{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:07:38Z","timestamp":1743073658543,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030797270"},{"type":"electronic","value":"9783030797287"}],"license":[{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-79728-7_6","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"50-58","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Cong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Nan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Tianhan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jiayu","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Xinyang","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"issue":"3","key":"6_CR1","first-page":"291","volume":"30","author":"PP Ray","year":"2016","unstructured":"Ray, P.P.: A survey on Internet of things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291\u2013319 (2016)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., et al.: Internet of things: a survey on enabling technologies, protocols and applications. IEEE Commun. Surv. Tutor. 17, 1 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Moser, K., Harder, J., Koo, S.G.M.: Internet of things in home automation and energy efficient smart home technologies. In: 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1260\u20131265 (2014)","DOI":"10.1109\/SMC.2014.6974087"},{"key":"6_CR4","first-page":"50","volume":"12","author":"M Muhammad","year":"2018","unstructured":"Muhammad, M., Safdar, G.A.: Survey on existing authentication issues for cellular-assisted V2X communication. Veh. Commun. 12, 50\u201365 (2018)","journal-title":"Veh. Commun."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, G., Castiglione, A., Palmieri, F.: A Cluster-based multidimensional approach for detecting attacks on connected vehicles. IEEE IoT J. 1 (2020)","DOI":"10.1109\/JIOT.2020.3032935"},{"issue":"2","key":"6_CR6","doi-asserted-by":"publisher","first-page":"2422","DOI":"10.1109\/JSEN.2020.3021731","volume":"21","author":"MA Al-Shareeda","year":"2021","unstructured":"Al-Shareeda, M.A., Anbar, M., Hasbullah, I.H., Manickam, S.: Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sens. J. 21(2), 2422\u20132433 (2021)","journal-title":"IEEE Sens. J."},{"issue":"8","key":"6_CR7","doi-asserted-by":"publisher","first-page":"9017","DOI":"10.1109\/TVT.2020.2999533","volume":"69","author":"VK Kukkala","year":"2020","unstructured":"Kukkala, V.K., Pasricha, S., Bradley, T.: SEDAN: security-aware design of time-critical automotive networks. IEEE Trans. Veh. Technol. 69(8), 9017\u20139030 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.patrec.2020.04.038","volume":"135","author":"A Castiglione","year":"2020","unstructured":"Castiglione, A., Palmieri, F., Colace, F., Lombardi, M., Santaniello, D., D\u2019Aniello, G.: Securing the internet of vehicles through lightweight block ciphers. Pattern Recogn. Lett. 135, 264\u2013270 (2020)","journal-title":"Pattern Recogn. Lett."},{"key":"6_CR9","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1007\/978-3-030-39445-5_57","volume-title":"FICC 2020","author":"D Grimm","year":"2020","unstructured":"Grimm, D., Pistorius, F., Sax, E.: Network security monitoring in automotive domain. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FICC 2020. Advances in Intelligent Systems and Computing, vol. 1129, pp. 782\u2013799. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39445-5_57"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.techfore.2015.10.006","volume":"103","author":"J Hong","year":"2016","unstructured":"Hong, J., Shin, J., Lee, D.: Strategic management of next-generation connected life: focusing on smart key and car-home connectivity. Technol. Forecast. Soc. Chang. 103, 11\u201320 (2016)","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.pmcj.2017.03.008","volume":"41","author":"JE Rubio","year":"2017","unstructured":"Rubio, J.E., Alcaraz, C., Lopez, J.: Recommender system for privacy-preserving solutions in smart metering. Pervasive Mob. Comput. 41, 205\u2013218 (2017)","journal-title":"Pervasive Mob. Comput."},{"issue":"12","key":"6_CR12","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., et al.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681\u20132691 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S.: Rackoff the knowledge complexity of interactive proof systems. SIAM J. Comput. - SIAMCOMP 18, 186\u2013208 (1989)","journal-title":"SIAM J. Comput. - SIAMCOMP"},{"key":"6_CR14","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology \u2013 EUROCRYPT 1999, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, 2\u20136 May 1999, Proceeding. Springer, Heidelberg (1999)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.future.2020.01.028","volume":"106","author":"N Guo","year":"2020","unstructured":"Guo, N., Zhao, C., Gao, T.: An anonymous authentication scheme for edge computing-based car-home connectivity services in vehicular networks. Future Gener. Comput. Syst. 106, 659\u2013671 (2020)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Lecture Notes in Networks and Systems","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79728-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:50:41Z","timestamp":1624474241000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79728-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,24]]},"ISBN":["9783030797270","9783030797287"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79728-7_6","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,6,24]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}