{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T02:45:51Z","timestamp":1768099551312,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T00:00:00Z","timestamp":1683504000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T00:00:00Z","timestamp":1683504000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10586-023-04002-0","type":"journal-article","created":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T16:03:33Z","timestamp":1683561813000},"page":"3361-3377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger"],"prefix":"10.1007","volume":"26","author":[{"given":"Zainab","family":"Iftikhar","sequence":"first","affiliation":[]},{"given":"Adeel","family":"Anjum","sequence":"additional","affiliation":[]},{"given":"Abid","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Gwanggil","family":"Jeon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,8]]},"reference":[{"key":"4002_CR1","doi-asserted-by":"publisher","first-page":"150914","DOI":"10.1109\/ACCESS.2020.3017018","volume":"8","author":"MA Al-Shareeda","year":"2020","unstructured":"Al-Shareeda, M.A., Anbar, M., Manickam, S., Yassin, A.A.: VPPCS: VANET-based privacy-preserving communication scheme. IEEE Access 8, 150914\u2013150928 (2020)","journal-title":"IEEE Access"},{"key":"4002_CR2","doi-asserted-by":"crossref","unstructured":"Ghaith, I.H., Rawashdeh, A., Al\u00a0Zubi, S.: Transfer learning in data fusion at autonomous driving. In: 2021 International Conference on Information Technology (ICIT), IEEE. pp. 714\u2013718 (2021).","DOI":"10.1109\/ICIT52682.2021.9491721"},{"issue":"2","key":"4002_CR3","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1049\/smc2.12032","volume":"4","author":"AA Alkhatib","year":"2022","unstructured":"Alkhatib, A.A., Abu Maria, K., Alzu\u2019bi, S., Abu Maria, E.: Novel system for road traffic optimisation in large cities. IET Smart Cities 4(2), 143\u2013155 (2022)","journal-title":"IET Smart Cities"},{"issue":"3","key":"4002_CR4","doi-asserted-by":"publisher","first-page":"3867","DOI":"10.1002\/ett.3867","volume":"33","author":"M Elbes","year":"2022","unstructured":"Elbes, M., Alrawashdeh, T., Almaita, E., AlZu\u2019bi, S., Jararweh, Y.: A platform for power management based on indoor localization in smart buildings using long short-term neural networks. Trans. Emerg. Telecommun. Technol. 33(3), 3867 (2022)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"4002_CR5","doi-asserted-by":"publisher","first-page":"144957","DOI":"10.1109\/ACCESS.2020.3014678","volume":"8","author":"MA Al-Shareeda","year":"2020","unstructured":"Al-Shareeda, M.A., Anbar, M., Hasbullah, I.H., Manickam, S., Hanshi, S.M.: Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks. IEEE Access 8, 144957\u2013144968 (2020)","journal-title":"IEEE Access"},{"key":"4002_CR6","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.future.2019.06.025","volume":"101","author":"S Sehrish","year":"2019","unstructured":"Sehrish, S., Masoom, A., Abid, K.: Privacy aware decentralized access control. Future Gener. Comput. Syst. 101, 420\u2013433 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"4002_CR7","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.comnet.2018.11.019","volume":"148","author":"S Umair","year":"2019","unstructured":"Umair, S., Masoom, A., Sherali, Z., Abid, K.: Privacy aware iota ledger: decentralized mixing and unlinkable iota transactions. Comput. Netw. 148, 361\u2013372 (2019)","journal-title":"Comput. Netw."},{"key":"4002_CR8","first-page":"1","volume":"06","author":"J Wang","year":"2018","unstructured":"Wang, J., Zhang, Y., Gu, X.: Trust-aware privacy-preserving scheme for VANET. Comput. Eng. Appl. 06, 1 (2018)","journal-title":"Comput. Eng. Appl."},{"issue":"6","key":"4002_CR9","doi-asserted-by":"publisher","first-page":"4242","DOI":"10.1109\/TII.2019.2950057","volume":"16","author":"J Wang","year":"2019","unstructured":"Wang, J., Cai, Z., Yu, J.: Achieving personalized \\$ k \\$-anonymity-based content privacy for autonomous vehicles in CPS. IEEE Trans. Ind. Inf. 16(6), 4242\u20134251 (2019)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"4002_CR10","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.future.2018.10.053","volume":"94","author":"S Zhang","year":"2019","unstructured":"Zhang, S., Li, X., Tan, Z., Peng, T., Wang, G.: A caching and spatial k-anonymity driven privacy enhancement scheme in continuous location-based services. Future Gener. Comput. Syst. 94, 40\u201350 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"4002_CR11","unstructured":"Bebensee, B.: Local differential privacy: a tutorial. arXiv:1907.11908 (2019)"},{"key":"4002_CR12","first-page":"1","volume":"76","author":"P Zhao","year":"2019","unstructured":"Zhao, P., Zhang, G., Wan, S., Liu, G., Umer, T.: A survey of local differential privacy for securing internet of vehicles. J. Supercomput. 76, 1\u201322 (2019)","journal-title":"J. Supercomput."},{"issue":"8","key":"4002_CR13","doi-asserted-by":"publisher","first-page":"5730","DOI":"10.1109\/TII.2020.3012166","volume":"17","author":"G Raja","year":"2020","unstructured":"Raja, G., Anbalagan, S., Vijayaraghavan, G., Dhanasekaran, P., Al-Otaibi, Y.D., Bashir, A.K.: Energy-efficient end-to-end security for software defined vehicular networks. IEEE Trans. Ind. Inf. 17(8), 5730\u20135737 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"4002_CR14","doi-asserted-by":"crossref","unstructured":"Hassija, V., Chamola, V., Gupta, V., Chalapathi, G.S.: A framework for secure vehicular network using advanced blockchain. In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 1260\u20131265 (2020). IEEE","DOI":"10.1109\/IWCMC48107.2020.9148201"},{"key":"4002_CR15","doi-asserted-by":"crossref","unstructured":"Erlingsson, U., Pihur, V., Korolova, A.: Rappor: Randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1054\u20131067 (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"4002_CR16","unstructured":"Team, A., et al.: Learning with privacy at scale. Appl. Mach. Learn. J 1(9) (2017)"},{"key":"4002_CR17","unstructured":"Ding, B., Kulkarni, J., Yekhanin, S.: Collecting telemetry data privately. In: Advances in Neural Information Processing Systems, pp. 3571\u20133580 (2017)"},{"issue":"1","key":"4002_CR18","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/COMST.2018.2865107","volume":"21","author":"T Wang","year":"2018","unstructured":"Wang, T., Zheng, Z., Rehmani, M.H., Yao, S., Huo, Z.: Privacy preservation in big data from the communication perspective-a survey. IEEE Commun. Surv. Tutor. 21(1), 753\u2013778 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"4002_CR19","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/COMST.2019.2944748","volume":"22","author":"MU Hassan","year":"2019","unstructured":"Hassan, M.U., Rehmani, M.H., Chen, J.: Differential privacy techniques for cyber physical systems: a survey. IEEE Commun. Surv. Tutor. 22(1), 746\u2013789 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4002_CR20","doi-asserted-by":"crossref","unstructured":"Tesei, A., Di\u00a0Mauro, L., Falcitelli, M., Noto, S., Pagano, P.: Iota-vpki: a dlt-based and resource efficient vehicular public key infrastructure. In: 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), pp. 1\u20136 (2018). IEEE","DOI":"10.1109\/VTCFall.2018.8690769"},{"issue":"8","key":"4002_CR21","doi-asserted-by":"publisher","first-page":"5018","DOI":"10.1109\/TITS.2020.2964410","volume":"22","author":"S Ghane","year":"2020","unstructured":"Ghane, S., Jolfaei, A., Kulik, L., Ramamohanarao, K., Puthal, D.: Preserving privacy in the internet of connected vehicles. IEEE Trans. Intell. Transp. Syst. 22(8), 5018\u20135027 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"4002_CR22","doi-asserted-by":"crossref","unstructured":"Bartolomeu, P.C., Vieira, E., Ferreira, J.: Iota feasibility and perspectives for enabling vehicular applications. In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1\u20137 (2018). IEEE","DOI":"10.1109\/GLOCOMW.2018.8644201"},{"key":"4002_CR23","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.future.2016.11.024","volume":"78","author":"P Vijayakumar","year":"2018","unstructured":"Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst. 78, 943\u2013955 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"4002_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2020.108675","volume":"173","author":"M Arif","year":"2021","unstructured":"Arif, M., Chen, J., Wang, G., Geman, O., Balas, V.E.: Privacy preserving and data publication for vehicular trajectories with differential privacy. Measurement 173, 108675 (2021)","journal-title":"Measurement"},{"key":"4002_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102446","volume":"110","author":"X Chen","year":"2021","unstructured":"Chen, X., Zhang, T., Shen, S., Zhu, T., Xiong, P.: An optimized differential privacy scheme with reinforcement learning in VANET. Comput. Secur. 110, 102446 (2021)","journal-title":"Comput. Secur."},{"key":"4002_CR26","doi-asserted-by":"publisher","first-page":"5205","DOI":"10.1109\/JIOT.2022.3222382","volume":"10","author":"VS Naresh","year":"2022","unstructured":"Naresh, V.S., Allavarpu, V.D., Reddi, S.: Blockchain iota sharding based scalable secure group communication in large VANETs. IEEE Internet Things J. 10, 5205\u20135213 (2022)","journal-title":"IEEE Internet Things J."},{"key":"4002_CR27","unstructured":"Faccia, A.: Quantum Finance. Opportunities and threats (2020)"},{"key":"4002_CR28","doi-asserted-by":"crossref","unstructured":"De\u00a0Roode, G., Ullah, I., Havinga, P.J.: How to break iota heart by replaying? In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1\u20137 (2018). IEEE","DOI":"10.1109\/GLOCOMW.2018.8644437"},{"key":"4002_CR29","volume-title":"Quantum Computing and Shor\u2019s Algorithm","author":"M Hayward","year":"2008","unstructured":"Hayward, M.: Quantum Computing and Shor\u2019s Algorithm. Macquarie University Mathematics Department, Sydney (2008)"},{"issue":"4","key":"4002_CR30","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOMSTD.2018.1800027","volume":"2","author":"L Zhao","year":"2018","unstructured":"Zhao, L., Li, X., Gu, B., Zhou, Z., Mumtaz, S., Frascolla, V., Gacanin, H., Ashraf, M.I., Rodriguez, J., Yang, M., et al.: Vehicular communications: standardization and open issues. IEEE Commun. Stand. Magn. 2(4), 74\u201380 (2018)","journal-title":"IEEE Commun. Stand. Magn."},{"key":"4002_CR31","first-page":"3","volume":"1","author":"S Popov","year":"2018","unstructured":"Popov, S.: The tangle. White Paper 1, 3 (2018)","journal-title":"White Paper"},{"issue":"14","key":"4002_CR32","doi-asserted-by":"publisher","first-page":"1732","DOI":"10.3390\/electronics10141732","volume":"10","author":"Z Iftikhar","year":"2021","unstructured":"Iftikhar, Z., Javed, Y., Zaidi, S.Y.A., Shah, M.A., IqbalKhan, Z., Mussadiq, S., Abbasi, K.: Privacy preservation in resource-constrained IoT devices using blockchain-a survey. Electronics 10(14), 1732 (2021)","journal-title":"Electronics"},{"key":"4002_CR33","doi-asserted-by":"crossref","unstructured":"AlZu\u2019bi, S., Jararweh, Y.: Data fusion in autonomous vehicles research, literature tracing from imaginary idea to smart surrounding community. In: 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), pp. 306\u2013311 (2020). IEEE","DOI":"10.1109\/FMEC49853.2020.9144916"},{"key":"4002_CR34","doi-asserted-by":"crossref","unstructured":"Iftikhar, Z., Iftikhar, M., Shah, M.A.: Quantum safe cloud computing using hash-based digital signatures. In: 2021 26th International Conference on Automation and Computing (ICAC), pp. 1\u20136 (2021). IEEE","DOI":"10.23919\/ICAC50006.2021.9594228"}],"updated-by":[{"DOI":"10.1007\/s10586-023-04051-5","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000}}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04002-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04002-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04002-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T20:14:41Z","timestamp":1697487281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04002-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,8]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["4002"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04002-0","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s10586-023-04051-5","asserted-by":"object"}]},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,8]]},"assertion":[{"value":"15 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2023","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10586-023-04051-5","URL":"https:\/\/doi.org\/10.1007\/s10586-023-04051-5","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}