{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T19:40:54Z","timestamp":1773171654652,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Natural Science Research Project of Colleges and Universities in Anhui Province","award":["2022AH052845"],"award-info":[{"award-number":["2022AH052845"]}]},{"name":"Natural Science Research Project of Colleges and Universities in Anhui Province","award":["2022AH052845"],"award-info":[{"award-number":["2022AH052845"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10207-024-00876-2","type":"journal-article","created":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T19:01:51Z","timestamp":1718737311000},"page":"2977-2989","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A dynamic C-V2X anonymous authentication and group key agreement protocol"],"prefix":"10.1007","volume":"23","author":[{"given":"Beibei","family":"Cui","sequence":"first","affiliation":[]},{"given":"Wei","family":"He","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,18]]},"reference":[{"issue":"3","key":"876_CR1","first-page":"1234","volume":"23","author":"J Smith","year":"2022","unstructured":"Smith, J., Johnson, B.: Cellular vehicle-to-everything (C-V2X) for intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 23(3), 1234\u20131245 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"876_CR2","doi-asserted-by":"crossref","unstructured":"Almasan, P., Su\u2018rez-Varela, J., Lutu, A., Cabellos-Aparicio, A., Barlet-Ros, P.: Enhancing 5G Radio Planning with Graph Representations and Deep Learning. arXiv:2309.03603 (2023)","DOI":"10.1145\/3609382.3610509"},{"issue":"2","key":"876_CR3","first-page":"100","volume":"14","author":"J Smith","year":"2023","unstructured":"Smith, J., Johnson, B.: An analysis of PC5 interface in LTE-V2X systems. J. Veh. Technol. 14(2), 100\u2013108 (2023)","journal-title":"J. Veh. Technol."},{"issue":"3","key":"876_CR4","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MNET.2018.1700344","volume":"32","author":"L Hong","year":"2018","unstructured":"Hong, L., Zhang, Y., et al.: Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Network 32(3), 78\u201383 (2018)","journal-title":"IEEE Network"},{"key":"876_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100222","author":"P Dong","year":"2024","unstructured":"Dong, P., Hou, N., Tang, Y., Cheng, Y., Ji, C.: Device authentication for 5G terminals via Radio Frequency fingerprints. High-Confid. Comput. (2024). https:\/\/doi.org\/10.1016\/j.hcc.2024.100222","journal-title":"High-Confid. Comput."},{"key":"876_CR6","first-page":"1","volume":"10","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Wang, Y., Chang, G.: Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Trans. Intell. Transp. Syst. 10, 1\u201310 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"876_CR7","first-page":"100306","volume":"28","author":"SA Eftekhari","year":"2021","unstructured":"Eftekhari, S.A., Nikooghadam, M., Rafighi, M.: Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications. Veh. Commun. 28, 100306 (2021)","journal-title":"Veh. Commun."},{"key":"876_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2015.12.003","volume":"62","author":"P Gope","year":"2016","unstructured":"Gope, P., Hwang, T.: An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J. Netw. Comput. Appl. 62, 1\u20138 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2015.12.003","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"876_CR9","doi-asserted-by":"publisher","first-page":"e0228319","DOI":"10.1371\/journal.pone.0228319","volume":"15","author":"M Han","year":"2020","unstructured":"Han, M., Liu, S., Ma, S., Wan, A.: Anonymous-authentication scheme based on fog computing for VANET. PLoS ONE 15(2), e0228319 (2020). https:\/\/doi.org\/10.1371\/journal.pone.0228319","journal-title":"PLoS ONE"},{"key":"876_CR10","doi-asserted-by":"publisher","first-page":"14966","DOI":"10.1109\/ACCESS.2017.2723265","volume":"5","author":"M Wazid","year":"2017","unstructured":"Wazid, M., Das, A.K., Kumar, N., et al.: Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access 5, 14966\u201314980 (2017)","journal-title":"IEEE Access"},{"key":"876_CR11","doi-asserted-by":"publisher","first-page":"100923","DOI":"10.1016\/j.iot.2023.100923","volume":"24","author":"U Ali","year":"2023","unstructured":"Ali, U., Idris, M.Y.I.B., Frnda, J., Ayub, M.N.B., Khan, M.A., Khan, N., Jasim, A.A., Ullah, I., Babar, M.: Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for internet of things environment. Internet of Things 24, 100923 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100923","journal-title":"Internet of Things"},{"key":"876_CR12","doi-asserted-by":"crossref","unstructured":"B\u2018ttner, C. Huss, S.A.: A novel anonymous authenticated key agreement protocol for vehicular ad hoc networks. In: 2015 International Conference on Information Systems Security and Privacy, pp. 259\u2013269 (2015)","DOI":"10.1109\/WiMOB.2015.7348024"},{"key":"876_CR13","doi-asserted-by":"publisher","first-page":"55050","DOI":"10.1109\/ACCESS.2019.2911924","volume":"7","author":"L Wu","year":"2019","unstructured":"Wu, L., Sun, Q., Wang, J., Yu, S., Zou, Y.: An efficient privacy-preserving mutual authentication scheme for secure V2V communication in vehicular ad hoc network. IEEE Access 7, 55050\u201355063 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2911924","journal-title":"IEEE Access"},{"issue":"3","key":"876_CR14","doi-asserted-by":"publisher","first-page":"1521","DOI":"10.1109\/TIT.2023.3291234","volume":"69","author":"J Smith","year":"2023","unstructured":"Smith, J.: An efficient group key agreement protocol for secure P2P communication. IEEE Trans. Inf. Theory 69(3), 1521\u20131532 (2023). https:\/\/doi.org\/10.1109\/TIT.2023.3291234","journal-title":"IEEE Trans. Inf. Theory"},{"key":"876_CR15","doi-asserted-by":"publisher","first-page":"101877","DOI":"10.1016\/ACCESS.2021.101877","volume":"113","author":"P Bagga","year":"2021","unstructured":"Bagga, P., Sutrala, A.K., Das, A.K., Vijayakumar, P.: Blockchain-based batch authentication protocol for internet of vehicles. J. Syst. Arch. 113, 101877 (2021). https:\/\/doi.org\/10.1016\/ACCESS.2021.101877","journal-title":"J. Syst. Arch."},{"key":"876_CR16","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.future.2017.07.002","volume":"84","author":"A Shi","year":"2018","unstructured":"Shi, A., Mso, B., Pv, C., et al.: A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Futur. Gener. Comput. Syst. 84, 216\u2013227 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"5","key":"876_CR17","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1016\/j.adhoc.2010.11.002","volume":"9","author":"X Zhao","year":"2011","unstructured":"Zhao, X., Zhang, F., Tian, H.: Dynamic asymmetric group key agreement for ad hoc networks. Ad Hoc Netw. 9(5), 928\u2013939 (2011). https:\/\/doi.org\/10.1016\/j.adhoc.2010.11.002","journal-title":"Ad Hoc Netw."},{"key":"876_CR18","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1007\/s12652-021-03167-z","volume":"14","author":"V Vinoth","year":"2023","unstructured":"Vinoth, V., Deborah, L.J.: An efficient key agreement and authentication protocol for secure communication in industrial IoT applications. J. Ambient. Intell. Humaniz. Comput. 14, 1431\u20131443 (2023). https:\/\/doi.org\/10.1007\/s12652-021-03167-z","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"9","key":"876_CR19","doi-asserted-by":"publisher","first-page":"3190","DOI":"10.3390\/s22093190","volume":"22","author":"A Guerna","year":"2022","unstructured":"Guerna, A., Bitam, S., Calafate, C.T.: Roadside unit deployment in internet of vehicles systems: a survey. Sensors 22(9), 3190 (2022). https:\/\/doi.org\/10.3390\/s22093190","journal-title":"Sensors"},{"key":"876_CR20","doi-asserted-by":"publisher","unstructured":"Ghosh, Mapp, G., Iniovosa, V., et al.: Building a prototype VANET testbed to explore communication dynamics in highly mobile environments. In: Lecture Notes of the Institute for Computer Sciences, International Conference on Testbeds and Research Infrastructure, Nov. (2017), https:\/\/doi.org\/10.1007\/978-3-319-49580-4_8","DOI":"10.1007\/978-3-319-49580-4_8"},{"key":"876_CR21","unstructured":"IEEE Standard for Wireless Access in Vehicular Environments\u2014Security Services for Applications and Management Messages\u2014Amendment 2 \u2013 PDU Functional Types and Encryption Key Management, IEEE Std 1609.2b-2019 (Amendment to IEEE Std 1609.2-2016), (2019)"},{"key":"876_CR22","doi-asserted-by":"publisher","first-page":"3077","DOI":"10.3390\/s21093077","volume":"21","author":"I Ullah","year":"2021","unstructured":"Ullah, I., Shah, M.A., Khan, A., Maple, C., Waheed, A.: Virtual pseudonym-changing and dynamic grouping policy for privacy preservation in VANETs. Sensors 21, 3077 (2021). https:\/\/doi.org\/10.3390\/s21093077","journal-title":"Sensors"},{"key":"876_CR23","doi-asserted-by":"crossref","unstructured":"Shamir: How to share a secret. Communications of the ACM (1979)","DOI":"10.1145\/359168.359176"},{"key":"876_CR24","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-45682-1_18","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2001","author":"E Bresson","year":"2001","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group Diffie-Hellman key exchange\u2014the dynamic case. In: Boyd, C. (ed.) Advances in Cryptology\u2014ASIACRYPT 2001, pp. 290\u2013309. Springer, Gold Coast (2001)"},{"key":"876_CR25","doi-asserted-by":"crossref","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Proceedings of the 19th International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp. 139\u2013155 (2000)","DOI":"10.1007\/3-540-45539-6_11"},{"key":"876_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11761679_1","volume":"4004","author":"M Abdalla","year":"2006","unstructured":"Abdalla, M., Fouque, P.A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. Lect. Notes Comput. Sci. 4004, 1\u201322 (2006)","journal-title":"Lect. Notes Comput. Sci."},{"issue":"3","key":"876_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19030482","volume":"19","author":"L Liu","year":"2019","unstructured":"Liu, L., Wang, Y., Zhang, J., Yang, Q.: A secure and efficient group key agreement scheme for VANET. Sensors 19(3), 1\u201314 (2019)","journal-title":"Sensors"},{"issue":"4","key":"876_CR28","doi-asserted-by":"publisher","first-page":"3011","DOI":"10.1007\/s11276-020-02252-z","volume":"26","author":"S Mandal","year":"2020","unstructured":"Mandal, S., Mohanty, S., Majhi, B.: CL-AGKA: certificateless authenticated group key agreement protocol for mobile networks. Wireless Netw. 26(4), 3011\u20133031 (2020)","journal-title":"Wireless Netw."},{"key":"876_CR29","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","volume":"81","author":"K Mahmood","year":"2018","unstructured":"Mahmood, K., Chaudhry, S.A., Naqvi, H., et al.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur. Gener. Comput. Syst. 81, 557\u2013565 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"6","key":"876_CR30","doi-asserted-by":"publisher","first-page":"6114","DOI":"10.1109\/TVT.2019.2906819","volume":"68","author":"B Ying","year":"2019","unstructured":"Ying, B., Nayak, A.: A distributed social-aware location protection method in untrusted vehicular social networks. IEEE Trans. Veh. Technol. 68(6), 6114\u20136124 (2019). https:\/\/doi.org\/10.1109\/TVT.2019.2906819","journal-title":"IEEE Trans. Veh. Technol."},{"key":"876_CR31","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.comcom.2022.06.024","volume":"192","author":"HJ Nath","year":"2022","unstructured":"Nath, H.J., Choudhury, H.: A privacy-preserving mutual authentication scheme for group communication in VANET. Comput. Commun. 192, 357\u2013372 (2022). https:\/\/doi.org\/10.1016\/j.comcom.2022.06.024","journal-title":"Comput. Commun."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00876-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00876-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00876-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T03:19:39Z","timestamp":1721013579000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00876-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,18]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["876"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00876-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,18]]},"assertion":[{"value":"18 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}