{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:57:31Z","timestamp":1765961851960,"version":"3.37.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:00:00Z","timestamp":1730764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:00:00Z","timestamp":1730764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00937-6","type":"journal-article","created":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T20:05:34Z","timestamp":1730837134000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A location-updating based self-healing group key management scheme for VANETs"],"prefix":"10.1007","volume":"24","author":[{"given":"Weinan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jiawen","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tingting","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qingqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhaoyang","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jiangjun","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,5]]},"reference":[{"issue":"9","key":"937_CR1","doi-asserted-by":"publisher","first-page":"1940","DOI":"10.1109\/TIFS.2015.2472369","volume":"11","author":"S Han","year":"2016","unstructured":"Han, S., Shuai, Z., Li, Q., Ju, C.H., Zhou, W.: Ppm-hda: Privacy-preserving and multifunctional health data aggregation with fault tolerance for cloud assisted wbans. IEEE Trans. Inf. Forensics Secur. 11(9), 1940\u20131955 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"937_CR2","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1109\/TIFS.2020.3014487","volume":"16","author":"S Zhao","year":"2020","unstructured":"Zhao, S., Li, F., Li, H., Lu, R., Ren, S., Bao, H., Lin, J.-H., Han, S.: Smart and practical privacy-preserving data aggregation for fog-based smart grids. IEEE Trans. Inf. Forensics Secur. 16, 521\u2013536 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"937_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6160","volume":"33","author":"J Yuan","year":"2021","unstructured":"Yuan, J., Liu, W., Wang, J., Shi, J., Miao, L.: An efficient framework for data aggregation in smart agriculture. Concurr. Comput. Pract. Exp. 33(10), e6160 (2021)","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"9","key":"937_CR4","doi-asserted-by":"publisher","first-page":"3280","DOI":"10.1109\/TMC.2021.3056712","volume":"21","author":"L Wei","year":"2021","unstructured":"Wei, L., Cui, J., Zhong, H., Xu, Y., Liu, L.: Proven secure tree-based authenticated key agreement for securing v2v and v2i communications in vanets. IEEE Trans. Mob. Comput. 21(9), 3280\u20133297 (2021)","journal-title":"IEEE Trans. Mob. Comput."},{"doi-asserted-by":"crossref","unstructured":"Narayanan, K.L., Naresh, R.: Privacy-preserving dual interactive wasserstein generative adversarial network for cloud-based road condition monitoring in vanets, Appl. Soft Comput. 111367 (2024)","key":"937_CR5","DOI":"10.1016\/j.asoc.2024.111367"},{"issue":"5","key":"937_CR6","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1007\/s12083-023-01532-7","volume":"16","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Lai, J., Moshayedi, A.J.: Traffic data security sharing scheme based on blockchain and traceable ring signature for vanets. Peer-to-Peer Netw. Appl. 16(5), 2349\u20132366 (2023)","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"12","key":"937_CR7","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681\u20132691 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"unstructured":"Taha, M.B., Alrabaee, S., Choo, K.-K.R.: Efficient resource management of micro-services in vanets, IEEE Trans. Intell. Transp. Syst. (2023)","key":"937_CR8"},{"issue":"4","key":"937_CR9","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TITS.2015.2492981","volume":"17","author":"P Vijayakumar","year":"2015","unstructured":"Vijayakumar, P., Azees, M., Kannan, A., Deborah, L.J.: Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1015\u20131028 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"937_CR10","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.vehcom.2018.09.003","volume":"14","author":"J Cui","year":"2018","unstructured":"Cui, J., Tao, X., Zhang, J., Xu, Y., Zhong, H.: Hcpa-gka: a hash function-based conditional privacy-preserving authentication and group-key agreement scheme for vanets. Vehicular Commun. 14, 15\u201325 (2018)","journal-title":"Vehicular Commun."},{"issue":"3","key":"937_CR11","doi-asserted-by":"publisher","first-page":"482","DOI":"10.3390\/s19030482","volume":"19","author":"L Liu","year":"2019","unstructured":"Liu, L., Wang, Y., Zhang, J., Yang, Q.: A secure and efficient group key agreement scheme for vanet. Sensors 19(3), 482 (2019)","journal-title":"Sensors"},{"key":"937_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100612","volume":"41","author":"S Itoo","year":"2023","unstructured":"Itoo, S., Som, L.K., Ahmad, M., Baksh, R., Masoodi, F.S.: A robust ecc-based authentication framework for energy internet (ei)-based vehicle to grid communication system. Vehicular Commun. 41, 100612 (2023)","journal-title":"Vehicular Commun."},{"key":"937_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101877","volume":"113","author":"P Bagga","year":"2021","unstructured":"Bagga, P., Sutrala, A.K., Das, A.K., Vijayakumar, P.: Blockchain-based batch authentication protocol for internet of vehicles. J. Syst. Architect. 113, 101877 (2021)","journal-title":"J. Syst. Architect."},{"key":"937_CR14","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.comcom.2021.11.023","volume":"183","author":"X Li","year":"2022","unstructured":"Li, X., Yin, X.: Blockchain-based group key agreement protocol for vehicular ad hoc networks. Comput. Commun. 183, 107\u2013120 (2022)","journal-title":"Comput. Commun."},{"issue":"3","key":"937_CR15","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JSAC.2011.110311","volume":"29","author":"Y Hao","year":"2011","unstructured":"Hao, Y., Cheng, Y., Zhou, C., Song, W.: A distributed key management framework with cooperative message authentication in vanets. IEEE J. Sel. Areas Commun. 29(3), 616\u2013629 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"937_CR16","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1007\/s10586-017-0848-x","volume":"20","author":"P Vijayakumar","year":"2017","unstructured":"Vijayakumar, P., Azees, M., Chang, V., Deborah, J., Balusamy, B.: Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust. Comput. 20, 2439\u20132450 (2017)","journal-title":"Clust. Comput."},{"issue":"4","key":"937_CR17","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/49.839937","volume":"18","author":"G Ateniese","year":"2000","unstructured":"Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE J. Sel. Areas Commun. 18(4), 628\u2013639 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"937_CR18","doi-asserted-by":"publisher","first-page":"3435","DOI":"10.1007\/s11277-020-07540-7","volume":"114","author":"Z Jian","year":"2020","unstructured":"Jian, Z., Liyan, S., Kaiyu, D., Yue, W.: Research on self-adaptive group key management in deep space networks. Wireless Pers. Commun. 114, 3435\u20133456 (2020)","journal-title":"Wireless Pers. Commun."},{"doi-asserted-by":"crossref","unstructured":"Shen, X., Huang, C., Pu, W., Wang, D., et al.: A lightweight authentication with dynamic batch-based group key management using lstm in vanet, Security Commun. Netw. 2022 (2022)","key":"937_CR19","DOI":"10.1155\/2022\/9779670"},{"key":"937_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109997","volume":"236","author":"SA Khah","year":"2023","unstructured":"Khah, S.A., Barati, A., Barati, H.: A dynamic and multi-level key management method in wireless sensor networks (wsns). Comput. Netw. 236, 109997 (2023)","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Jadav, N.K., Gupta, R., Tanwar, S.: Blockchain and edge intelligence-based secure and trusted v2v framework underlying 6g networks. In: IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE, pp. 1\u20136 (2022)","key":"937_CR21","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798266"},{"doi-asserted-by":"crossref","unstructured":"Bao, Z., He, D., Wang, H., Luo, M., Peng, C.: A group signature scheme with selective linkability and traceability for blockchain-based data sharing systems in e-health services, IEEE Internet of Things Journal (2023)","key":"937_CR22","DOI":"10.1109\/JIOT.2023.3284968"},{"issue":"2","key":"937_CR23","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1109\/TITS.2021.3099488","volume":"23","author":"P Vijayakumar","year":"2021","unstructured":"Vijayakumar, P., Azees, M., Kozlov, S.A., Rodrigues, J.J.: An anonymous batch authentication and key exchange protocols for 6g enabled vanets. IEEE Trans. Intell. Transp. Syst. 23(2), 1630\u20131638 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"doi-asserted-by":"crossref","unstructured":"Wang, C.-X., You, X., Gao, X., Zhu, X., Li, Z., Zhang, C., Wang, H., Huang, Y., Chen, Y., Haas, H., et al.: On the road to 6g: Visions, requirements, key technologies and testbeds, IEEE Commun. Surv. Tutor. (2023)","key":"937_CR24","DOI":"10.1109\/COMST.2023.3249835"},{"doi-asserted-by":"crossref","unstructured":"Mao, B., Liu, J., Wu, Y., Kato, N.: Security and privacy on 6g network edge: a survey, IEEE Commun. Surv. Tutor. (2023)","key":"937_CR25","DOI":"10.1109\/COMST.2023.3244674"},{"doi-asserted-by":"crossref","unstructured":"Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-aware key management scheme for wireless sensor networks, in: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN \u201904, Association for Computing Machinery, New York, NY, USA, p. 29-42 (2004)","key":"937_CR26","DOI":"10.1145\/1029102.1029110"},{"issue":"3","key":"937_CR27","doi-asserted-by":"publisher","first-page":"2220","DOI":"10.1109\/COMST.2016.2544751","volume":"18","author":"G Han","year":"2016","unstructured":"Han, G., Jiang, J., Zhang, C., Duong, T.Q., Guizani, M., Karagiannidis, G.K.: A survey on mobile anchor node assisted localization in wireless sensor networks. IEEE Commun. Surv. Tutor. 18(3), 2220\u20132243 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"8","key":"937_CR28","doi-asserted-by":"publisher","first-page":"7550","DOI":"10.1109\/JIOT.2020.2985454","volume":"7","author":"S Han","year":"2020","unstructured":"Han, S., Lin, J., Zhao, S., Xu, G., Ren, S., He, D., Wang, L., Shi, L.: Location privacy-preserving distance computation for spatial crowdsourcing. IEEE Internet Things J. 7(8), 7550\u20137563 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"937_CR29","doi-asserted-by":"publisher","first-page":"9768","DOI":"10.1109\/JIOT.2023.3235707","volume":"10","author":"S Zhang","year":"2023","unstructured":"Zhang, S., Hu, B., Liang, W., Li, K.-C., Gupta, B.B.: A caching-based dual k-anonymous location privacy-preserving scheme for edge computing. IEEE Internet Things J. 10(11), 9768\u20139781 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3235707","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Junaidi, D.R., Ma, M., Su, R.: An efficient multi-blockchain approach towards secure platoon management. In: 2023 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), IEEE, (2023), pp. 1\u20136","key":"937_CR30","DOI":"10.1109\/SOLI60636.2023.10425118"},{"issue":"4","key":"937_CR31","doi-asserted-by":"publisher","first-page":"3919","DOI":"10.1109\/TNSM.2022.3216073","volume":"19","author":"S Benadla","year":"2022","unstructured":"Benadla, S., Merad-Boudia, O.R., Senouci, S.M., Lehsaini, M.: Detecting sybil attacks in vehicular fog networks using rssi and blockchain. IEEE Trans. Netw. Serv. Manage. 19(4), 3919\u20133935 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"4","key":"937_CR32","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1109\/TNET.2007.905593","volume":"16","author":"D Micciancio","year":"2008","unstructured":"Micciancio, D., Panjwani, S.: Optimal communication complexity of generic multicast key distribution. IEEE\/ACM Trans. Netw. 16(4), 803\u2013813 (2008)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"12","key":"937_CR33","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1002\/sec.429","volume":"5","author":"Q Wang","year":"2012","unstructured":"Wang, Q., Chen, H., Xie, L., Wang, K.: Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks. Secur. Commun. Netw. 5(12), 1363\u20131374 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"8","key":"937_CR34","doi-asserted-by":"publisher","first-page":"606","DOI":"10.4236\/wsn.2010.28072","volume":"2","author":"J Xu","year":"2010","unstructured":"Xu, J., Liu, W., Lang, F., Zhang, Y., Wang, C.: Distance measurement model based on rssi in wsn. Wirel. Sens. Netw. 2(8), 606 (2010)","journal-title":"Wirel. Sens. Netw."},{"issue":"8","key":"937_CR35","doi-asserted-by":"publisher","first-page":"2500","DOI":"10.1016\/j.adhoc.2013.05.015","volume":"11","author":"Q Wang","year":"2013","unstructured":"Wang, Q., Chen, H., Xie, L., Wang, K.: One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks. Ad Hoc Netw. 11(8), 2500\u20132511 (2013)","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"937_CR36","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1016\/j.adhoc.2008.06.003","volume":"7","author":"G Anastasi","year":"2009","unstructured":"Anastasi, G., Conti, M., Di Francesco, M., Passarella, A.: Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw. 7(3), 537\u2013568 (2009)","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"937_CR37","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1007\/s11277-020-07947-2","volume":"117","author":"P Patil","year":"2020","unstructured":"Patil, P., Sangeetha, M., Bhaskar, V.: Blockchain for iot access control, security and privacy: a review. Wireless Pers. Commun. 117(3), 1815\u20131834 (2020)","journal-title":"Wireless Pers. Commun."},{"doi-asserted-by":"crossref","unstructured":"Sousa, S., Kern, R.: How to keep text private? a systematic review of deep learning methods for privacy-preserving natural language processing. Artif. Intell. Rev. 56(2), 1\u201366 (2022)","key":"937_CR38","DOI":"10.1007\/s10462-022-10204-6"},{"doi-asserted-by":"crossref","unstructured":"Hu, C., Zhang, C., Lei, D., Wu, T., Liu, X., Zhu, L.: Achieving privacy-preserving and verifiable support vector machine training in the cloud. IEEE Trans. Inf. Forensics Secur. 18 (2023)","key":"937_CR39","DOI":"10.1109\/TIFS.2023.3283104"},{"issue":"1","key":"937_CR40","first-page":"1","volume":"54","author":"H Jiang","year":"2021","unstructured":"Jiang, H., Li, J., Zhao, P., Zeng, F., Xiao, Z., Iyengar, A.: Location privacy-preserving mechanisms in location-based services: a comprehensive survey. ACM Comput. Surv. 54(1), 1\u201336 (2021)","journal-title":"ACM Comput. Surv."},{"doi-asserted-by":"crossref","unstructured":"Khan, Z., Khan, N., Koubaa, A., Ammar, A., Boulila, W.: Radar: a rapid discovery algorithm for routes in sdn-based IoV, Dig. Commun. Netw. (2024)","key":"937_CR41","DOI":"10.1016\/j.dcan.2024.08.001"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00937-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00937-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00937-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:17:56Z","timestamp":1739337476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00937-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,5]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["937"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00937-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,11,5]]},"assertion":[{"value":"5 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies of human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"This paper is submitted in its original form and never submitted or published in any journal or conference.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"14"}}