 600 s simulation horizon, the plotted confirmation latency is right-censored at 600 000 ms (i.e., reported as “≥ 600 s”).

Results

Figure 10. Transaction confirmation latency (mean ± 95% CI; log scale).
Figure 10. Transaction confirmation latency (mean ± 95% CI; log scale).
Preprints 191890 g010
Figure 11. Total energy per block (radio+crypto) in the NS-3 energy-source scale (mean ± 95% CI; log scale).
Figure 11. Total energy per block (radio+crypto) in the NS-3 energy-source scale (mean ± 95% CI; log scale).
Preprints 191890 g011
Figure 12. Transaction throughput (mean ± 95% CI; log scale).
Figure 12. Transaction throughput (mean ± 95% CI; log scale).
Preprints 191890 g012

Interpretation

The Hybrid Engine achieves the lowest confirmation latency (∼30 ms), near-minimal total energy (order ∼10 J per confirmed block), and higher throughput among practical options, outperforming both pure schemes and non-adaptive hybrids. These gains are consistent with entropy-aware control and with the governance-signal role of S and H spatial .

6.9. Fork-Rate Definition and Distribution

We report orphan/fork rate O as the fraction of produced blocks that do not lie on the final main chain at simulation end (see logging schema in Section 5.5). For the urban N = 50 case at v { 10 , 20 , 30 }  m/s, the median O over seeds is: static PoW 15 % , 18 % , 21 % (IQR [ 13 , 24 ] % at 30 m/s), static PoS 10 % , 12 % , 13 % , and Engine 8 % , 9 % , 10 % . The Engine reduces but does not eliminate forks under high mobility.

6.10. Robustness and Statistical Validity

Trends are stable under ± 10 % perturbations of calibrated parameters (Section 3.6.5) and across additional highway traces (omitted for space; logs in the repository described in Section 5.9). With n = 30 seeds per condition, bootstrap 95% CI half-widths are typically < 12 % of the mean for latency and energy, and < 2  pp for orphan rates in Engine configurations. Where CIs marginally overlap, seed-wise paired contrasts align with medium-to-large effects; effect-size summaries are included in the supplementary logs.
Paired t-tests across matched seeds confirm significance ( p < 0.01 after Holm–Bonferroni) for headline contrasts (e.g., CF vs. BF agreement latency at N = 50 ; Adaptive vs. Static PoW energy for S 0.5 ). We also repeated analyses with disjoint seed folds (5-way split); trends persisted with comparable CI overlap (logs included).

7. Discussion

The entropy-driven VANET Engine supports H 1 H 5 and yields consistent improvements in energy, latency, throughput, validation accuracy, and ledger coherence under realistic urban dynamics. We interpret outcomes through the Ideal Information Cycle (Figure 1), relate them to the challenge–mitigation matrix (Table 3), and clarify normalization, units, parameter provenance, and instrumentation. To avoid redundancy, we do not re-state metric definitions already introduced in Section 3.1 and the detailed protocol in Section 3.6.

Connection to the Ideal Information Cycle

The cycle comprises an injection leg (rising informational disorder) and a validation leg (compressing disorder through consensus work). Our empirical results match these mechanics:
  • H 1 (Energy vs. S). Figure 4 shows that PoW cryptographic energy rises steeply with realized informational disorder S (from ∼100 J at low-S to ∼600 J at high-S). This is consistent with increased work to compress disorder under contention and propagation instability. By contrast, PoS/DPoS/FBA remain nearly flat (sub-Joule to single-digit Joule regimes), motivating entropy-aware down-selection of PoW in high-S windows.
  • H 2 (Consensus-First vs. dwell). Figure 5 and Figure 6 indicate that triggering consensus immediately when S > S th shortens the injection leg: agreement/commit latency drops by 33–57% across densities, throughput increases by 1.6 2.0 × , and normalized message overhead is reduced by roughly half in the urban N = 50 baseline.
  • H 3 (QoI filtering reduces wasted work). Table 11 shows that QoI-aware candidate selection (excluding stale/invalid transactions) reduces invalid payload admission and wasted cryptographic work (energy spent on orphaned or invalid blocks), while improving latency and decreasing fork/orphan rates. Operationally, this tightens the validation leg by focusing effort on higher-quality microstates.
  • H 4 (Mobility, orphans, and finality). Figure 8 shows that increasing mobility inflates orphaning and finality for static schemes, but the Engine keeps both bounded ( O 10 % , F 140  ms at 30 m/s) by switching mode/parameters when ( S , H spatial ) rise.
  • H 5 (Ledger coherence under dispersion). Figure 9 shows that the Engine constrains ledger divergence to 0.07 at high H spatial versus 0.18 under static PoW, indicating more effective compression during the validation leg and improved microstate consistency across nodes.

Spatial Dispersion as a Governance Signal

Beyond the hypothesis tests, Figure 7 demonstrates that H spatial is a strong predictor of consensus stress: dispersion increases latency and degrades validation accuracy under static PoW. The adaptive Engine mitigates this trend by tightening validation and/or switching away from expensive regimes when dispersion is greatest, thereby improving both timeliness and correctness during fragmented connectivity windows.

Normalization, Units, and Terminology

  • Normalized Shannon entropies. S and H spatial are Shannon entropies computed over normalized distributions (Section 3.1) and then scaled to [ 0 , 1 ] . For readability, plots and text reuse S and H spatial to denote the normalized quantities.
  • Observables vs. treatments (binning interpretation). In the Results, S ( t ) and H spatial ( t ) are observed time-varying signals; reported curves represent conditional aggregation (binning) over realized entropy levels rather than externally set treatments.
  • Ledger divergence. All references to D ledger ( t ) use the same LCP-normalized longest-common-prefix definition in Section 3.1; binning/aggregation and confidence intervals follow that definition consistently.
  • Consensus outputs. D = g ( S , H ) is a PoW target on a 256-bit scale (dimensionless; smaller ⇒ harder). Θ = f ( S , H ) denotes a mode-specific rigor parameter (e.g., quorum/stake threshold, committee size), with coefficients inheriting simulation control scales rather than physical units.
  • Energy reporting across figures. Figure 4 reports crypto energy only ( E block ( crypto ) ) to isolate scaling with S. The expanded comparison (Figure 11 and companions) reports total per-block energy (radio+crypto) in the NS-3 energy-source scale; absolute magnitudes are therefore not directly comparable across those panels, but trends are.

From Metaphor to an Operational Control Model

Our thermodynamic vocabulary is operational and does not claim physical equivalence:
  • State variables. S quantifies transaction-state disorder and H spatial quantifies occupancy dispersion (Section 3.1). QoI is a monotone proxy of freshness/validity implemented via delay/error tiers (Section 3.6).
  • Work and dissipation (design constraint). Consensus work W c is the expected resource cost (crypto operations + message exchange) required to reduce disorder sufficiently for safe acceptance. The Landauer-like bound in Section 3.6.8 is used as a design constraint motivating adaptive rigor, not as a physical law.
  • Cycle semantics. Injection increases S (and often H spatial ) under churn and bursty loads; validation expends W c to compress disorder, improving correctness and coherence. The Engine schedules this work locally and adaptively based on ( S , H spatial ) .

Why these adaptive forms g ( S , H ) and f ( S , H )

The chosen function families impose shape constraints observed in sweeps and remain compact enough for calibration:
  • Difficulty/target map g. The selected family (Section 3.6.5) tightens PoW targets as S rises and captures dispersion sensitivity through a low-order component in H spatial . This reflects the empirical observation that high disorder requires either higher work (PoW) or switching away from PoW.
  • Rigor map f. The selected family increases with H spatial (with diminishing returns) and adjusts with S so that high-disorder windows receive stronger validation while avoiding oscillatory behavior. Monotonicity and stability constraints, plus ± 10 % coefficient perturbations, preserve decisions (Section 3.6.5).

Calibration Anchors, Magnitude Sanity Checks, and Sensitivity

  • Magnitude sanity check (PoW crypto energy). The 600  J high-entropy PoW point in Figure 4 follows directly from E block ( crypto ) = e h n hash with e h = 5  nJ/hash (Table 5) and n hash 1.2 × 10 11 aggregate attempts across participants for a confirmed block. Via E [ n hash ] = 2 256 / D , this implies targets far easier than Bitcoin, but consistent with deadline-constrained V2X consensus and with the calibrated map g ( S , H spatial ) .
  • Sensitivity. Reported trends persist under ± 10 % perturbations of calibrated parameters and across additional traces (logs described in Section 5.9), indicating that improvements are not brittle to small calibration changes.

Instrumentation Choices and What We Do (and Do Not) Measure

  • Energy accounting is simulation-native. Radio energy comes from NS-3’s BasicEnergySource+WifiRadioEnergyModel; cryptographic energy is the analytical per-op term using ( e h , e sig ) (Section 5.7). All figures and confidence intervals use these sources only.
  • No host power traces in outcomes. Host-level tools are not sampled during NS-3 runs and are not used to scale multi-node results. If offline micro-benchmarks were used to set e h and e sig , they serve only as fixed constants for the analytical crypto term.
  • Traceability. Forks, finality, and divergence are computed from a normalized logging schema (Section 5.5), enabling seed-wise pairing and consistent post-processing.

Statistical Validity, Fork Definition, and Stressors

  • Power and uncertainty. We use n = 30 seeds per condition. Bootstrap CIs are reported throughout; seed-wise paired contrasts (Holm–Bonferroni adjusted) support headline comparisons as summarized in Section 6.10.
  • Fork metric (no under-claiming). Orphan/fork rate O is the fraction of blocks not on the final main chain (Section 6.9). In the urban N = 50 case under high mobility, medians remain on the order of 8– 10 % for the Engine: the Engine reduces but does not eliminate forks under stress.
  • Adversaries and partitions. Stress tests (Sybil, Byzantine proposers, eclipse windows, scheduled k-cuts) in Section 6.7 show reduced recovery times and capped divergence spikes under the Engine relative to static baselines; fully adaptive adversaries remain future work.

Version Harmonization and Run Protocol

All reported experiments use NS-3.35 with 600 s per run and 30 matched seeds per configuration (Table 8). Shorter pilot sweeps, if any, are not mixed into reported statistics.

Interpreting the Expanded Comparison (Censoring and Practicality)

In the expanded comparative evaluation (Section 6.8), Pure PoW may fail to confirm within the 600 s simulation horizon in the densest/high-disorder regimes. Reported PoW confirmation latency is therefore right-censored at 600 000 ms when applicable, which should be read as “≥ 600 s” rather than as an exact mean. Under these operating conditions, the Engine’s advantage reflects practical deadline satisfaction rather than marginal improvement under unconstrained convergence.

Implications for the Challenge–Mitigation Map (Table 3)

  • Mobility/topology churn. Entropy-aware switching lowers orphaning and finality (Figure 8), operationalizing mitigation under churn.
  • Congestion and bandwidth fluctuation. CF reduces message overhead (Figure 6) and increases throughput (Figure 5), limiting injection-phase amplification.
  • Integrity/coherence under disorder. Tightening rigor in high- ( S , H spatial ) windows reduces divergence (Figure 9) and improves validation outcomes (Table 11).
  • OBU constraints. Favoring PoS/FBA over PoW in high-S intervals reduces cryptographic energy by orders of magnitude (Figure 4) while preserving correctness/coherence.

Limitations and Threats to Validity

This study is simulation-based (NS-3) and omits several physical and deployment effects, including hardware accelerators, GNSS error, clock skew, heterogeneous firmware behaviors, and cross-layer scheduling effects. Adversaries are stylized (sensitivity analyses) and not fully adaptive beyond disorder amplification. Mixed deployments (802.11p with LTE-V2X) may shift the optimal thresholds ( S th , H th ) , but do not negate the central finding: an entropy-conditioned rigor policy improves timeliness and coherence under churn.

Operational Guidance

For dense corridors, trigger CF when S > S th to avoid dwell-induced rebroadcast storms. Prefer PoS/FBA (or an adaptive hybrid) in high-S/high- H spatial windows to meet V2X-style deadlines and conserve energy. Deploy Engines per cluster/segment in partition-prone areas to preserve convergence and accelerate recovery, while using QoI filtering to reduce invalid admission and wasted work.

Editorial and Reproducibility Adjustments

  • Definitions centralized. Entropy normalization and D ledger ( t ) are stated once and cross-referenced (Section 3.1).
  • Protocol unified. NS-3.35 is the reference; 600 s/30-seed runs are standard unless explicitly stated (Table 8).
  • Energy accounting clarified. Reported energies are simulation-native (radio+analytical crypto) with no host-measurement mixing (Section 5.7).
  • Traceability. Logged schemas and scripts ensure that all plots and statistics can be reproduced from per-run artifacts (Section 5.5Section 5.9).

8. Conclusions and Future Directions

Several research directions follow naturally from the present results and from the limits of full-fidelity VANET simulation. First, scaling beyond the N 100 range evaluated here will require hierarchical governance: cluster-local Engines can be composed into multi-tier control, where intra-cluster consensus remains latency-feasible while inter-cluster reconciliation is performed less frequently and with stronger anchoring to preserve coherence under large-area fragmentation. Such designs can also incorporate sharded validation and selective state dissemination to reduce control-plane load in dense corridors. Second, the current maps g ( · ) and f ( · ) can be extended to account for heterogeneous energy states and device constraints. In realistic fleets, OBUs exhibit varying battery levels, compute capabilities, and duty-cycling policies. Incorporating per-node energy state and harvested-power profiles into the rigor policy would enable explicit energy-aware governance, e.g., shifting expensive validation toward nodes or roadside infrastructure with renewable power while maintaining bounded latency for safety-critical updates. Third, predictive control offers a principled upgrade path. Instead of reacting to spikes in S or H spatial , short-horizon forecasting of mobility and topology could pre-emptively adjust validation strength before fragmentation occurs. This can be combined with learning-based QoI filters that detect anomalies or malicious patterns prior to consensus, provided that false-positive rates are bounded to avoid suppressing legitimate safety messages. Finally, security-oriented extensions merit dedicated study under stronger adversarial models. Future work should integrate Sybil-resistant membership services for validator/quorum selection, rotating quorum slices for eclipse resilience, and explicit checkpointing/anchoring strategies to bound reorganization depth after partitions. Evaluations should include adaptive attackers that attempt strategic entropy manipulation and long-lived eclipses, allowing formalization of security guarantees under bounded Byzantine fractions and under mode transitions. City-scale studies with mixed 802.11p/C-V2X stacks and larger N via hierarchical simulation would then quantify control-loop stability and operational trade-offs under heavy bursts and heterogeneous radios.

8.1. Key Conclusions

H1 — Consensus as an energy cycle.

As informational disorder rises, PoW becomes increasingly expensive: in the crypto-only panel (Figure 4), PoW energy per block grows sharply with S, reaching 600  J at high entropy, whereas PoS remains near-constant in the sub-Joule regime (with DPoS/FBA in single-digit Joules). This confirms the central entropy–work coupling predicted by the Ideal Information Cycle (Figure 1) and motivates avoiding PoW in high-S windows. The magnitude is consistent with E block ( crypto ) = e h E [ n hash ] and E [ n hash ] = 2 256 / D under the V2X-feasible targets imposed by g ( S , H spatial ) (Section 3.6.5), i.e., difficulties far below cryptocurrency-scale PoW but aligned with deadline constraints.

H2 — Consensus-first triggering improves timeliness and reduces overhead.

In the baseline urban case ( N = 50 , S th = 0.5 ), Consensus-First (CF) reduces agreement/commit latency and increases throughput relative to Broadcast-First (BF), while reducing packet overhead (Figure 5Figure 6). Concretely, latency drops from 300  ms to 150  ms (95% CI: 135–165 ms), throughput rises from 120  tx/s to 200  tx/s (95% CI: 185–215 tx/s), and normalized overhead is roughly halved. This validates H2 and supports a practical control rule: when S crosses S th , shorten the injection leg by validating immediately rather than accumulating broadcast dwell.

H3 — QoI filtering reduces wasted work.

QoI-aware candidate construction (prioritizing fresher transactions with small Δ t i and excluding invalid/stale payloads with ϵ i = 1 ) prevents consensus effort from being spent on low-quality microstates. In the QoI ablation (Table 11), filtering reduces invalid admissions and invalid-block share, lowers the fraction of cryptographic energy wasted on orphaned/invalid outcomes, and improves confirmation latency under identical network conditions. The directionality is stable across matched seeds and aligns with the Engine’s design goal: compress disorder while preserving QoI.

H4 — Dynamic tuning improves efficiency and stability.

Adaptive maps g ( S , H spatial ) and f ( S , H spatial ) yield better operating points than static PoW/PoS and non-adaptive hybrids. In the expanded comparison (Section 6.8), the proposed Hybrid Engine achieves the lowest transaction confirmation latency with competitive total per-block energy while sustaining higher throughput than static baselines and a vanilla hybrid (Figure 10, Figure 11 and Figure 12). These results validate H4: tuning rigor as a function of ( S , H spatial ) improves throughput-per-energy and reduces coherence loss relative to static parameters.

H5 — Convergence and coherence under high entropy.

Under dispersion and transient disconnections, microstate alignment degrades for static schemes. The Engine maintains markedly lower ledger divergence in high- H spatial regimes (Figure 9) and recovers faster after partitions and eclipse windows (Section 6.7), indicating improved convergence under stress. Operationally, this confirms H5: conditioning rigor on observed disorder yields more coherent ledgers even when connectivity becomes intermittent.

Additional empirical observation: spatial dispersion is a reliable stress signal.

Independent of hypothesis labels, spatial entropy is a strong predictor of governance stress. As H spatial 1.0 , static PoW exhibits increasing latency and decreasing validation accuracy (Figure 7). The Engine mitigates this degradation by tightening validation and/or switching away from regimes that amplify forks, thereby preserving both timeliness and correctness in dispersed topology windows.

8.2. Limitations

  • Scale. The main study evaluates up to N 100 vehicles under full PHY/MAC fidelity; we do not extrapolate beyond this range. An auxiliary profiling harness (Section 5.10) supports larger-N algorithmic stress tests but is non-claiming.
  • Energy model abstraction. Per-hash ( e h ) and per-signature ( e sig ) costs (Table 5) are embedded-class software constants used in an analytical crypto term paired with NS-3 radio energy. Claims focus on relative scaling with S and H spatial ; absolute magnitudes will shift with accelerators and platform heterogeneity.
  • PHY/MAC fidelity and channel effects. NS-3’s IEEE 802.11p/C-V2X abstractions omit some physical nonlinearities (e.g., rich multipath/interference coupling in dense urban canyons). Field calibration is needed for deployment-grade parameterization.
  • Adversary scope. Stressors are stylized sensitivity analyses; fully adaptive collusion (strategic Sybil/eclipsing with learning) is left for future work. Partition events are scheduled k-cuts in simulation (Section 5.3); real cities may exhibit more complex, correlated failures.
  • Right-censoring under impractical regimes. In high-disorder configurations, Pure PoW may fail to confirm within the 600 s horizon; in such cases the plotted “600000 ms” should be read as “≥600 s” rather than an exact mean, reinforcing the practicality motivation for adaptive hybrid governance.
  • Protocol uniformity. All reported results use NS-3.35, 600 s duration, and 30 matched seeds unless explicitly stated.

8.3. Future Directions

Future work should prioritize scaling the entropy-governed control loop beyond the N 100 full-PHY/MAC regime studied here by introducing hierarchical Engines that operate at multiple tiers (intra-cluster and inter-cluster). A natural extension is to assign local Engines to connected components while an upper-tier coordinator (e.g., RSU-backed or infrastructure-assisted) mediates cross-cluster anchoring and conflict resolution, thereby preserving low finality while reducing the coordination burden in dense grids and long corridors.
A second direction is to incorporate heterogeneous energy profiles into the policy maps. In real fleets, OBUs differ in battery state, compute capability, and duty-cycling constraints; thus, f ( · ) and g ( · ) can be augmented with per-node energy state (battery/harvesting) and platform-aware cost coefficients to avoid systematically overloading constrained devices. This would convert the current cluster-level rigor policy into a device-aware governance mechanism that explicitly trades timeliness against the remaining energy budget and the expected contact time within connectivity windows.
Third, deployments can benefit from shifting expensive work to renewable-powered infrastructure through a proof of useful work (PoUW) concept at RSUs. Rather than spending scarce vehicular energy on repeated hashing or excessive endorsements, RSUs could carry out verifiable edge tasks (e.g., aggregation, model updates, or safety analytics) whose outputs are attestable and can serve as a commitment primitive. This would keep OBUs predominantly in low-cost regimes while preserving a stronger operational security envelope than latency-feasible PoW alone.
Fourth, the Engine can be made predictive by integrating mobility and topology forecasting to adjust rigor preemptively before entropy spikes occur. Short-horizon predictors (e.g., based on vehicle density, projected dispersion, and link-quality trends) could modulate ( S th , H th ) or directly regularize f , g so that the control loop reacts before contention and fragmentation inflate orphaning and divergence. This is particularly relevant in urban canyons and merge-lane bottlenecks where entropy rises rapidly and reactive switching may be late.
Fifth, we propose strengthening the QoI layer through bounded-risk learning for pre-consensus filtering. Lightweight anomaly detection or classifier-assisted admission (trained on delay/error tiers and message consistency features) could reduce malicious or low-QoI payloads with controlled false-positive rates. Importantly, such filters should be evaluated under distribution shift and coupled to the Engine with conservative risk bounds so that gains in timeliness do not come at the expense of excluding valid safety-critical messages.
Sixth, large fleets require succinct microstate telemetry to monitor coherence without inflating overhead. Merkle proofs, sketches, or Bloom-filter summaries can approximate divergence and membership state across clusters at low bandwidth cost, enabling D ledger ( t ) -like monitoring and re-convergence triggers without per-event detailed exchanges. This direction complements hierarchical Engines by providing scalable observability.
Finally, future evaluations should expand the adversarial and environmental envelope by analyzing adversary-resilient adaptation under more adaptive attackers and by validating at city scale. This includes combining Sybil-resistant staking (or credential governance), rotating quorum slices, and eclipse detection, as well as studying control-loop stability under heavy burst traffic and heterogeneous radios in mixed C-V2X/802.11p settings. A city-scale campaign (e.g., N 500 ) should explicitly separate (i) non-claiming algorithmic stress tests from (ii) claiming regimes with documented fidelity, ensuring that scalability conclusions are supported by appropriately instrumented experiments and by transparent reporting of which effects are simulated at full PHY/MAC versus abstracted.

8.4. Artifacts and Reproducibility

All figures in Section 6 are generated from per-event CSV logs via the version-controlled Python pipeline described in Section 5.9. Random seeds (30 per configuration), calibrated parameters (Section 3.6.5), fork/orphan definitions, and partition schedules are documented in the repository layout. Energy accounting uses only NS-3’s radio models plus the analytical crypto term ( e h , e sig ); no host-side power tools are mixed with simulated per-node energy. The D ledger ( t ) formula used in plots and statistics is the LCP-normalized definition in Section 3.1.

8.5. Concluding Remarks and Conceptual Scope

Our thermodynamic language is operational rather than a claim of physical equivalence: S and H spatial are measurable disorder observables used to price consensus rigor; the Engine injects consensus work to compress disorder only when needed. The adaptive maps g and f act on dimensionless target/threshold registers anchored by calibration (Section 3.6.5) and are justified by shape constraints and data-driven selection. Within this scope, governing consensus via entropy observables yields an energy-aware, latency-conscious, and resilient ledger for safety-critical V2X. More broadly, the “information engine” principle may extend to other resource-constrained distributed ledgers (IoT, supply chains, edge systems): dynamically pricing rigor against measured disorder provides a pragmatic blueprint for sustainable and adaptive consensus.

Author Contributions

Conceptualization, R.J.; Methodology, R.J. and F.R.-S.; Software, R.J.; Validation, R.J. and F.R.-S.; Formal analysis, R.J.; Investigation, R.J. and F.R.-S.; Resources, F.R.-S.; Data curation, R.J.; Writing—original draft preparation, R.J.; Writing—review and editing, R.J. and F.R.-S.; Visualization, R.J.; Supervision, R.J.; Project administration, R.J.; Funding acquisition, R.J.

Funding

This work was supported by the Comunidad de Madrid (Spain) within the framework of the Multiannual Agreement with Universidad CEU San Pablo to promote research by early-career PhDs.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Simulation logs (CSV) and plotting scripts supporting the findings are available as described in Section 5.9. We release code, configuration files, and post-processing scripts, including: (i) exact NS-3 scenario drivers, (ii) seed lists, (iii) parameter/config files, and (iv) figure-generation scripts. An archived, citable snapshot is deposited on Zenodo (DOI: https://doi.org/10.5281/zenodo.18035203). Additional data and materials are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Consensus Procedures

Notation. Symbols follow Table 4. Entropy observables S (informational) and H spatial (spatial), as well as ledger divergence D ledger ( t ) , are computed as defined in Section 3.1. Energy parameters ( e h , e sig ) are given in Table 5. Thresholds and the adaptive maps f ( · ) , g ( · ) are calibrated in Section 3.6.5. Unless stated otherwise, all runs use NS-3.35, 600 s duration, and 30 matched seeds (95% bootstrap CIs).

Appendix A.1. Procedure A.1: VANET Engine (Entropy-Driven Loop)

Algorithm A1 VANET Engine main loop (pseudocode)
Require: Sampling period Δ T ; calibrated maps g ( · ) , f ( · ) ; thresholds S th , H th
Ensure: Safety (no double-commit), eventual liveness within connected components
  1:
repeat every Δ T or upon CAM/DENM reception:
  2:
(Measure) Read S MeasureInformationalEntropy ( ) ; H MeasureSpatialEntropy ( )
  3:
(Smooth) ( S ^ , H ^ ) EMA ( S , H ; λ ) ▹ avoid thrashing
  4:
(Adapt) D g ( S ^ , H ^ ) ;     Θ f ( S ^ , H ^ ) ▹ policy maps; see Sec. Section 3.6.5 and Sec. Section 3.6.8
  5:
(Select mode)
  6:
if S ^ > S th or H ^ > H th then
  7:
     if FBA is enabled then  mode FBA else mode PoS/DPoS
  8:
else
  9:
     mode PoW
  10:
end if
  11:
(Assemble) T k FormCandidateSet ( QoI filter ) ▹ prioritize low Δ t i ; drop stale/invalid ( ϵ i = 1 )
  12:
(Execute)
  13:
switch mode:
  14:
case PoW: B Mine ( T k , D ) ▹ burn e h per hash
  15:
case PoS/DPoS: B StakePropose ( T k , Θ ) ▹ sign/verify; burn e sig
  16:
case FBA: B QuorumCommit ( T k , Q k ) ▹ quorum slices
  17:
(Commit) if B then append; purge conflicts; log metrics
Remarks. (i) EMA smoothing ( λ [ 0 , 1 ) ) prevents oscillations around thresholds; (ii) liveness holds within a connected component assuming eventual synchrony and honest-majority (or honest quorum slices) in PoS/FBA regimes; (iii) safety is enforced via replay/double-commit checks in ValidateBlockCandidate().

Appendix A.2. Procedure A.2: Proof-of-Work (PoW) Module

Algorithm A2 PoW consensus (pseudocode)
Require: Template block B; entropy observables ( S ^ , H ^ ) ; timeout τ max
Ensure: Valid block or null upon timeout
  1:
D Clamp ( g ( S ^ , H ^ ) , D min , D max ) D is a 256-bit target (dimensionless; smaller ⇒ harder)
  2:
ν 0 ; t end t now + τ max
  3:
while t now < t end do
  4:
     B . nonce ν ; h Hash ( B ) ; burn e h
  5:
    if  h < D thenreturnB
  6:
    end if
  7:
     ν ν + 1
  8:
end while
  9:
return null
Energy link. E crypto ( PoW ) e h · E [ ν ] , with E [ ν ] 2 256 D under uniform hashes. This is the basis for the high-entropy PoW regime shown in Figure 4.

Appendix A.3. Procedure A.3: Proof-of-Stake / Delegated PoS (PoS/DPoS)

Algorithm A3 PoS/DPoS consensus (pseudocode)
Require: Stake/validator set V ; rigor register Θ ; election window τ elec
Ensure: Single proposer; quorum of signatures; valid block or null
  1:
if DPoS then  V DelegateElection ( V , τ elec )
  2:
proposer SelectValidator ( V , Θ , VRF / lottery )
  3:
B AssembleBlock ( T k ) ; sign ( B ) ; burn e sig
  4:
broadcast B , σ ; collect votes/endorsements until quorum or timeout
  5:
if QuorumReached thenreturnB
  6:
elsereturn null
  7:
end if
Energy link. E crypto ( PoS / DPoS ) e sig · n sig , where n sig counts proposal, vote/endorsement, and verification operations (as logged by the module).

Appendix A.4. Procedure A.4: Federated Byzantine Agreement (FBA)

Algorithm A4FBA consensus (pseudocode)
Require: Quorum slices { Q k } ; freshness bound τ fresh
Ensure: Commit on federated quorum; or null on stall/partition
  1:
B AssembleBlock ( T k ) ; broadcast PREPARE ( B )
  2:
repeat exchange { PREPARE , COMMIT } with peers in Q k until federated quorum satisfied or τ fresh exceeded
  3:
if FederatedQuorum thenreturnB
  4:
elsereturn null
  5:
end if
Notes. Quorum slices Q k are proximity/recency-based and refreshed periodically (e.g., every 10 s). Localized quorums enable fast commits inside connected subgraphs.

Appendix A.5. Procedure A.5: Complexity and Cost Summary

Table A1. Asymptotic cost per block (worst case). n = | T k | candidate tx; d = network diameter; v = | Q k | . Energy parameters follow Table 5.
Table A1. Asymptotic cost per block (worst case). n = | T k | candidate tx; d = network diameter; v = | Q k | . Energy parameters follow Table 5.
Module Time (local) Messages (network) Energy (per block)
PoW O ( E [ ν ] ) O ( 1 ) broadcast E [ ν ] · e h + O ( n ) verify
PoS/DPoS O ( n ) verify O ( d ) votes e sig · n sig
FBA O ( n ) verify O ( v · d ) quorum msgs radio + signatures (mode-dependent)

Appendix A.6. Procedure A.6: Default Parameters and Justification

Table A2. Parameter defaults used by the Engine and their justification. Calibration details are in Section 3.6.5.
Table A2. Parameter defaults used by the Engine and their justification. Calibration details are in Section 3.6.5.
Parameter Default Basis / Rationale
Sampling period Δ T 1 s Matches metrics cadence; avoids over-reactivity
EMA factor λ 0.5 Reduces mode thrashing under bursty load
S th 0.5 Knee point in latency / delivery sweeps
H th 0.6 Delivery threshold onset in sweeps
Policy maps g ( · ) , f ( · ) see Section 3.6.5 Selected via 5-fold CV under monotonicity/stability constraints
τ max (PoW) 200 ms Bounds mining stalls; respects VANET deadlines
| Q k | (FBA) 5 peers Proximity-based slices; stable local quorums
τ elec (DPoS) 5 s Trade-off between churn and fairness

Appendix A.7. Procedure A.7: Ledger-Divergence Metric and Fork Detection (Restated)

Consistency note. The definitions below are identical to Section 3.2 and are restated here for completeness and reproducibility.

Ledger divergence D ledger (t).

Let L u ( t ) be the ordered block sequence at node u at time t with height h u ( t ) = | L u ( t ) | . For nodes u v , let LCP ( u , v , t ) be the length of the longest common prefix of L u ( t ) and L v ( t ) . Define
δ ( u , v , t ) = 1 LCP ( u , v , t ) max { 1 , max ( h u ( t ) , h v ( t ) ) } , D ledger ( t ) = 2 N ( t ) ( N ( t ) 1 ) u < v δ ( u , v , t ) [ 0 , 1 ] .
The value reported in figures is either the instantaneous D ledger ( t ) at sampling instants or a time-average over a specified window, always computed from logged chain-prefix information.

Fork/orphan rate.

We report orphan/fork rate O as the fraction of produced blocks that do not lie on the final main chain at simulation end. Operationally, a block is marked orphaned if it is not on the selected main chain at run end (logged via orphan_flag; see Table 9). Thus,
O = # { orphaned blocks } # { produced blocks } × 100 % .

Appendix A.8. Procedure A.8: Entropy Normalization and Boundedness (Restated)

Consistency note. The definitions below are consistent with Section 3.1 and are restated here for completeness and reviewer traceability.

Informational entropy S(t) (normalized Shannon).

At time t, let T ( t ) be the set of distinct pending transactions and let c i ( t ) be the number of nodes currently holding transaction i T ( t ) . We apply Laplace smoothing c i ( t ) c i ( t ) + ε with ε = 10 6 to avoid ln 0 . Define the normalized distribution
p ˜ i ( t ) = c i ( t ) k T ( t ) c k ( t ) , i T ( t ) p ˜ i ( t ) = 1 ,
and compute the Shannon entropy (natural logarithm; nats)
S raw ( t ) = i T ( t ) p ˜ i ( t ) ln p ˜ i ( t ) .
We report the bounded, normalized value
S ( t ) = S raw ( t ) ln | T ( t ) | [ 0 , 1 ] .

Spatial entropy H spatial (t) (normalized Shannon).

Partition the scenario area into M spatial bins (Table 8). Let n j ( t ) be the number of vehicles in bin j and N ( t ) = j = 1 M n j ( t ) . With q j ( t ) = n j ( t ) / N ( t ) , j = 1 M q j ( t ) = 1 , define
H raw ( t ) = j = 1 M q j ( t ) ln q j ( t ) , H spatial ( t ) = H raw ( t ) ln M [ 0 , 1 ] .

Units/dimensions.

S ( t ) and H spatial ( t ) are dimensionless; normalization by ln | T ( t ) | and ln M ensures boundedness in [ 0 , 1 ] under the stated definitions.

Appendix B. Ablations and Calibration Diagnostics

This appendix reports robustness checks supporting the stability of the control policy: (i) ± 10 % coefficient perturbations for g and f, (ii) sensitivity to ( e h , e sig ) within Table 5 ranges, and (iii) threshold perturbations around ( S th , H th ) verifying that headline improvements persist without brittle tuning. We also include the QoI ablation details (corruption and staleness rates) used to generate Table 11.

Appendix B.1. Cross-Validation Protocol and Selection Criterion

We use 5-fold cross-validation with folds split by matched random seeds to avoid leakage across conditions. For each candidate function family, we compute the fold-wise validation loss and select the model with minimal mean loss. Constraint satisfaction (monotonicity in S and Lipschitz stability in H spatial ) is verified per fold.

Appendix B.2. Constraint Checks and Stability

We report: (i) the fraction of samples violating monotonicity prior to projection, (ii) post-projection violations (should be zero by construction), and (iii) an empirical Lipschitz score measuring max | Δ Θ | / | Δ H spatial | over neighboring bins.

Appendix B.3. Model-Family Comparison (Summary)

We provide the ranked candidate families (polynomial, exponential, logarithmic, Fourier, spline) with their mean fold-loss and standard deviation. Fourier terms are retained only if they improve mean validation loss by at least 1% across folds and do not increase mode-switch thrashing.

Appendix B.4. Sensitivity to Coefficient Perturbations

We perturb fitted coefficients by ± 10 % and re-run the post-processing pipeline to confirm qualitative trends (latency, energy, orphan rate, and D ledger ) are preserved.

References

  1. Hartenstein, H.; Laberteaux, K. VANET: vehicular applications and inter-networking technologies; John Wiley & Sons, 2009. [Google Scholar]
  2. Yousefi, S.; Mousavi, M.S.; Fathy, M. Vehicular ad hoc networks (VANETs): challenges and perspectives 2006, 761–766.
  3. Mokhtar, B.; Azab, M. Survey on security issues in vehicular ad hoc networks. Alexandria engineering journal 2015, 54, 1115–1126. [Google Scholar] [CrossRef]
  4. Müter, M.; Asaj, N. Entropy-based anomaly detection for in-vehicle networks. In Proceedings of the 2011 IEEE Intelligent Vehicles Symposium (IV), 2011; IEEE; pp. 1110–1115. [Google Scholar]
  5. Khan, A.S.; Balan, K.; Javed, Y.; Tarmizi, S.; Abdullah, J. Secure trust-based blockchain architecture to prevent attacks in VANET. Sensors 2019, 19, 4954. [Google Scholar] [CrossRef] [PubMed]
  6. Nandy, T.; Idris, M.Y.I.; Noor, R.M.; Wahab, A.W.A.; Bhattacharyya, S.; Kolandaisamy, R.; Yahuza, M. A secure, privacy-preserving, and lightweight authentication scheme for VANETs. IEEE Sensors Journal 2021, 21, 20998–21011. [Google Scholar] [CrossRef]
  7. Cui, J.; Ouyang, F.; Ying, Z.; Wei, L.; Zhong, H. Secure and efficient data sharing among vehicles based on consortium blockchain. IEEE Transactions on Intelligent Transportation Systems 2021, 23, 8857–8867. [Google Scholar] [CrossRef]
  8. Ma, Z.; Zhang, J.; Guo, Y.; Liu, Y.; Liu, X.; He, W. An efficient decentralized key management mechanism for VANET with blockchain. IEEE Transactions on Vehicular Technology 2020, 69, 5836–5849. [Google Scholar] [CrossRef]
  9. Riley, G.F.; Henderson, T.R. The ns-3 network simulator. In Modeling and tools for network simulation; Springer, 2010; pp. 15–34. [Google Scholar]
  10. Bitok, H.J.; Wang, M.; Desmond, D. Consensus on the Internet of Vehicles: A Systematic Literature Review. World Electric Vehicle Journal 2025, 16. [Google Scholar] [CrossRef]
  11. Saleh, F. Blockchain without waste: Proof-of-stake. The Review of financial studies 2021, 34, 1156–1190. [Google Scholar] [CrossRef]
  12. Kiayias, A.; Russell, A.; David, B.; Oliynykov, R. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Proceedings of the Annual international cryptology conference, 2017; Springer; pp. 357–388. [Google Scholar]
  13. Tang, F.; Peng, J.; Wang, P.; Zhu, H.; Xu, T. Improved dynamic Byzantine Fault Tolerant consensus mechanism. Computer Communications 2024, 226–227, 107922. [CrossRef]
  14. Lottermann, C.; Botsov, M.; Fertl, P.; Müllner, R.; Araniti, G.; Campolo, C.; Condoluci, M.; Iera, A.; Molinaro, A. Vehicular ad hoc networks: Standards, solutions, and research; Springer International Publishing, 2015. [Google Scholar]
  15. Papadimitratos, P.; Buttyan, L.; Holczer, T.; Schoch, E.; Freudiger, J.; Raya, M.; Ma, Z.; Kargl, F.; Kung, A.; Hubaux, J.P. Secure vehicular communication systems: design and architecture. IEEE Communications magazine 2008, 46, 100–109. [Google Scholar] [CrossRef]
  16. Raya, M.; Hubaux, J.P. Securing vehicular ad hoc networks. Journal of computer security 2007, 15, 39–68. [Google Scholar] [CrossRef]
  17. Cui, J.; Zhang, X.; Zhong, H.; Ying, Z.; Liu, L. IEEE; 2019; Vol. 6, pp. 6417–6428. [Google Scholar]
  18. Zhang, C.; Lu, R.; Lin, X.; Ho, P.H.; Shen, X. An efficient identity-based batch verification scheme for vehicular sensor networks; 2008; pp. 246–250. [Google Scholar]
  19. AlMarshoud, M.; Sabir Kiraz, M.; Al-Bayatti, H.A. Security, privacy, and decentralized trust management in VANETs: A review of current research and future directions. ACM Computing Surveys 2024, 56, 1–39. [Google Scholar] [CrossRef]
  20. Jerbi, M.; Senouci, S.M.; Rasheed, T.; Ghamri-Doudane, Y. Towards efficient geographic routing in urban vehicular networks. Ieee transactions on vehicular technology 2009, 58, 5048–5059. [Google Scholar] [CrossRef]
  21. McKinney, W.; van der Walt, S.; Millman, J. Proceedings of the 9th Python in Science Conference. Austin, Texas, 2010.
  22. Hunter, J.D. Matplotlib: A 2D graphics environment. Computing in science & engineering 2007, 9, 90–95. [Google Scholar]
1
Wasted crypto energy is the share of cryptographic energy spent on blocks that end orphaned or fail payload validation, computed from the logged orphan_flag and valid_flag fields (Section 5.5).
Figure 1. Operational S–QoI diagram (engineering analogy). Injection and churn tend to increase disorder (S); validation expends resources to reduce disorder and improve QoI (proxy). The formal objective and control laws are detailed in Section 3.6.8.
Figure 1. Operational S–QoI diagram (engineering analogy). Injection and churn tend to increase disorder (S); validation expends resources to reduce disorder and improve QoI (proxy). The formal objective and control laws are detailed in Section 3.6.8.
Preprints 191890 g001
Figure 2. NS-3 implementation flow. Each cluster-local Engine reads S and H spatial from a shared metrics service, compares them to ( S th , H th ) , and selects the active ConsensusConfig. Dissemination is optional because the policy is deterministic given the logged observables.
Figure 2. NS-3 implementation flow. Each cluster-local Engine reads S and H spatial from a shared metrics service, compares them to ( S th , H th ) , and selects the active ConsensusConfig. Dissemination is optional because the policy is deterministic given the logged observables.
Preprints 191890 g002
Figure 3. Consensus modules implementing a unified ConsensusModule interface. Solid arrows denote interface calls; dashed arrows denote event/callback-driven instrumentation at block-commit time. PoW logs realized n hash , while signature/quorum-based modes log n sig ; cryptographic energy is computed analytically and radio energy is obtained from NS-3 device models (Section 5.7).
Figure 3. Consensus modules implementing a unified ConsensusModule interface. Solid arrows denote interface calls; dashed arrows denote event/callback-driven instrumentation at block-commit time. PoW logs realized n hash , while signature/quorum-based modes log n sig ; cryptographic energy is computed analytically and radio energy is obtained from NS-3 device models (Section 5.7).
Preprints 191890 g003
Figure 6. Normalized message overhead at N = 50 (30 seeds; 95% CIs).
Figure 6. Normalized message overhead at N = 50 (30 seeds; 95% CIs).
Preprints 191890 g006
Table 1. Summary of representative blockchain-based VANET/IoV proposals and their limitations (updated with first-author names and recent work).
Table 1. Summary of representative blockchain-based VANET/IoV proposals and their limitations (updated with first-author names and recent work).
Work Method Summary Limitations
Sharma et al. [5] PoW (VANET blockchain) Early VANET blockchain design focusing on consensus feasibility under mobility. Static parameters; no closed-loop adaptation to real-time disorder; limited energy/latency governance.
Ning et al. [6] Permissioned / quorum-based Infrastructure-assisted validation and improved consistency in vehicular settings. Assumes stable membership/infra; lacks explicit real-time control objectives (latency–energy–coherence).
Ferdowsi et al. [7] Entropy-inspired indicators Uses disorder indicators to reason about network conditions. Indicators are not embedded in a full control loop with calibrated policy maps and stability constraints.
Daza et al. [8] Single-algorithm evaluation Consensus tested in limited conditions with fixed settings. No hybrid switching; no entropy-conditioned rigor; limited adversarial/partition sensitivity.
Bitok et al. [10] Systematic review (IoV consensus) Comprehensive synthesis of IoV consensus mechanisms, assumptions, and evaluation axes. Not a control implementation; does not provide an entropy-driven runtime governance loop or NS-3 control maps.
Table 2. Consensus mechanisms in VANET contexts (indicative scaling). Concrete values depend on parameterization, quorum size, and network conditions.
Table 2. Consensus mechanisms in VANET contexts (indicative scaling). Concrete values depend on parameterization, quorum size, and network conditions.
Mechanism Crypto energy (scaling) Finality / agreement VANET challenge (refs)
PoW E PoW e h E [ n hash ] ; E [ n hash ] 2 d ( equiv. 2 256 / D  ) Probabilistic; increases with forks/propagation delays High variance under churn; energy rises steeply with d and with disorder-amplified orphaning [11]
PoS O ( | V | ) · e sig (votes/verify) + msg Fast in small committees; degrades under partitions/view changes Validator/committee dynamics and equivocation handling under mobility [12]
PoA / DPoS Signature-dominant; committee-sized Low in stable authority/committee settings; sensitive to churn Reduced decentralization; authority/committee risks and reconfiguration costs [8]
BFT / FBA Sig + msg; typically O ( | V | 2 ) messaging Deterministic within connected quorums; stalls under partitions Quorum formation, view changes, and slice stability under mobility/partitions [13]
Hybrid (fixed) Tunable; fixed thresholds Configurable; but brittle at regime boundaries Vanilla Hybrid: switches using fixed rules/parameters (no feedback calibration)
Hybrid (closed-loop) Tunable; feedback-driven rigor Configurable; stabilized by bounded adaptation Requires stable online control under fast topology change (this work)
Table 3. VANET security/latency challenges as governance triggers: impacts and representative mitigations.
Table 3. VANET security/latency challenges as governance triggers: impacts and representative mitigations.
Challenge Impact Mitigation (examples) Refs.
Mobility & dynamic topology Link breaks; unstable paths; component-wise consensus Clustering; adaptive routing; local quorums [2,3]
Bandwidth fluctuation & congestion Bursty latency; packet loss; broadcast storms QoS scheduling; congestion control; edge offload [4,14]
Security threats (spoofing, replay, Sybil) False alerts; data tampering; trust collapse Authentication; plausibility checks; trust thresholds [15,16,17]
Centralized bottlenecks (RSU/CA) Single points of failure; targeted DoS Distributed revocation; mutual authentication; decentralization [8]
OBU constraints Processing delays; energy limits; limited compute Lightweight crypto; batching; bounded validation effort [18,19]
Table 4. Nomenclature used throughout the paper. S and H spatial are normalized, dimensionless Shannon entropies in [ 0 , 1 ] .
Table 4. Nomenclature used throughout the paper. S and H spatial are normalized, dimensionless Shannon entropies in [ 0 , 1 ] .
Symbol Meaning Units / Domain First use
N Number of active nodes (vehicles) N Section 3.1
T ( t ) Set of distinct pending transactions Section 3.1
S ( t ) Informational entropy (normalized Shannon) [ 0 , 1 ] Section 3.1
M Number of spatial bins N Section 3.1
H spatial ( t ) Spatial entropy (normalized Shannon) [ 0 , 1 ] Section 3.1
Δ t i Per-transaction delay ms Section 3.1
ϵ i Validity indicator (0 valid; 1 invalid/stale) { 0 , 1 } Section 3.1
QoI QoI proxy from ( Δ t i , ϵ i ) tiers Section 3.1
D ledger ( t ) Average pairwise ledger divergence (LCP-normalized divergence) [ 0 , 1 ] Section 3.1
D PoW target (smaller ⇒ harder) dimensionless Section 3.4
Θ Mode-dependent rigor parameter (stake/quorum, etc.) dimensionless Section 3.4
g ( S , H ) PoW target mapping dimensionless Section 3.4
f ( S , H ) Stake/quorum mapping dimensionless Section 3.4
S th Informational-entropy trigger threshold [ 0 , 1 ] Section 3.6.5
H th Spatial-entropy trigger threshold [ 0 , 1 ] Section 3.6.5
Δ T Engine sampling period s Section 3.4
e h Energy per hash J/hash Table 5
e sig Energy per signature op J/op Table 5
E block Energy per confirmed block J Section 6
TPS Throughput (transactions per second) tx/s Section 6
F Finality time ms Section 6
O Orphan rate % Section 6
Table 5. Cryptographic energy constants used in analytical accounting. Constants approximate software cryptography on embedded OBU-class hardware and are injected into NS-3 energy accounting as per-operation costs (Section 5.7). Sensitivity ranges are used for robustness checks.
Table 5. Cryptographic energy constants used in analytical accounting. Constants approximate software cryptography on embedded OBU-class hardware and are injected into NS-3 energy accounting as per-operation costs (Section 5.7). Sensitivity ranges are used for robustness checks.
Symbol Operation (counted in logs) Default Sensitivity range Units
e h Energy per hash evaluation used in PoW mining (each hash attempt increments n hash ) 5 [ 1 , 10 ] nJ/hash
e sig Energy per signature operation (sign or verify) used in PoS/DPoS/FBA (proposal + votes/endorsements + verifications increment n sig ) 1 [ 0.5 , 2 ] μ J/op
Table 6. Fitted coefficients used by the Engine for the policy maps g ( S , H spatial ) (PoW target) and f ( S , H spatial ) (stake/quorum rigor). Values are taken from the released configuration used in all claiming runs and match the coefficients shown in the PDF calibration table.
Table 6. Fitted coefficients used by the Engine for the policy maps g ( S , H spatial ) (PoW target) and f ( S , H spatial ) (stake/quorum rigor). Values are taken from the released configuration used in all claiming runs and match the coefficients shown in the PDF calibration table.
Coefficient Meaning Value
β 0 Intercept for log 2 D 223.075
β S S sensitivity (monotone envelope in S) 3.250
β H H spatial sensitivity (Lipschitz-bounded) 1.200
β S H Interaction term S · H spatial 0.800
β H 2 Quadratic dispersion term 0.600
β sin Fourier term sin ( 2 π H spatial ) (optional) 0
β cos Fourier term cos ( 2 π H spatial ) (optional) 0
α S S sensitivity for T (non-decreasing in S) 0.400
α H H spatial sensitivity for T 0.300
α S H Interaction term for T 0.200
α H 2 Quadratic dispersion term for T 0.100
D min , D max PoW target bounds (256-bit register) ( 2 232 , 2 248 )
T 0 , T min , T max Rigor anchor and bounds (stake units) ( 10 3 , 5 × 10 2 , 2 × 10 3 )
Table 7. Adversary and stress-test profiles used in robustness experiments. These stressors are bounded sensitivity analyses (non-fully-adaptive attackers) and are scheduled/configured as described in Section 5.3.
Table 7. Adversary and stress-test profiles used in robustness experiments. These stressors are bounded sensitivity analyses (non-fully-adaptive attackers) and are scheduled/configured as described in Section 5.3.
Stressor Configuration (bounded)
Sybil identities Sybil rate = 5% of nodes; each attacker emits 3–5 pseudonyms. Sybil behavior increases control/data-plane contention but does not grant additional hashing power in PoW.
Byzantine proposer (equivocation) In signature/quorum modes, a Byzantine proposer may double-propose conflicting block headers within a 200 ms window; equivocation is detected by header conflicts and replay/double-commit checks at validation.
Eclipse window Drop non-colluding peers for 5–10 s to emulate a short-lived eclipse condition; recovery is assessed via divergence decay and orphan outcomes after re-connection.
Scheduled partitions (k-cuts) Link-disabling windows producing transient disconnections for 10–30 s (scenario-dependent), modeling mobility/channel-driven fragmentation; global ordering is not claimed during disconnection, only post-rejoin convergence.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated