{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:51:57Z","timestamp":1742914317416,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031212796"},{"type":"electronic","value":"9783031212802"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21280-2_27","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:15Z","timestamp":1668760215000},"page":"485-501","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anonymous Authentication Protocols in\u00a0Vehicular Ad Hoc Network-An Survey"],"prefix":"10.1007","author":[{"given":"Guiwen","family":"Fu","sequence":"first","affiliation":[]},{"given":"Yanan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qianlin","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Ali, I., Lawrence, T., Li, F.: An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. J. Syst. Architect. 103 (2019)","DOI":"10.1016\/j.sysarc.2019.101692"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Alshaer, H.: Securing vehicular ad-hoc networks connectivity with roadside units support, pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/IEEEGCC.2015.7060039"},{"issue":"9","key":"27_CR3","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","volume":"18","author":"M Azees","year":"2017","unstructured":"Azees, M., Vijayakumar, P., Deboarh, L.J.: EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 18(9), 2467\u20132476 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Bao, S., Hathal, W., Cruickshank, H., Sun, Z., Asuquo, P., Lei, A.: A lightweight authentication and privacy-preserving scheme for VANETs using tesla and bloom filters. ICT Express, p. S2405959517302333 (2017)","DOI":"10.1016\/j.icte.2017.12.001"},{"issue":"2","key":"27_CR5","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.jalgor.2005.01.009","volume":"58","author":"IF Blake","year":"2006","unstructured":"Blake, I.F., Murty, V.K., Xu, G.: Refinements of Miller\u2019s algorithm for computing the Weil\/Tate pairing. J. Algorithms 58(2), 134\u2013149 (2006)","journal-title":"J. Algorithms"},{"key":"27_CR6","unstructured":"Dhamgaye, A., Chavhan, N.: Survey on security challenges in VANET. Int. J. Comput. Sci. Netw. 2(1) (2013)"},{"issue":"1","key":"27_CR7","first-page":"33","volume":"1","author":"A Dua","year":"2014","unstructured":"Dua, A., Kumar, N., Bawa, S.: A systematic review on routing protocols for vehicular ad hoc networks. Veh. Commun. 1(1), 33\u201352 (2014)","journal-title":"Veh. Commun."},{"key":"27_CR8","unstructured":"Freudiger, J., Raya, M., Feleghhazi, M.: Mix-zones for location privacy in vehicular networks. In: WiN-ITS 2007 (2007)"},{"key":"27_CR9","doi-asserted-by":"publisher","first-page":"20209","DOI":"10.1109\/ACCESS.2018.2822806","volume":"6","author":"Y Han","year":"2018","unstructured":"Han, Y., Xue, N.N., Wang, B.Y., Zhang, Q., Liu, C.L., Zhang, W.S.: Improved dual-protected ring signature for security and privacy of vehicular communications in vehicular ad-hoc networks. IEEE Access 6, 20209\u201320220 (2018)","journal-title":"IEEE Access"},{"issue":"12","key":"27_CR10","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681\u20132691 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"153701","DOI":"10.1109\/ACCESS.2021.3125521","volume":"9","author":"SA Jan","year":"2021","unstructured":"Jan, S.A., Amin, N.U., Othman, M., Ali, M., Umar, A.I., Basir, A.: A survey on privacy-preserving authentication schemes in VANETs: attacks, challenges and open issues. IEEE Access 9, 153701\u2013153726 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3125521","journal-title":"IEEE Access"},{"issue":"11","key":"27_CR12","doi-asserted-by":"publisher","first-page":"10283","DOI":"10.1109\/TVT.2017.2718101","volume":"66","author":"C Jie","year":"2017","unstructured":"Jie, C., Jing, Z., Hong, Z., Yan, X.: SPACF: a secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans. Veh. Technol. 66(11), 10283\u201310295 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"96","DOI":"10.3390\/fi13040096","volume":"13","author":"S Khan","year":"2021","unstructured":"Khan, S., Sharma, I., Aslam, M., Khan, M.Z., Khan, S.: Security challenges of location privacy in VANETs and state-of-the-art solutions: a survey. Future Internet 13, 96 (2021)","journal-title":"Future Internet"},{"issue":"10","key":"27_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/s11432-017-9203-x","volume":"60","author":"T Khan","year":"2017","unstructured":"Khan, T., et al.: Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey. Sci. China Inf. Sci. 60(10), 18 (2017)","journal-title":"Sci. China Inf. Sci."},{"issue":"6","key":"27_CR15","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1007\/s11276-013-0543-7","volume":"19","author":"CC Lee","year":"2013","unstructured":"Lee, C.C., Lai, Y.M.: Toward a secure batch verification with group testing for VANET. Wirel. Netw. 19(6), 1441\u20131449 (2013)","journal-title":"Wirel. Netw."},{"issue":"4","key":"27_CR16","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MCOM.2008.4481346","volume":"46","author":"X Lin","year":"2008","unstructured":"Lin, X., Lu, R., Zhang, C., Zhu, H., Shen, X.: Security in vehicular ad hoc networks. IEEE Commun. Mag. 46(4), 88\u201395 (2008)","journal-title":"IEEE Commun. Mag."},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"575","DOI":"10.26599\/TST.2018.9010131","volume":"24","author":"J Liu","year":"2019","unstructured":"Liu, J., et al.: Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular ad-hoc networks. Tsinghua Sci. Technol. 24, 575\u2013584 (2019)","journal-title":"Tsinghua Sci. Technol."},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: INFOCOM the Conference on Computer Communications. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","volume":"20","author":"Z Lu","year":"2018","unstructured":"Lu, Z., Qu, G., Liu, Z.: A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst. 20, 760\u2013776 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"27_CR20","first-page":"19","volume":"9","author":"SS Manvi","year":"2017","unstructured":"Manvi, S.S., Tangade, S.: A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 9, 19\u201330 (2017)","journal-title":"Veh. Commun."},{"key":"27_CR21","doi-asserted-by":"publisher","first-page":"2061","DOI":"10.1007\/s11277-021-09228-y","volume":"123","author":"S Paliwal","year":"2022","unstructured":"Paliwal, S., Cherukuri, A.K., Gao, X.Z.: Dynamic private modulus based password conditional privacy preserving authentication and key-agreement protocol for VANET. Wirel. Pers. Commun. 123, 2061\u20132088 (2022)","journal-title":"Wirel. Pers. Commun."},{"key":"27_CR22","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-981-15-5971-6_51","volume-title":"Intelligent and Cloud Computing","author":"BK Pattanayak","year":"2021","unstructured":"Pattanayak, B.K., Pattnaik, O., Pani, S.: Dealing with Sybil attack in VANET. In: Mishra, D., Buyya, R., Mohapatra, P., Patnaik, S. (eds.) Intelligent and Cloud Computing. SIST, vol. 194, pp. 471\u2013480. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-5971-6_51"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Perrig, A., Ran, C., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol (2002)","DOI":"10.1007\/978-1-4615-0229-6_3"},{"key":"27_CR24","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.comnet.2018.01.015","volume":"134","author":"SM Pournaghi","year":"2018","unstructured":"Pournaghi, S.M., Zahednejad, B., Bayat, M., Farjami, Y.: NECPPA: a novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput. Netw. 134, 78\u201392 (2018)","journal-title":"Comput. Netw."},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Smitha, A., Pai, M., Ajam, N., Mouzna, J.: An optimized adaptive algorithm for authentication of safety critical messages in VANET. In: International ICST Conference on Communications Networking in China (2014)","DOI":"10.1109\/ChinaCom.2013.6694582"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Sulthana, S.: Privacy preserving schemes in VANETs: a review. Int. J. Comput. Technol. Appl. (2018)","DOI":"10.22214\/ijraset.2018.3354"},{"issue":"sp1","key":"27_CR27","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2112\/JCR-SI104-037.1","volume":"104","author":"M Sun","year":"2020","unstructured":"Sun, M., Zhang, J., Guo, Y.: Anonymous identity authentication scheme for VANETs. J. Coast. Res. 104(sp1), 203\u2013209 (2020)","journal-title":"J. Coast. Res."},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Sun, X., Lin, X., Ho, P.H.: Secure vehicular communications based on group signature and ID-based signature scheme. In: IEEE International Conference on Communications (2007)","DOI":"10.1109\/ICC.2007.258"},{"issue":"7","key":"27_CR29","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589\u20133603 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"27_CR30","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1109\/TVT.2015.2402166","volume":"65","author":"F Wang","year":"2016","unstructured":"Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896\u2013911 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"27_CR31","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.comcom.2017.09.005","volume":"112","author":"S Wang","year":"2017","unstructured":"Wang, S., Yao, N.: LIAP: a local identity-based anonymous message authentication protocol in VANETs. Comput. Commun. 112, 154\u2013164 (2017)","journal-title":"Comput. Commun."},{"key":"27_CR32","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1002\/sec.305","volume":"5","author":"X Xue","year":"2012","unstructured":"Xue, X., Ding, J.: LPA: a new location-based privacy-preserving authentication protocol in VANET. Secur. Commun. Netw. 5, 69\u201378 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"8","key":"27_CR33","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1007\/s11276-011-0383-2","volume":"17","author":"C Zhang","year":"2011","unstructured":"Zhang, C., Ho, P.H., Tapolcai, J.: On batch verification with group testing for vehicular communications. Wirel. Netw. 17(8), 1851\u20131865 (2011)","journal-title":"Wirel. Netw."},{"key":"27_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R., Ho, P.H.: Raise: an efficient RSU-aided message authentication scheme in vehicular communication networks. In: IEEE International Conference on Communications (2008)","DOI":"10.1109\/ICC.2008.281"},{"key":"27_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: The 27th Conference on Computer Communications, INFOCOM 2008. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, L., Li, C., Li, Y., Luo, Q., Zhu, R.: Group signature based privacy protection algorithm for mobile ad hoc network. In: 2017 IEEE International Conference on Information and Automation (ICIA) (2017)","DOI":"10.1109\/ICInfA.2017.8079039"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21280-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:34:52Z","timestamp":1668760492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21280-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031212796","9783031212802"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21280-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ispec2022.ndhu.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}