{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T15:56:24Z","timestamp":1774281384563,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T00:00:00Z","timestamp":1544745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11042-018-7008-z","type":"journal-article","created":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T10:36:52Z","timestamp":1544783812000},"page":"24595-24615","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["A fog-based security framework for intelligent traffic light control system"],"prefix":"10.1007","volume":"78","author":[{"given":"Tauqeer","family":"Khalid","sequence":"first","affiliation":[]},{"given":"Abdul Nasir","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mazhar","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Adil","family":"Adeel","sequence":"additional","affiliation":[]},{"given":"Atta","family":"ur Rehman Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0726-5311","authenticated-orcid":false,"given":"Junaid","family":"Shuja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,14]]},"reference":[{"key":"7008_CR1","doi-asserted-by":"crossref","unstructured":"Abbas MK, Karsiti MN, Napiah M, Samir BB (2011) Traffic light control using VANET system architecture. In: National Postgraduate Conference (NPC), 2011, pp 1\u20136","DOI":"10.1109\/NatPC.2011.6136433"},{"key":"7008_CR2","doi-asserted-by":"publisher","unstructured":"Baldi S, Michailidis I, Ntampasi V, Kosmatopoulos E, Papamichail I, Papageorgiou M (2017) A simulation-based traffic signal control for congested urban traffic networks. Transp Sci. \n                    https:\/\/doi.org\/10.1287\/trsc.2017.0754","DOI":"10.1287\/trsc.2017.0754"},{"key":"7008_CR3","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/JIOT.2017.2666783","volume":"4","author":"S Basudan","year":"2017","unstructured":"Basudan S, Lin X, Sankaranarayanan K (2017) A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet Things J 4:772\u2013782","journal-title":"IEEE Internet Things J"},{"key":"7008_CR4","doi-asserted-by":"crossref","unstructured":"Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R (2016) Fog computing: principles, architectures, and applications. In: Internet of things. Elsevier, pp 61\u201375","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"7008_CR5","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.adhoc.2016.02.018","volume":"44","author":"F Deniz","year":"2016","unstructured":"Deniz F, Bagci H, Korpeoglu I (2016) An adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks. Ad Hoc Netw 44:104\u2013117","journal-title":"Ad Hoc Netw"},{"key":"7008_CR6","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.jnca.2016.01.010","volume":"67","author":"M D\u00edaz","year":"2016","unstructured":"D\u00edaz M, Mart\u00edn C, Rubio B (2016) State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing. J Netw Comput Appl 67:99\u2013117","journal-title":"J Netw Comput Appl"},{"key":"7008_CR7","first-page":"147","volume":"4","author":"A Eydi","year":"2017","unstructured":"Eydi A, Panahi S, iNakhai Kamalabadi I (2017) User-based vehicle route guidance in urban networks based on intelligent multi agents systems and the ANT-Q algorithm. International Journal of Transportation Engineering 4:147\u2013161","journal-title":"International Journal of Transportation Engineering"},{"key":"7008_CR8","unstructured":"Hancock P, Parasuraman R, Byrne EA (2018) 16 driver-centered issues in advanced automation for motor vehicles. Automation and human performance: theory and applications, pp 203"},{"key":"7008_CR9","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1109\/TII.2014.2299233","volume":"10","author":"W He","year":"2014","unstructured":"He W, Yan G, Da Xu L (2014) Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics 10:1587\u20131595","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"7008_CR10","doi-asserted-by":"crossref","unstructured":"Hounsell N, Landles J, Bretherton R, Gardner K (1998) Intelligent systems for priority at traffic signals in London: the INCOME project","DOI":"10.1049\/cp:19980161"},{"key":"7008_CR11","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.aap.2017.05.002","volume":"104","author":"E Jeong","year":"2017","unstructured":"Jeong E, Oh C, Lee S (2017) Is vehicle automation enough to prevent crashes? Role of traffic operations in automated driving environments for traffic safety. Accid Anal Prev 104:115\u2013124","journal-title":"Accid Anal Prev"},{"key":"7008_CR12","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TITS.2004.838219","volume":"6","author":"P Kumar","year":"2005","unstructured":"Kumar P, Ranganath S, Weimin H, Sengupta K (2005) Framework for real-time behavior interpretation from traffic video. IEEE Trans Intell Transp Syst 6:43\u201353","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"7008_CR13","doi-asserted-by":"crossref","unstructured":"Kwatirayo S, Almhana J, Liu Z (2013) Adaptive traffic light control using VANET: a case study. In: Wireless communications and mobile computing conference (IWCMC), 2013 9th international, pp 752\u2013757","DOI":"10.1109\/IWCMC.2013.6583651"},{"key":"7008_CR14","doi-asserted-by":"crossref","unstructured":"Lai Y, Zheng Y, Cao J (2007) Protocols for traffic safety using wireless sensor network. In: International conference on algorithms and architectures for parallel processing, pp 37\u201348","DOI":"10.1007\/978-3-540-72905-1_4"},{"key":"7008_CR15","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1109\/TVT.2016.2572123","volume":"66","author":"J Lin","year":"2017","unstructured":"Lin J, Yu W, Yang X, Yang Q, Fu X, Zhao W (2017) A real-time en-route route guidance decision scheme for transportation-based cyberphysical systems. IEEE Trans Veh Technol 66:2551\u20132566","journal-title":"IEEE Trans Veh Technol"},{"key":"7008_CR16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MCOM.2017.1600371CM","volume":"55","author":"J Liu","year":"2017","unstructured":"Liu J, Wan J, Jia D, Zeng B, Li D, Hsu C-H et al (2017) High-efficiency urban traffic management in context-aware computing and 5G communication. IEEE Commun Mag 55:34\u201340","journal-title":"IEEE Commun Mag"},{"key":"7008_CR17","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1016\/j.future.2017.02.017","volume":"78","author":"J Liu","year":"2018","unstructured":"Liu J, Li J, Zhang L, Dai F, Zhang Y, Meng X et al (2018) Secure intelligent traffic light control using fog computing. Futur Gener Comput Syst 78:817\u2013824","journal-title":"Futur Gener Comput Syst"},{"key":"7008_CR18","doi-asserted-by":"publisher","first-page":"19293","DOI":"10.1109\/ACCESS.2017.2749422","volume":"5","author":"M Mukherjee","year":"2017","unstructured":"Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N et al (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293\u201319304","journal-title":"IEEE Access"},{"key":"7008_CR19","unstructured":"Nguyen-Minh H (2016) Contribution to the intelligent transportation system: security of safety applications in vehicle ad hoc networks. Universit\u00e9 d'Avignon"},{"key":"7008_CR20","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/TSG.2017.2673843","volume":"8","author":"J Ni","year":"2017","unstructured":"Ni J, Zhang K, Alharbi K, Lin X, Zhang N, Shen XS (2017) Differentially private smart metering with fault tolerance and range-based filtering. IEEE Transactions on Smart Grid 8:2483\u20132493","journal-title":"IEEE Transactions on Smart Grid"},{"key":"7008_CR21","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.trpro.2017.01.074","volume":"20","author":"A Novikov","year":"2017","unstructured":"Novikov A, Novikov I, Katunin A, Shevtsova A (2017) Adaptation capacity of the traffic lights control system (TSCS) as to changing parameters of traffic flows within intellectual transport systems (ITS). Transportation Research Procedia 20:455\u2013462","journal-title":"Transportation Research Procedia"},{"key":"7008_CR22","unstructured":"ORACLE. Java cryptography architecture (JCA), and Java cryptography extension (JCE) - reference guide and documentation. Available: \n                    https:\/\/docs.oracle.com\/javase\/10\/security\/java-cryptography-architecture-jca-reference-guide.htm#JSSEC-GUID-2BCFDD85-D533-4E6C-8CE9-29990DEB0190\n                    \n                  . Last Access: 23 June 2018"},{"key":"7008_CR23","doi-asserted-by":"crossref","unstructured":"Priemer C, Friedrich B (2009) A decentralized adaptive traffic signal control using V2I communication data. In: Intelligent transportation systems, 2009. ITSC'09. 12th international IEEE conference on, pp 1\u20136","DOI":"10.1109\/ITSC.2009.5309870"},{"key":"7008_CR24","doi-asserted-by":"crossref","unstructured":"Puthal D, Sahoo B, Mishra S, Swain S (2015) Cloud computing features, issues, and challenges: a big picture. In: Computational intelligence and networks (CINE), 2015 international conference on, pp 116\u2013123","DOI":"10.1109\/CINE.2015.31"},{"key":"7008_CR25","doi-asserted-by":"crossref","unstructured":"Puthal D, Nepal S, Ranjan R, Chen J (2015) DPBSV--an efficient and secure scheme for big sensing data stream. In: Trustcom\/BigDataSE\/ISPA, 2015 IEEE, pp 246\u2013253","DOI":"10.1109\/Trustcom.2015.381"},{"key":"7008_CR26","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1109\/TVT.2016.2583466","volume":"66","author":"K Rabieh","year":"2017","unstructured":"Rabieh K, Mahmoud MM, Younis M (2017) Privacy-preserving route reporting schemes for traffic management systems. IEEE Trans Veh Technol 66:2703\u20132713","journal-title":"IEEE Trans Veh Technol"},{"key":"7008_CR27","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1016\/j.trpro.2017.01.102","volume":"20","author":"A Solodkiy","year":"2017","unstructured":"Solodkiy A, Yenokayev V (2017) Cooperative ITS\u2013A strategic way to ensure road safety. Transportation Research Procedia 20:630\u2013634","journal-title":"Transportation Research Procedia"},{"key":"7008_CR28","doi-asserted-by":"publisher","first-page":"2789","DOI":"10.1002\/sec.1211","volume":"9","author":"J Song","year":"2016","unstructured":"Song J, He C, Yang F, Zhang H (2016) A privacy-preserving distance-based incentive scheme in opportunistic VANETs. Security and Communication Networks 9:2789\u20132801","journal-title":"Security and Communication Networks"},{"key":"7008_CR29","first-page":"71","volume":"5","author":"SA Useche","year":"2017","unstructured":"Useche SA, Alonso F (2017) The importance of fatigue-monitoring as a tool for the intelligent transport systems (ITS). EC Neurol 5:71\u201373","journal-title":"EC Neurol"},{"key":"7008_CR30","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigan\u00f2","year":"2006","unstructured":"Vigan\u00f2 L (2006) Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science 155:61\u201386","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"7008_CR31","doi-asserted-by":"crossref","unstructured":"Wenjie C, Lifeng C, Zhanglong C, Shiliang T (2005) A realtime dynamic traffic control system based on wireless sensor network. In: Parallel processing, 2005. ICPP 2005 workshops. International conference workshops on, pp 258\u2013264","DOI":"10.1109\/ICPPW.2005.16"},{"key":"7008_CR32","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/S0198-9715(00)00002-8","volume":"24","author":"W-M Wey","year":"2000","unstructured":"Wey W-M (2000) Model formulation and solution algorithm of traffic signal control in an urban network. Comput Environ Urban Syst 24:355\u2013378","journal-title":"Comput Environ Urban Syst"},{"key":"7008_CR33","doi-asserted-by":"crossref","unstructured":"Yan G, Olariu S (2009) An efficient geographic location-based security mechanism for vehicular adhoc networks. In: Mobile Adhoc and sensor systems, 2009. MASS'09. IEEE 6th international conference on, pp 804\u2013809","DOI":"10.1109\/MOBHOC.2009.5336914"},{"key":"7008_CR34","unstructured":"Yan L, Hu W, Hu S (2018) SALA: a self-adaptive learning algorithm\u2014towards efficient dynamic route guidance in urban traffic networks. Neural Process Lett:1\u201325"},{"key":"7008_CR35","doi-asserted-by":"publisher","first-page":"2562","DOI":"10.1109\/TC.2015.2485225","volume":"65","author":"L Zhang","year":"2016","unstructured":"Zhang L, Hu C, Wu Q, Domingo-Ferrer J, Qin B (2016) Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans Comput 65:2562\u20132574","journal-title":"IEEE Trans Comput"},{"key":"7008_CR36","doi-asserted-by":"publisher","first-page":"012070","DOI":"10.1088\/1742-6596\/910\/1\/012070","volume":"910","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Pei Q, Dai F, Zhang L (2017) Efficient secure and privacy-preserving route reporting scheme for VANETs. J Phys Conf Ser 910:012070","journal-title":"J Phys Conf Ser"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7008-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-7008-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7008-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T19:21:43Z","timestamp":1576264903000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-7008-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,14]]},"references-count":36,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["7008"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-7008-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,14]]},"assertion":[{"value":"24 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}