{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:27:43Z","timestamp":1772252863601,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11276-020-02325-z","type":"journal-article","created":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T12:03:02Z","timestamp":1587384182000},"page":"4207-4226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology"],"prefix":"10.1007","volume":"26","author":[{"given":"Nisha","family":"Malik","sequence":"first","affiliation":[]},{"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[]},{"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[]},{"given":"Ren Ping","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"issue":"2","key":"2325_CR1","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1016\/j.aej.2017.01.043","volume":"57","author":"A Kumar","year":"2018","unstructured":"Kumar, A., & Gupta, M. (2018). A review on activities of fifth generation mobile communication system. Alexandria Engineering Journal,57(2), 1125\u20131135.","journal-title":"Alexandria Engineering Journal"},{"key":"2325_CR2","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.simpat.2016.01.014","volume":"62","author":"A Mukherjee","year":"2016","unstructured":"Mukherjee, A., & De, D. (2016). Femtolet: A novel fifth generation network device for green mobile cloud computing. Simulation Modelling Practice and Theory,62, 68\u201387.","journal-title":"Simulation Modelling Practice and Theory"},{"issue":"2","key":"2325_CR3","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.tele.2015.10.001","volume":"33","author":"C Feij\u00f3o","year":"2016","unstructured":"Feij\u00f3o, C., G\u00f3mez-Barroso, J. L., & Ramos, S. (2016). Techno-economic implications of the mass-market uptake of mobile data services: Requirements for next generation mobile networks. Telematics and Informatics,33(2), 600\u2013612.","journal-title":"Telematics and Informatics"},{"key":"2325_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.jnca.2019.02.019","volume":"135","author":"A Habbal","year":"2019","unstructured":"Habbal, A., Goudar, S. I., & Hassan, S. (2019). A context-aware radio access technology selection mechanism in 5G mobile network for smart city applications. Journal of Network and Computer Applications,135, 97\u2013107.","journal-title":"Journal of Network and Computer Applications"},{"key":"2325_CR5","doi-asserted-by":"publisher","first-page":"100181","DOI":"10.1016\/j.vehcom.2019.100181","volume":"21","author":"W Benrhaiem","year":"2019","unstructured":"Benrhaiem, W., & Hafid, A. S. (2019). Bayesian networks based reliable broadcast in vehicular networks. Vehicular Communications, 21, 100181.","journal-title":"Vehicular Communications"},{"key":"2325_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.vehcom.2019.03.004","volume":"17","author":"O Urra","year":"2019","unstructured":"Urra, O., & Ilarri, S. (2019). Spatial crowdsourcing with mobile agents in vehicular networks. Vehicular Communications,17, 10\u201334.","journal-title":"Vehicular Communications"},{"key":"2325_CR7","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.phycom.2018.08.008","volume":"34","author":"RA Osman","year":"2019","unstructured":"Osman, R. A., Peng, X. H., & Omar, M. A. (2019). Adaptive cooperative communications for enhancing QoS in vehicular networks. Physical Communication,34, 285\u2013294.","journal-title":"Physical Communication"},{"key":"2325_CR8","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1016\/j.future.2019.07.006","volume":"101","author":"R Hussain","year":"2019","unstructured":"Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems,101, 843\u2013864.","journal-title":"Future Generation Computer Systems"},{"key":"2325_CR9","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.jisa.2019.03.001","volume":"46","author":"H Hasrouny","year":"2019","unstructured":"Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2019). Detection and efficient revocation within VANET. Journal of Information Security and Applications,46, 193\u2013209.","journal-title":"Journal of Information Security and Applications"},{"key":"2325_CR10","doi-asserted-by":"publisher","first-page":"100179","DOI":"10.1016\/j.vehcom.2019.100179","volume":"19","author":"M Arif","year":"2019","unstructured":"Arif, M., Wang, G., Bhuiyan, M. Z. A., Wang, T., & Chen, T. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179.","journal-title":"Vehicular Communications"},{"key":"2325_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.pmcj.2018.01.004","volume":"44","author":"J Kang","year":"2018","unstructured":"Kang, J., Lin, D., Jiang, W., & Bertino, E. (2018). Highly efficient randomized authentication in VANETs. Pervasive and Mobile Computing,44, 31\u201344.","journal-title":"Pervasive and Mobile Computing"},{"key":"2325_CR12","doi-asserted-by":"crossref","unstructured":"Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2019). A new type of blockchain for secure message exchange in VANET. Digital Communications and Networks(in press).","DOI":"10.1016\/j.dcan.2019.04.003"},{"issue":"2","key":"2325_CR13","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","volume":"6","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Yang, K., Lei, L., Zheng, K., & Leung, V. C. M. (2019). Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of Things Journal,6(2), 1495\u20131505.","journal-title":"IEEE Internet of Things Journal"},{"key":"2325_CR14","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.comnet.2018.08.016","volume":"145","author":"M Singh","year":"2018","unstructured":"Singh, M., & Kim, S. (2018). Branch based blockchain technology in intelligent vehicle. Computer Networks,145, 219\u2013231.","journal-title":"Computer Networks"},{"key":"2325_CR15","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.cogsys.2019.01.008","volume":"55","author":"K Bylykbashi","year":"2019","unstructured":"Bylykbashi, K., Elmazi, D., Matsuo, K., Ikeda, M., & Barolli, L. (2019). Effect of security and trustworthiness for a fuzzy cluster management system in VANETs. Cognitive Systems Research,55, 153\u2013163.","journal-title":"Cognitive Systems Research"},{"key":"2325_CR16","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.adhoc.2017.12.005","volume":"71","author":"P Cirne","year":"2018","unstructured":"Cirne, P., Z\u00faquete, A., & Sargento, S. (2018). TROPHY: Trustworthy VANET routing with group authentication keys. Ad Hoc Networks,71, 45\u201367.","journal-title":"Ad Hoc Networks"},{"key":"2325_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.vehcom.2019.03.005","volume":"17","author":"J Zhao","year":"2019","unstructured":"Zhao, J., Wu, Z., Wang, Y., & Ma, X. (2019). Adaptive optimization of QoS constraint transmission capacity of VANET. Vehicular Communications,17, 1\u20139.","journal-title":"Vehicular Communications"},{"key":"2325_CR18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.aeue.2019.05.026","volume":"108","author":"A Debnath","year":"2019","unstructured":"Debnath, A., Basumatary, H., Tarafdar, A., DebBarma, M. K., & Bhattacharyya, B. K. (2019). Center of mass and junction based data routing method to increase the QoS in VANET. AEU - International Journal of Electronics and Communications,108, 36\u201344.","journal-title":"AEU - International Journal of Electronics and Communications"},{"issue":"4","key":"2325_CR19","doi-asserted-by":"publisher","first-page":"1950026","DOI":"10.1142\/S1469026819500263","volume":"18","author":"PP Jadhav","year":"2019","unstructured":"Jadhav, P. P., & Joshi, S. D. (2019). WOADF: Whale optimization integrated adaptive dragonfly algorithm enabled with the TDD properties for model transformation. International Journal of Computational Intelligence and Applications, 18(4), 1950026.","journal-title":"International Journal of Computational Intelligence and Applications"},{"key":"2325_CR20","doi-asserted-by":"crossref","unstructured":"Revathi, K., & Krishnamoorthy, N. (2015). The performance analysis of swallow swarm optimization algorithm. In Proceedings of the 2nd international conference on electronics and communication systems (ICECS).","DOI":"10.1109\/ECS.2015.7124970"},{"issue":"1","key":"2325_CR21","first-page":"1","volume":"1","author":"R Remmiya","year":"2018","unstructured":"Remmiya, R., & Abisha, C. (2018). Artifacts removal in EEG signal using a NARX model based CS learning algorithm. Multimedia Research,1(1), 1\u20138.","journal-title":"Multimedia Research"},{"key":"2325_CR22","doi-asserted-by":"crossref","unstructured":"Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2019). A new type of blockchain for secure message exchange in VANET. Digital Communications and Networks.","DOI":"10.1016\/j.dcan.2019.04.003"},{"key":"2325_CR23","doi-asserted-by":"publisher","first-page":"45655","DOI":"10.1109\/ACCESS.2018.2864189","volume":"6","author":"Z Lu","year":"2018","unstructured":"Lu, Z., Liu, W., Wang, Q., Qu, G., & Liu, Z. (2018). A privacy-preserving trust model based on blockchain for VANETs. IEEE Access,6, 45655\u201345664.","journal-title":"IEEE Access"},{"key":"2325_CR24","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.adhoc.2018.11.006","volume":"86","author":"Y He","year":"2019","unstructured":"He, Y., Yu, F. R., Wei, Z., & Leung, V. (2019). Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Networks,86, 154\u2013165.","journal-title":"Ad Hoc Networks"},{"key":"2325_CR25","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.asoc.2018.12.001","volume":"75","author":"J Liang","year":"2019","unstructured":"Liang, J., Chen, J., Zhu, Y., & Yu, R. (2019). A novel intrusion detection system for vehicular ad hoc networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing,75, 712.","journal-title":"Applied Soft Computing"},{"key":"2325_CR26","doi-asserted-by":"publisher","first-page":"101636","DOI":"10.1016\/j.sysarc.2019.101636","volume":"99","author":"I Ali","year":"2019","unstructured":"Ali, I., Gervais, M., Ahene, E., & Li, F. (2019). A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99, 101636.","journal-title":"Journal of Systems Architecture"},{"issue":"8","key":"2325_CR27","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1007\/s11276-018-1756-6","volume":"25","author":"H Hasrouny","year":"2018","unstructured":"Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2018). Trust model for secure group leader-based communications in VANET. Wireless Networks, 25(8), 4639\u20134661.","journal-title":"Wireless Networks"},{"issue":"5","key":"2325_CR28","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1007\/s12083-019-00786-4","volume":"12","author":"H Li","year":"2019","unstructured":"Li, H., Pei, L., Liao, D., Sun, G., & Xu, D. (2019). Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer-to-Peer Networking and Applications,12(5), 1178\u20131193.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"2325_CR29","doi-asserted-by":"crossref","unstructured":"Mohan, Y., Chee, S. S., Xin, D. K. P., & Foong, L. P. (2016). Artificial neural network for classification of depressive and normal in EEG. In 2016 IEEE EMBS conference on biomedical engineering and sciences (IECBES).","DOI":"10.1109\/IECBES.2016.7843459"},{"key":"2325_CR30","doi-asserted-by":"crossref","unstructured":"Masadeh, R., Mahafzah, B. A., & Sharieh, A. (2019). Sea Lion Optimization Algorithm. (IJACSA) International Journal of Advanced Computer Science and Applications, 10(5).","DOI":"10.14569\/IJACSA.2019.0100548"},{"key":"2325_CR31","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili, S., & Lewis, A. (2016). The Whale Optimization Algorithm. Advances in Engineering Software,95, 51\u201367.","journal-title":"Advances in Engineering Software"},{"issue":"18","key":"2325_CR32","doi-asserted-by":"publisher","first-page":"3832","DOI":"10.1016\/j.neucom.2011.07.014","volume":"74","author":"C-C Hsu","year":"2011","unstructured":"Hsu, C.-C., Lin, S.-H., & Tai, W.-S. (2011). Apply extended self-organizing map to cluster and classify mixed-type data. Neurocomputing,74(18), 3832\u20133842.","journal-title":"Neurocomputing"},{"issue":"9","key":"2325_CR33","doi-asserted-by":"publisher","first-page":"2856","DOI":"10.1016\/j.asoc.2012.04.004","volume":"12","author":"W-S Tai","year":"2012","unstructured":"Tai, W.-S., & Hsu, C.-C. (2012). Growing self-organizing map with cross insert for mixed-type data clustering. Applied Soft Computing,12(9), 2856\u20132866.","journal-title":"Applied Soft Computing"},{"issue":"1","key":"2325_CR34","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.cam.2004.07.034","volume":"184","author":"J McCall","year":"2005","unstructured":"McCall, J. (2005). Genetic algorithms for modelling and optimisation. Journal of Computational and Applied Mathematics,184(1), 205\u2013222.","journal-title":"Journal of Computational and Applied Mathematics"},{"key":"2325_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.euromechsol.2017.06.003","volume":"66","author":"M Jafari","year":"2017","unstructured":"Jafari, M., & Chaleshtari, M. H. B. (2017). Using dragonfly algorithm for optimization of orthotropic infinite plates with a quasi-triangular cut-out. European Journal of Mechanics A\/Solids,66, 1\u201314.","journal-title":"European Journal of Mechanics A\/Solids"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02325-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02325-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02325-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T00:30:42Z","timestamp":1618878642000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02325-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":35,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["2325"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02325-z","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"20 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}