{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:38:18Z","timestamp":1759333098295,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T00:00:00Z","timestamp":1684022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T00:00:00Z","timestamp":1684022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11235-023-01016-2","type":"journal-article","created":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T12:36:29Z","timestamp":1684154189000},"page":"241-251","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An efficient blockchain assisted dynamic authentication scheme for geo-spatial enabled vehicular network"],"prefix":"10.1007","volume":"83","author":[{"given":"Anjali","family":"Goswami","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saurabh","family":"Rana","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2304-5880","authenticated-orcid":false,"given":"Deepak","family":"Chhikara","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,5,14]]},"reference":[{"issue":"18","key":"1016_CR1","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"Aafaf Ouaddah","year":"2016","unstructured":"Ouaddah, Aafaf, Elkalam, Anas Abou, & Ouahman, Abdellah Ait. (2016). Fairaccess: A new blockchain-based access control framework for the internet of things. Security and communication networks, 9(18), 5943\u20135964.","journal-title":"Security and communication networks"},{"key":"1016_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107533","volume":"96","author":"SK Hafizul Islam","year":"2021","unstructured":"Hafizul Islam, S. K., Mishra, Nimish, Biswas, Souvik, Keswani, Bharat, & Zeadally, Sherali. (2021). An efficient and forward-secure lattice-based searchable encryption scheme for the big-data era. Computers & Electrical Engineering, 96, 107533.","journal-title":"Computers & Electrical Engineering"},{"key":"1016_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102468","volume":"52","author":"SK Hafizul Islam","year":"2020","unstructured":"SK Hafizul Islam. (2020). Provably secure two-party authenticated key agreement protocol for post-quantum environments. Journal of Information Security and Applications, 52, 102468.","journal-title":"Journal of Information Security and Applications"},{"key":"1016_CR4","doi-asserted-by":"crossref","unstructured":"Saurabh Rana, Dheerendra Mishra, and Saurabh Gupta. (2021). Computationally efficient and secure session key agreement techniques for vehicular cloud computing. In Advances in Communication and Computational Technology: Select Proceedings of ICACCT 2019, Springer, pp. 453\u2013467.","DOI":"10.1007\/978-981-15-5341-7_36"},{"key":"1016_CR5","doi-asserted-by":"crossref","unstructured":"Jijun Yin, Tamer ElBatt, Gavin Yeung, Bo\u00a0Ryu, Stephen Habermas, Hariharan Krishnan, and Timothy Talty. (2004). Performance evaluation of safety applications over dsrc vehicular ad hoc networks. In Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 1\u20139","DOI":"10.1145\/1023875.1023877"},{"key":"1016_CR6","doi-asserted-by":"crossref","unstructured":"Jakob Eriksson, Lewis Girod, Bret Hull, Ryan Newton, Samuel Madden, and Hari Balakrishnan. (2008). The pothole patrol: using a mobile sensor network for road surface monitoring. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 29\u201339","DOI":"10.1145\/1378600.1378605"},{"key":"1016_CR7","doi-asserted-by":"crossref","unstructured":"Leilani Battle, Michael Stonebraker, and Remco Chang. (2013). Dynamic reduction of query result sets for interactive visualizaton. In 2013 IEEE International Conference on Big Data, IEEE, pp. 1\u20138.","DOI":"10.1109\/BigData.2013.6691708"},{"key":"1016_CR8","unstructured":"Giacomo Alessandroni, LC\u00a0Klopfenstein, Saverio Delpriori, M\u00a0Dromedari, G\u00a0Luchetti, B\u00a0Paolini, Andrea Seraghiti, Emanuele Lattanzi, Valerio Freschi, Alberto Carini, et\u00a0al. (2014). Smartroadsense: Collaborative road surface condition monitoring. Proceedings of the UBICOMM, pp. 210\u2013215"},{"issue":"17","key":"1016_CR9","doi-asserted-by":"publisher","first-page":"4255","DOI":"10.1002\/sec.1602","volume":"9","author":"Saru Kumari","year":"2016","unstructured":"Kumari, Saru, Karuppiah, Marimuthu, Li, Xiong, Fan, Wu., Das, Ashok Kumar, & Odelu, Vanga. (2016). An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Security and Communication Networks, 9(17), 4255\u20134271.","journal-title":"Security and Communication Networks"},{"key":"1016_CR10","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.vehcom.2017.02.006","volume":"9","author":"Prerna Mohit","year":"2017","unstructured":"Mohit, Prerna, Amin, Ruhul, & Biswas, G. P. (2017). Design of authentication protocol for wireless sensor network-based smart vehicular system. Vehicular Communications, 9, 64\u201371.","journal-title":"Vehicular Communications"},{"key":"1016_CR11","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.future.2017.07.002","volume":"84","author":"SK Hafizul Islam","year":"2018","unstructured":"Hafizul Islam, S. K., Obaidat, Mohammad S., Vijayakumar, Pandi, Abdulhay, Enas, Li, Fagen, Krishna Chaitanya, M., & Reddy, C. (2018). A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for vanets. Future Generation Computer Systems, 84, 216\u2013227.","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"1016_CR12","doi-asserted-by":"publisher","first-page":"482","DOI":"10.3390\/s19030482","volume":"19","author":"Lianhai Liu","year":"2019","unstructured":"Liu, Lianhai, Wang, Yujue, Zhang, Jingwei, & Yang, Qing. (2019). A secure and efficient group key agreement scheme for vanet. Sensors, 19(3), 482.","journal-title":"Sensors"},{"key":"1016_CR13","doi-asserted-by":"publisher","first-page":"144957","DOI":"10.1109\/ACCESS.2020.3014678","volume":"8","author":"Mahmood A Al-Shareeda","year":"2020","unstructured":"Al-Shareeda, Mahmood A., Anbar, Mohammed, Hasbullah, Iznan Husainy, Manickam, Selvakumar, & Hanshi, Sabri M. (2020). Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks. IEEE Access, 8, 144957\u2013144968.","journal-title":"IEEE Access"},{"key":"1016_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101877","volume":"113","author":"Palak Bagga","year":"2021","unstructured":"Bagga, Palak, Sutrala, Anil Kumar, Das, Ashok Kumar, & Vijayakumar, Pandi. (2021). Blockchain-based batch authentication protocol for internet of vehicles. Journal of Systems Architecture, 113, 101877.","journal-title":"Journal of Systems Architecture"},{"issue":"11","key":"1016_CR15","doi-asserted-by":"publisher","first-page":"12158","DOI":"10.1109\/TVT.2021.3118892","volume":"70","author":"SK Muhammad Umar","year":"2021","unstructured":"Muhammad Umar, S. K., Islam, Hafizul, Mahmood, Khalid, Ahmed, Shafiq, Ghaffar, Zahid, & Saleem, Muhammad Asad. (2021). Provable secure identity-based anonymous and privacy-preserving inter-vehicular authentication protocol for vanets using puf. IEEE Transactions on Vehicular Technology, 70(11), 12158\u201312167.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1016_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, Li., & Jianbo, Xu. (2022). Blockchain-based anonymous authentication for traffic reporting in vanets. Connection Science, 34(1), 1038\u20131065.","DOI":"10.1080\/09540091.2022.2026888"},{"key":"1016_CR17","first-page":"281","volume-title":"The avispa tool for the automated validation of internet security protocols and applications","author":"Alessandro Armando","year":"2005","unstructured":"Armando, Alessandro, Basin, David, Boichut, Yohan, Chevalier, Yannick, Compagna, Luca, Jorge Cu\u00e9llar, P., Drielsma, Hankes, H\u00e9am, Pierre-Cyrille., Kouchnarenko, Olga, Mantovani, Jacopo, et al. (2005). The avispa tool for the automated validation of internet security protocols and applications (pp. 281\u2013285). In International conference on computer aided verification: Springer."},{"key":"1016_CR18","first-page":"76","volume":"64","author":"Alessandro Armando","year":"2006","unstructured":"Armando, Alessandro, Basin, David, Cuellar, Jorge, Rusinowitch, Michael, & Vigan\u00f2, Luca. (2006). Avispa: Automated validation of internet security protocols and applications. ERCIM News, 64, 76.","journal-title":"ERCIM News"},{"issue":"2","key":"1016_CR19","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"Danny Dolev","year":"1983","unstructured":"Dolev, Danny, & Yao, Andrew. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198\u2013208.","journal-title":"IEEE Transactions on information theory"},{"key":"1016_CR20","doi-asserted-by":"crossref","unstructured":"Feifei Wang, Guoai Xu, Chenyu Wang, and Junhao Peng. (2019). A provably secure biometrics-based authentication scheme for multiserver environment. Security and Communication Networks.(2019)","DOI":"10.1155\/2019\/2838615"},{"issue":"3","key":"1016_CR21","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1007\/s10586-020-03211-1","volume":"24","author":"Sunakshi Singh and Vijay Kumar Chaurasiya","year":"2021","unstructured":"Sunakshi Singh and Vijay Kumar Chaurasiya. (2021). Mutual authentication scheme of iot devices in fog computing environment. Cluster Computing, 24(3), 1643\u20131657.","journal-title":"Cluster Computing"},{"issue":"3","key":"1016_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/JOEUC.20210501.oa1","volume":"33","author":"Mengxia Shuai","year":"2021","unstructured":"Shuai, Mengxia, Nenghai, Yu., Wang, Hongxia, Xiong, Ling, & Li, Yue. (2021). A lightweight three-factor anonymous authentication scheme with privacy protection for personalized healthcare applications. Journal of Organizational and End User Computing (JOEUC), 33(3), 1\u201318.","journal-title":"Journal of Organizational and End User Computing (JOEUC)"},{"issue":"3","key":"1016_CR23","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/TNSE.2022.3142287","volume":"9","author":"Seunghwan Son","year":"2022","unstructured":"Son, Seunghwan, Lee, Joonyoung, Park, Yohan, Park, Youngho, & Das, Ashok Kumar. (2022). Design of blockchain-based lightweight v2i handover authentication protocol for vanet. IEEE Transactions on Network Science and Engineering., 9(3), 1346\u20131358.","journal-title":"IEEE Transactions on Network Science and Engineering."},{"key":"1016_CR24","unstructured":"Deepak Chhikara, Saurabh Rana, Ankita Mishra, Dheerendra Mishra, and Member of\u00a0IEEE. Construction of elliptic curve cryptography-based authentication protocol for internet of things. Security and Privacy, n\/a(n\/a):e226."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01016-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-023-01016-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01016-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T08:13:48Z","timestamp":1686903228000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-023-01016-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,14]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["1016"],"URL":"https:\/\/doi.org\/10.1007\/s11235-023-01016-2","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2023,5,14]]},"assertion":[{"value":"24 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that the manuscript does not report on or involve the use of any animal or human data or tissue.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"The manuscript does not contain any person\u2019s data in any form.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}