{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:36:13Z","timestamp":1774553773135,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,1,30]],"date-time":"2016-01-30T00:00:00Z","timestamp":1454112000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Orange Labs under external research","award":["Contract number 0050012310-C04021"],"award-info":[{"award-number":["Contract number 0050012310-C04021"]}]},{"name":"The Rita Altura Trust Chair in Computer Sciences, Lynne and William Frankel Center for Computer Sciences, and Israel Science Foundation","award":["Grant number 428\/11"],"award-info":[{"award-number":["Grant number 428\/11"]}]},{"name":"Polish National Science Center","award":["DEC-2013\/08\/M\/ST6\/00928, project HARMONIA"],"award-info":[{"award-number":["DEC-2013\/08\/M\/ST6\/00928, project HARMONIA"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11276-016-1203-5","type":"journal-article","created":{"date-parts":[[2016,1,30]],"date-time":"2016-01-30T02:50:35Z","timestamp":1454122235000},"page":"1045-1062","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Dynamic attribute based vehicle authentication"],"prefix":"10.1007","volume":"23","author":[{"given":"Shlomi","family":"Dolev","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Krzywiecki","sequence":"additional","affiliation":[]},{"given":"Nisha","family":"Panwar","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Segal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,30]]},"reference":[{"key":"1203_CR1","unstructured":"Dedicated Short Range Communications (DSRC). http:\/\/grouper.ieee.org\/groups\/scc32\/Attachments.html ."},{"key":"1203_CR2","unstructured":"IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006). (2013). IEEE standard for wireless access in vehicular environments security services for applications and management messages, pp. 1\u2013289."},{"key":"1203_CR3","unstructured":"Kim, A., Kniss, V., Ritter, G., & Sloan, S. (2011). An approach to communications security for a communications data delivery system for V2V\/V2I safety: Technical description and identification of policy and institutional issues. U.S. Department of Transportation, Research and Innovative Technology Admisitration (RITA), FHWA-JPO-11-130."},{"issue":"7","key":"1203_CR4","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","volume":"99","author":"JB Kenney","year":"2011","unstructured":"Kenney, J. B. (2011). Dedicated short-range communications (DSRC) standards in the United States. Proceedings of the IEEE, 99(7), 1162\u20131182.","journal-title":"Proceedings of the IEEE"},{"key":"1203_CR5","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/3-540-48157-5_31","volume":"1707","author":"M Beigl","year":"1999","unstructured":"Beigl, M. (1999). Point & click-interaction in smart environments. Lecture notes in computer science. Handheld and Ubiquitous Computing, 1707, 311\u2013313.","journal-title":"Handheld and Ubiquitous Computing"},{"issue":"1","key":"1203_CR6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"key":"1203_CR7","first-page":"453","volume":"2045","author":"R Canetti","year":"2001","unstructured":"Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. Lecture notes in computer science. Advances in Cryptology EUROCRYPT, 2045, 453\u2013474.","journal-title":"Advances in Cryptology EUROCRYPT"},{"issue":"1","key":"1203_CR8","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s00779-011-0421-1","volume":"16","author":"MK Chong","year":"2012","unstructured":"Chong, M. K., & Gellersen, H. (2012). Usability classification for spontaneous device association. Personal and Ubiquitous Computing, 16(1), 77\u201389.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"6","key":"1203_CR9","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"1203_CR10","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1109\/MCOM.2008.4539481","volume":"46","author":"H Hartenstein","year":"2008","unstructured":"Hartenstein, H., & Laberteaux, K. (2008). A tutorial survey on vehicular ad hoc networks. Communications Magazine, IEEE, 46(6), 164\u2013171.","journal-title":"Communications Magazine, IEEE"},{"issue":"7","key":"1203_CR11","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1016\/j.comcom.2009.12.010","volume":"33","author":"E Hossain","year":"2010","unstructured":"Hossain, E., Chow, G., Leung, V. C. M., McLeod, R. D., Mi\u0161si\u0107, J., Wong, V. W. S., & Yang, O. (2010). Vehicular telematics over heterogeneous wireless networks: A survey. Computer Communications, 33(7), 775\u2013793.","journal-title":"Computer Communications"},{"key":"1203_CR12","first-page":"124","volume":"2862","author":"T Kindberg","year":"2003","unstructured":"Kindberg, T., & Zhang, K. (2003). Secure spontaneous device association. Ubiquitous Computing, 2862, 124\u2013131.","journal-title":"Ubiquitous Computing"},{"key":"1203_CR13","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., & Savage, S. (2010). Experimental security analysis of a modern automobile. In IEEE symposium on security and privacy (SP), pp. 447\u2013462.","DOI":"10.1109\/SP.2010.34"},{"key":"1203_CR14","first-page":"400","volume":"2729","author":"H Krawczyk","year":"2003","unstructured":"Krawczyk, H. (2003). Sigma: The \u2019sign-and-mac\u2019 approach to authenticated Diffie\u2013Hellman and its use in the IKE-protocols. Lecture notes in computer science. Advances in Cryptology: CRYPTO, 2729, 400\u2013425.","journal-title":"Advances in Cryptology: CRYPTO"},{"issue":"6","key":"1203_CR15","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1016\/j.pmcj.2009.07.008","volume":"5","author":"A Kumar","year":"2009","unstructured":"Kumar, A., Saxena, N., Tsudik, G., & Uzun, E. (2009). A comparative study of secure device pairing methods. Pervasive and Mobile Computing, 5(6), 734\u2013749.","journal-title":"Pervasive and Mobile Computing"},{"key":"1203_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-75670-5_1","volume":"4784","author":"B LaMacchia","year":"2007","unstructured":"LaMacchia, B., Lauter, K., & Mityagin, A. (2007). Stronger security of authenticated key exchange. Lecture notes in computer science. Provable Security, 4784, 1\u201316.","journal-title":"Provable Security"},{"key":"1203_CR17","unstructured":"Lee, J., & Park, J. H. (2008). Authenticated key exchange secure under the computational Diffie\u2013Hellman assumption. IACR Cryptology ePrint Archive."},{"issue":"5","key":"1203_CR18","doi-asserted-by":"crossref","first-page":"1689","DOI":"10.1137\/S0097539796302749","volume":"28","author":"UM Maurer","year":"1999","unstructured":"Maurer, U. M., & Wolf, S. (1999). The relationship between breaking the Diffie\u2013Hellman protocol and computing discrete logarithms. SIAM Journal on Computing, 28(5), 1689\u20131721.","journal-title":"SIAM Journal on Computing"},{"key":"1203_CR19","doi-asserted-by":"crossref","unstructured":"Mayrhofer, R., & Welch, M. (2007). A human-verifiable authentication protocol using visible laser light. In The second international conference on availability, reliability and security, pp. 1143\u20131148.","DOI":"10.1109\/ARES.2007.5"},{"key":"1203_CR20","doi-asserted-by":"crossref","unstructured":"McCune, J., Perrig, A., & Reiter, M. (2005). Seeing-is-believing: Using camera phones for human-verifiable authentication. In IEEE symposium on security and privacy, pp. 110\u2013124.","DOI":"10.1109\/SP.2005.19"},{"issue":"1","key":"1203_CR21","doi-asserted-by":"crossref","first-page":"139","DOI":"10.3233\/JCS-2010-0403","volume":"19","author":"LH Nguyen","year":"2011","unstructured":"Nguyen, L. H., & Roscoe, A. W. (2011). Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey. Journal of Computer Security, 19(1), 139\u2013201.","journal-title":"Journal of Computer Security"},{"issue":"11","key":"1203_CR22","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MCOM.2008.4689252","volume":"46","author":"P Papadimitratos","year":"2008","unstructured":"Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., et al. (2008). Secure vehicular communication systems: Design and architecture. Communications Magazine, IEEE, 46(11), 100\u2013109.","journal-title":"Communications Magazine, IEEE"},{"key":"1203_CR23","first-page":"200","volume":"2864","author":"S Patel","year":"2003","unstructured":"Patel, S., & Abowd, G. (2003). A 2-way laser-assisted selection scheme for handhelds in a physical environment. Lecture notes in computer science. Ubiquitous Computing, 2864, 200\u2013207.","journal-title":"Ubiquitous Computing"},{"key":"1203_CR24","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-642-37974-1_12","volume":"7865","author":"F Ponte Mller","year":"2013","unstructured":"Ponte Mller, F., Navajas, L., & Strang, T. (2013). Characterization of a laser scanner sensor for the use as a reference system in vehicular relative positioning. Communication Technologies for Vehicles, 7865, 146\u2013158.","journal-title":"Communication Technologies for Vehicles"},{"key":"1203_CR25","doi-asserted-by":"crossref","unstructured":"Raya, M., & Hubaux, J.-P. (2005). The security of vanets. In Proceedings of the 2nd ACM international workshop on vehicular ad hoc networks, pp. 93\u201394.","DOI":"10.1145\/1080754.1080774"},{"issue":"1","key":"1203_CR26","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., & Hubaux, J.-P. (2007). Securing vehicular ad-hoc networks. Journal of Computer Security, 15(1), 39\u201368.","journal-title":"Journal of Computer Security"},{"key":"1203_CR27","unstructured":"Ringwald, M. (2002). Spontaneous interaction with everyday devices using a PDA. In Proceedings on supporting spontaneous interaction in ubiquitous computing settings, a workshop held at Ubicomp."},{"key":"1203_CR28","unstructured":"Tranposrtation Research Board of the National Academies. (2013). Guidelines for the use of mobile LIDAR in transportation applicaions. National Coperative Highway Research Program, Report 748. http:\/\/www.trb.org\/Main\/Blurbs\/169111.aspx"},{"key":"1203_CR29","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/978-3-642-15317-4_15","volume":"6280","author":"A Sarr","year":"2010","unstructured":"Sarr, A., Elbaz-Vincent, P., & Bajard, J.-C. (2010). A new security model for authenticated key agreement. Security and Cryptography for Networks, 6280, 219\u2013234.","journal-title":"Security and Cryptography for Networks"},{"issue":"2","key":"1203_CR30","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/COMST.2008.4564481","volume":"10","author":"M Sichitiu","year":"2008","unstructured":"Sichitiu, M., & Kihl, M. (2008). Inter-vehicle communication systems: A survey. Communications Surveys Tutorials, IEEE, 10(2), 88\u2013105.","journal-title":"Communications Surveys Tutorials, IEEE"},{"key":"1203_CR31","doi-asserted-by":"crossref","unstructured":"Sufatrio, S., & Yap, R. H. C. (2008). Extending BAN logic for reasoning with modern PKI-based protocols. In IFIP international conference on network and parallel computing, pp. 190\u2013197.","DOI":"10.1109\/NPC.2008.86"},{"issue":"11","key":"1203_CR32","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MSPEC.2013.6655838","volume":"50","author":"L Ulrich","year":"2013","unstructured":"Ulrich, L. (2013). Whiter brights with lasers. IEEE Spectrum, 50(11), 36\u201356.","journal-title":"IEEE Spectrum"},{"issue":"3","key":"1203_CR33","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s10623-007-9159-1","volume":"46","author":"B Ustaoglu","year":"2008","unstructured":"Ustaoglu, B. (2008). Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. Designs, Codes and Cryptography, 46(3), 329\u2013342.","journal-title":"Designs, Codes and Cryptography"},{"key":"1203_CR34","doi-asserted-by":"crossref","unstructured":"Yashiro, T., Kondo, T., Ariyasu, K., & Matsushita, Y. (1994). An inter-vehicle networking method using laser media. In IEEE 44th vehicular technology conference, vol. 1, pp. 443\u2013447.","DOI":"10.1109\/VETEC.1994.345080"},{"key":"1203_CR35","doi-asserted-by":"crossref","unstructured":"Fortin, B., Lherbier, R., & Noyer, J. C. (2013). A PHD approach for multiple vehicle tracking based on a polar detection method in laser range data. In IEEE international systems conference (SysCon), pp. 262\u2013268.","DOI":"10.1109\/SysCon.2013.6549892"},{"key":"1203_CR36","doi-asserted-by":"crossref","unstructured":"Thuy, M., & Leon, F. P. (2009). Non-linear, shape independent object tracking based on 2D lidar data. In IEEE intelligent vehicles symposium, pp. 532\u2013537.","DOI":"10.1109\/IVS.2009.5164334"},{"key":"1203_CR37","doi-asserted-by":"publisher","unstructured":"Dolev, S., Krzywiecki, \u0141., Panwar, N., & Segal, M. (2015). Vehicle authentication via monolithically certified public key and attributes. Wireless Networks, 1\u201318. doi: 10.1007\/s11276-015-1005-1 .","DOI":"10.1007\/s11276-015-1005-1"},{"key":"1203_CR38","doi-asserted-by":"crossref","unstructured":"Dolev, S., Krzywiecki, \u0141., Panwar, N., & Segal, M. (2014). Dynamic attribute based vehicle authentication. In Proceedings of the 13th IEEE international symposium on network computing and applications (NCA), pp. 1\u20138.","DOI":"10.1109\/NCA.2014.5"},{"key":"1203_CR39","doi-asserted-by":"crossref","unstructured":"Dolev, S., Krzywiecki, \u0141., Panwar, N., & Segal, M. (2015). Optical PUF for vehicles non-forwardable authentication. Technical report TR-1502.","DOI":"10.1109\/NCA.2015.25"},{"key":"1203_CR40","doi-asserted-by":"crossref","unstructured":"MacLachlan, R. A., & Mertz, C. (2006) Tracking of moving objects from a moving vehicle using a scanning laser rangefinder. In IEEE intelligent transportation systems conference, pp. 301\u2013306.","DOI":"10.1109\/ITSC.2006.1706758"},{"key":"1203_CR41","doi-asserted-by":"crossref","unstructured":"Abumansoor, O., & Boukerche, A. (2012). Preventing a DoS threat in vehicular ad-hoc networks using adaptive group beaconing. In Proceedings of the 8th ACM symposium on QoS and security for wireless and mobile networks, pp. 63\u201370.","DOI":"10.1145\/2387218.2387231"},{"issue":"4","key":"1203_CR42","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TDSC.2008.11","volume":"5","author":"S Capkun","year":"2008","unstructured":"Capkun, S., Cagalj, M., Rengaswamy, R. K., Tsigkogiannis, I., Hubaux, J. P., & Srivastava, M. B. (2008). Integrity codes: Message integrity protection and authentication over insecure channels. IEEE Transactions on Dependable and Secure Computing, 5(4), 208\u2013223.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"1203_CR43","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.jesp.2014.01.005","volume":"52","author":"A Waytz","year":"2014","unstructured":"Waytz, A., Heafner, J., & Epley, N. (2014). The mind in the machine: Anthropomorphism increases trust in an autonomous vehicle. Journal of Experimental Social Psychology, 52, 113\u2013117.","journal-title":"Journal of Experimental Social Psychology"},{"key":"1203_CR44","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.trc.2013.11.014","volume":"39","author":"DA Thornton","year":"2014","unstructured":"Thornton, D. A., Redmill, K., & Coifman, B. (2014). Automated parking surveys from a LIDAR equipped vehicle. Transportation Research Part C: Emerging Technologies, 39, 23\u201335.","journal-title":"Transportation Research Part C: Emerging Technologies"},{"key":"1203_CR45","first-page":"1","volume":"99","author":"W Zou","year":"2014","unstructured":"Zou, W., & Li, S. (2014). Calibration of nonoverlapping in-vehicle cameraswith laser pointers. IEEE Transactions on Intelligent Transportation Systems, 99, 1\u201312.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"1203_CR46","doi-asserted-by":"crossref","unstructured":"Shikiji, Y., Watari, K., Tsudaka, K., Wada, T., & Okada, H. (2014). Novel vehicle information acquisition method using vehicle code for automotive infrared laser radar. In Telecommunication networks and applications conference (ATNAC), Australasian, pp. 52\u201357.","DOI":"10.1109\/ATNAC.2014.7020873"},{"issue":"3","key":"1203_CR47","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MVT.2010.937847","volume":"5","author":"J Guillory","year":"2010","unstructured":"Guillory, J., Meyer, S., Sianud, I., Ulmer-moll, A. M., Charbonnier, B., Pizzinat, A., & Algani, C. (2010). Radio-over-fiber architectures. IEEE Vehicular Technology Magazine, 5(3), 30\u201338.","journal-title":"IEEE Vehicular Technology Magazine"},{"issue":"3","key":"1203_CR48","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MVT.2010.938595","volume":"5","author":"K David","year":"2010","unstructured":"David, K., Dixit, S., & Jefferies, N. (2010). 2020 Vision. IEEE Vehicular Technology Magazine, 5(3), 22\u201329.","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"1203_CR49","doi-asserted-by":"crossref","unstructured":"Larcom, J. A., & Liu, H. (2013). Modeling and characterization of GPS spoofing. In IEEE international conference on technologies for homeland security, pp. 729\u2013734.","DOI":"10.1109\/THS.2013.6699094"},{"issue":"4","key":"1203_CR50","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSPEC.2014.6776304","volume":"51","author":"L Ulrich","year":"2014","unstructured":"Ulrich, L. (2014). Top ten tech cars. IEEE Spectrum, 51(4), 38\u201347.","journal-title":"IEEE Spectrum"},{"key":"1203_CR51","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263\u2013277.","journal-title":"Information Sciences"},{"key":"1203_CR52","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2945","author":"D Chain","year":"2015","unstructured":"Chain, K., Chang, K. H., Kuo, W. C., & Yang, J. F. (2015). Enhancement authentication protocol using zero-knowledge proofs and chaotic maps. International Journal of Communication Systems. doi: 10.1002\/dac.2945 .","journal-title":"International Journal of Communication Systems"},{"key":"1203_CR53","doi-asserted-by":"crossref","unstructured":"Amin, R., & Biswas, G. P. (2015). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58\u201380.","DOI":"10.1016\/j.adhoc.2015.05.020"},{"key":"1203_CR54","doi-asserted-by":"crossref","unstructured":"Barbeau, M., Hall, J., & Kranakis, E. (2005). Detecting impersonation attacks in future wireless and mobile networks. In Proceedings of the first international conference on secure mobile ad-hoc networks and sensors (MADNES), vol. 4074, pp. 80\u201395.","DOI":"10.1007\/11801412_8"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1203-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-016-1203-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1203-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1203-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:04:13Z","timestamp":1559379853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-016-1203-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,30]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["1203"],"URL":"https:\/\/doi.org\/10.1007\/s11276-016-1203-5","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,30]]}}}