{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T14:01:07Z","timestamp":1773064867068,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11276-023-03459-6","type":"journal-article","created":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T12:02:15Z","timestamp":1692187335000},"page":"151-178","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["LAPEP\u2014Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network"],"prefix":"10.1007","volume":"30","author":[{"given":"S.","family":"Jayashree","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0205-4390","authenticated-orcid":false,"given":"S. V. N.","family":"Santhosh Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,16]]},"reference":[{"issue":"5","key":"3459_CR1","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","volume":"20","author":"J Cui","year":"2019","unstructured":"Cui, J., Wei, L., Zhang, J., Xu, Y., & Zhong, H. (2019). An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 20(5), 1621\u20131632. https:\/\/doi.org\/10.1109\/TITS.2018.2827460","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"3459_CR2","doi-asserted-by":"publisher","first-page":"161655","DOI":"10.1109\/ACCESS.2020.3021408","volume":"8","author":"H Liu","year":"2020","unstructured":"Liu, H., Wang, H., & Gu, H. (2020). HPBS: A hybrid proxy based authentication scheme in VANETs. IEEE Access, 8, 161655\u2013161667. https:\/\/doi.org\/10.1109\/ACCESS.2020.3021408","journal-title":"IEEE Access"},{"issue":"6","key":"3459_CR3","doi-asserted-by":"publisher","first-page":"5974","DOI":"10.1109\/TVT.2021.3078806","volume":"70","author":"I Ali","year":"2021","unstructured":"Ali, I., Chen, Y., Ullah, N., Afzal, M., & He, W. (2021). Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Transactions on Vehicular Technology, 70(6), 5974\u20135989. https:\/\/doi.org\/10.1109\/TVT.2021.3078806","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3459_CR4","doi-asserted-by":"publisher","first-page":"15633","DOI":"10.1109\/ACCESS.2021.3053043","volume":"9","author":"JS Alshudukhi","year":"2021","unstructured":"Alshudukhi, J. S., Al-Mekhlafi, Z. G., & Mohammed, B. A. (2021). A lightweight authentication with privacy-preserving scheme for vehicular ad hoc networks based on elliptic curve cryptography. IEEE Access, 9, 15633\u201315642. https:\/\/doi.org\/10.1109\/ACCESS.2021.3053043","journal-title":"IEEE Access"},{"key":"3459_CR5","doi-asserted-by":"publisher","first-page":"222032","DOI":"10.1109\/ACCESS.2020.3044961","volume":"8","author":"JS Alshudukhi","year":"2020","unstructured":"Alshudukhi, J. S., Mohammed, B. A., & Al-Mekhlafi, Z. G. (2020). Conditional privacy-preserving authentication scheme without using point multiplication operations based on elliptic curve cryptography (ECC). IEEE Access, 8, 222032\u2013222040. https:\/\/doi.org\/10.1109\/ACCESS.2020.3044961","journal-title":"IEEE Access"},{"key":"3459_CR6","doi-asserted-by":"publisher","first-page":"170507","DOI":"10.1109\/ACCESS.2020.3024587","volume":"8","author":"MA Al-Shareeda","year":"2020","unstructured":"Al-Shareeda, M. A., Anbar, M., Alazzawi, M. A., Manickam, S., & Al-Hiti, A. S. (2020). LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network. IEEE Access, 8, 170507\u2013170518. https:\/\/doi.org\/10.1109\/ACCESS.2020.3024587","journal-title":"IEEE Access"},{"key":"3459_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2023\/8981988","volume":"2023","author":"SVN Santhosh Kumar","year":"2023","unstructured":"Santhosh Kumar, S. V. N., Selvi, M., & Kannan, A. (2023). A comprehensive survey on machine learning-based intrusion detection systems for secure communication in Internet of Things. Computational Intelligence and Neuroscience, 2023, 1\u201324. https:\/\/doi.org\/10.1155\/2023\/8981988","journal-title":"Computational Intelligence and Neuroscience"},{"issue":"18","key":"3459_CR8","doi-asserted-by":"publisher","first-page":"20998","DOI":"10.1109\/JSEN.2021.3097172","volume":"21","author":"T Nandy","year":"2021","unstructured":"Nandy, T., et al. (2021). A secure, privacy-preserving, and lightweight authentication scheme for VANETs. IEEE Sensors Journal, 21(18), 20998\u201321011. https:\/\/doi.org\/10.1109\/JSEN.2021.3097172","journal-title":"IEEE Sensors Journal"},{"key":"3459_CR9","doi-asserted-by":"publisher","first-page":"178310","DOI":"10.1109\/ACCESS.2019.2958356","volume":"7","author":"C Zhang","year":"2019","unstructured":"Zhang, C., Xue, X., Feng, L., Zeng, X., & Ma, J. (2019). Group-signature and group session key combined safety message authentication protocol for VANETs. IEEE Access, 7, 178310\u2013178320. https:\/\/doi.org\/10.1109\/ACCESS.2019.2958356","journal-title":"IEEE Access"},{"issue":"7","key":"3459_CR10","doi-asserted-by":"publisher","first-page":"4513","DOI":"10.1007\/s11276-021-02748-2","volume":"27","author":"S Rajasoundaran","year":"2021","unstructured":"Rajasoundaran, S., Kumar, S. V. N. S., Selvi, M., Ganapathy, S., Rakesh, R., & Kannan, A. (2021). Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks. Wireless Networks, 27(7), 4513\u20134534. https:\/\/doi.org\/10.1007\/s11276-021-02748-2","journal-title":"Wireless Networks"},{"key":"3459_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045940","author":"JS Alshudukhi","year":"2020","unstructured":"Alshudukhi, J. S., Mohammed, B. A., & Al-Mekhlafi, Z. G. (2020). An efficient conditional privacy-preserving authentication scheme for the prevention of side-channel attacks in vehicular ad hoc networks. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2020.3045940","journal-title":"IEEE Access"},{"key":"3459_CR12","doi-asserted-by":"publisher","first-page":"12014","DOI":"10.1109\/ACCESS.2017.2717999","volume":"5","author":"U Rajput","year":"2017","unstructured":"Rajput, U., Abbas, F., Eun, H., & Oh, H. (2017). A hybrid approach for efficient privacy-preserving authentication in VANET. IEEE Access, 5, 12014\u201312030. https:\/\/doi.org\/10.1109\/ACCESS.2017.2717999","journal-title":"IEEE Access"},{"key":"3459_CR13","doi-asserted-by":"publisher","first-page":"62584","DOI":"10.1109\/ACCESS.2018.2876126","volume":"6","author":"X Yue","year":"2018","unstructured":"Yue, X., Chen, B., Wang, X., Duan, Y., Gao, M., & He, Y. (2018). An efficient and secure anonymous authentication scheme for VANETs based on the framework of group signatures. IEEE Access, 6, 62584\u201362600. https:\/\/doi.org\/10.1109\/ACCESS.2018.2876126","journal-title":"IEEE Access"},{"issue":"4","key":"3459_CR14","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1007\/s11276-017-1549-3","volume":"24","author":"SVN Santhosh Kumar","year":"2018","unstructured":"Santhosh Kumar, S. V. N., & Palanichamy, Y. (2018). Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Networks, 24(4), 1343\u20131360. https:\/\/doi.org\/10.1007\/s11276-017-1549-3","journal-title":"Wireless Networks"},{"issue":"9","key":"3459_CR15","doi-asserted-by":"publisher","first-page":"8647","DOI":"10.1109\/TVT.2018.2839979","volume":"67","author":"S Tangade","year":"2018","unstructured":"Tangade, S., Manvi, S. S., & Lorenz, P. (2018). Decentralized and scalable privacy-preserving authentication scheme in VANETs. IEEE Transactions on Vehicular Technology, 67(9), 8647\u20138655. https:\/\/doi.org\/10.1109\/TVT.2018.2839979","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"7","key":"3459_CR16","doi-asserted-by":"publisher","first-page":"3339","DOI":"10.1109\/TVT.2013.2257188","volume":"62","author":"X Lin","year":"2013","unstructured":"Lin, X., Member, S., & Li, X. (2013). Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 62(7), 3339\u20133348.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"12","key":"3459_CR17","doi-asserted-by":"publisher","first-page":"5414","DOI":"10.35940\/ijitee.L3790081219","volume":"8","author":"SVN Santhosh Kumar","year":"2019","unstructured":"Santhosh Kumar, S. V. N., Selvi, M., Gayathri, A., Ruby, D., & Kannan, A. (2019). Energy efficient rule based intelligent routing using fitness functions in wireless sensor networks. The International Journal of Innovative Technology and Exploring Engineering, 8(12), 5414\u20135420. https:\/\/doi.org\/10.35940\/ijitee.L3790081219","journal-title":"The International Journal of Innovative Technology and Exploring Engineering"},{"issue":"4","key":"3459_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.35940\/ijitee.b6264.029420","volume":"9","author":"M Selvi","year":"2020","unstructured":"Selvi, M., Gayathri, A., Santhosh, K. S., & Kannan, A. (2020). Energy efficient and secured MQTT protocol using IoT. The International Journal of Innovative Technology and Exploring Engineering, 9(4), 11\u201314. https:\/\/doi.org\/10.35940\/ijitee.b6264.029420","journal-title":"The International Journal of Innovative Technology and Exploring Engineering"},{"issue":"3","key":"3459_CR19","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JSAC.2011.110311","volume":"29","author":"Y Hao","year":"2011","unstructured":"Hao, Y., Cheng, Y., Zhou, C., & Song, W. (2011). A distributed key management framework with cooperative message authentication in VANETs. IEEE Journal on Selected Areas in Communications, 29(3), 616\u2013629. https:\/\/doi.org\/10.1109\/JSAC.2011.110311","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"3459_CR20","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.comnet.2019.01.024","volume":"151","author":"K Thangaramya","year":"2019","unstructured":"Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., Ganapathy, S., & Kannan, A. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Computer Networks, 151, 211\u2013223. https:\/\/doi.org\/10.1016\/j.comnet.2019.01.024","journal-title":"Computer Networks"},{"issue":"4","key":"3459_CR21","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/TNSM.2010.1012.0362","volume":"7","author":"FR Yu","year":"2010","unstructured":"Yu, F. R., Wang, F., Tang, H., & Mason, P. C. (2010). A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Transactions on Network and Service Management, 7(4), 258\u2013267. https:\/\/doi.org\/10.1109\/TNSM.2010.1012.0362","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"3459_CR22","doi-asserted-by":"publisher","first-page":"100247","DOI":"10.1016\/j.vehcom.2020.100247","volume":"25","author":"D Manivannan","year":"2020","unstructured":"Manivannan, D., Showkat, S., & Zeadally, S. (2020). Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Vehicular Communications, 25, 100247. https:\/\/doi.org\/10.1016\/j.vehcom.2020.100247","journal-title":"Vehicular Communications"},{"issue":"5","key":"3459_CR23","doi-asserted-by":"publisher","first-page":"4839","DOI":"10.1109\/TVT.2021.3055895","volume":"70","author":"MA Khan","year":"2021","unstructured":"Khan, M. A., et al. (2021). An efficient and secure certificate-based access control and key agreement scheme for flying ad-hoc networks. IEEE Transactions on Vehicular Technology, 70(5), 4839\u20134851. https:\/\/doi.org\/10.1109\/TVT.2021.3055895","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"5","key":"3459_CR24","doi-asserted-by":"publisher","first-page":"3083","DOI":"10.1007\/s11276-019-02039-x","volume":"26","author":"M Bayat","year":"2020","unstructured":"Bayat, M., Pournaghi, M., Rahimi, M., & Barmshoory, M. (2020). NERA: A new and efficient RSU based authentication scheme for VANETs. Wirel. Networks, 26(5), 3083\u20133098. https:\/\/doi.org\/10.1007\/s11276-019-02039-x","journal-title":"Wirel. Networks"},{"issue":"1","key":"3459_CR25","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1109\/JSYST.2019.2932807","volume":"14","author":"T Limbasiya","year":"2020","unstructured":"Limbasiya, T., Member, S., & Das, D. (2020). Lightweight secure message broadcasting protocol for vehicle-to-vehicle communication. IEEE Systems Journal, 14(1), 520\u2013529.","journal-title":"IEEE Systems Journal"},{"key":"3459_CR26","doi-asserted-by":"publisher","first-page":"121522","DOI":"10.1109\/ACCESS.2021.3109264","volume":"9","author":"MA Al-Shareeda","year":"2021","unstructured":"Al-Shareeda, M. A., Anbar, M., Manickam, S., Khalil, A., & Hasbullah, I. H. (2021). Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey. IEEE Access, 9, 121522\u2013121531. https:\/\/doi.org\/10.1109\/ACCESS.2021.3109264","journal-title":"IEEE Access"},{"issue":"2","key":"3459_CR27","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1109\/TNSM.2020.3042526","volume":"18","author":"T Limbasiya","year":"2021","unstructured":"Limbasiya, T., & Das, D. (2021). VCom: Secure and efficient vehicle-to-vehicle message communication protocol. IEEE Transactions on Network and Service Management, 18(2), 2365\u20132376. https:\/\/doi.org\/10.1109\/TNSM.2020.3042526","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"6","key":"3459_CR28","doi-asserted-by":"publisher","first-page":"6709","DOI":"10.1109\/TVT.2020.2986585","volume":"69","author":"H Vasudev","year":"2020","unstructured":"Vasudev, H., Deshpande, V., Das, D., & Das, S. K. (2020). A lightweight mutual authentication protocol for V2V communication in internet of vehicles. IEEE Transactions on Vehicular Technology, 69(6), 6709\u20136717. https:\/\/doi.org\/10.1109\/TVT.2020.2986585","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3459_CR29","doi-asserted-by":"publisher","first-page":"55050","DOI":"10.1109\/ACCESS.2019.2911924","volume":"7","author":"L Wu","year":"2019","unstructured":"Wu, L., et al. (2019). An efficient privacy-preserving mutual authentication scheme for secure V2V communication in vehicular ad hoc network. IEEE Access, 7, 55050\u201355063. https:\/\/doi.org\/10.1109\/ACCESS.2019.2911924","journal-title":"IEEE Access"},{"issue":"February","key":"3459_CR30","doi-asserted-by":"publisher","first-page":"102729","DOI":"10.1016\/j.jisa.2020.102729","volume":"58","author":"R Amin","year":"2021","unstructured":"Amin, R., Pali, I., & Sureshkumar, V. (2021). Software-defined network enabled vehicle to vehicle secured data transmission protocol in VANETs. Journal of Information Security and Applications, 58(February), 102729. https:\/\/doi.org\/10.1016\/j.jisa.2020.102729","journal-title":"Journal of Information Security and Applications"},{"issue":"7","key":"3459_CR31","doi-asserted-by":"publisher","first-page":"4757","DOI":"10.1109\/TITS.2020.3041746","volume":"22","author":"H Fatemidokht","year":"2021","unstructured":"Fatemidokht, H., Rafsanjani, M. K., Gupta, B. B., & Hsu, C. H. (2021). Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Transactions on Intelligent Transportation Systems, 22(7), 4757\u20134769. https:\/\/doi.org\/10.1109\/TITS.2020.3041746","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"7","key":"3459_CR32","doi-asserted-by":"publisher","first-page":"3997","DOI":"10.1109\/TITS.2020.3002462","volume":"22","author":"M Kamal","year":"2021","unstructured":"Kamal, M., Srivastava, G., & Tariq, M. (2021). Blockchain-based lightweight and secured V2V communication in the internet of vehicles. IEEE Transactions on Intelligent Transportation Systems, 22(7), 3997\u20134004. https:\/\/doi.org\/10.1109\/TITS.2020.3002462","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"10","key":"3459_CR33","doi-asserted-by":"publisher","first-page":"2740","DOI":"10.1109\/TITS.2017.2657649","volume":"18","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Wang, Y., & Chang, G. (2017). Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Transactions on Intelligent Transportation Systems, 18(10), 2740\u20132749. https:\/\/doi.org\/10.1109\/TITS.2017.2657649","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"8","key":"3459_CR34","doi-asserted-by":"publisher","first-page":"5730","DOI":"10.1109\/TII.2020.3012166","volume":"17","author":"G Raja","year":"2021","unstructured":"Raja, G., Anbalagan, S., Vijayaraghavan, G., Dhanasekaran, P., Al-Otaibi, Y. D., & Bashir, A. K. (2021). Energy-efficient end-to-end security for software-defined vehicular networks. IEEE Transactions on Industrial Informatics, 17(8), 5730\u20135737. https:\/\/doi.org\/10.1109\/TII.2020.3012166","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"3459_CR35","doi-asserted-by":"publisher","unstructured":"Chuang, M. C., & Lee, J. F. (2011). PPAS: A privacy preservation authentication scheme for vehicle-to- infrastructure communication networks. In 2011 International Conference on Consumer Electronics, Communications and Networks, CECNet 2011\u2014Proceedings (pp. 1509\u20131512). https:\/\/doi.org\/10.1109\/CECNET.2011.5768254","DOI":"10.1109\/CECNET.2011.5768254"},{"issue":"1","key":"3459_CR36","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/JSYST.2021.3051435","volume":"15","author":"P Wang","year":"2021","unstructured":"Wang, P., & Liu, Y. (2021). SEMA: Secure and efficient message authentication protocol for VANETs. IEEE Systems Journal, 15(1), 846\u2013855. https:\/\/doi.org\/10.1109\/JSYST.2021.3051435","journal-title":"IEEE Systems Journal"},{"issue":"5","key":"3459_CR37","doi-asserted-by":"publisher","first-page":"3244","DOI":"10.1109\/TDSC.2021.3090400","volume":"19","author":"H Sikarwar","year":"2022","unstructured":"Sikarwar, H., & Das, D. (2022). Towards lightweight authentication and batch verification scheme in IoV. IEEE Transactions on Dependable and Secure Computing, 19(5), 3244\u20133256. https:\/\/doi.org\/10.1109\/TDSC.2021.3090400","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3459_CR38","doi-asserted-by":"publisher","unstructured":"Vasudev, H., & Das, D. (2019). An efficient authentication and secure vehicle-to-vehicle communications in an IoV. In IEEE Vehicular Technology Conference, vol. 2019. https:\/\/doi.org\/10.1109\/VTCSpring.2019.8746612","DOI":"10.1109\/VTCSpring.2019.8746612"},{"issue":"June 2019","key":"3459_CR39","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.trc.2016.03.008","volume":"68","author":"KC Dey","year":"2016","unstructured":"Dey, K. C., Rayamajhi, A., Chowdhury, M., Bhavsar, P., & Martin, J. (2016). Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network: Performance evaluation. Transportation Research Part C: Emerging Technologies, 68(June 2019), 168\u2013184. https:\/\/doi.org\/10.1016\/j.trc.2016.03.008","journal-title":"Transportation Research Part C: Emerging Technologies"},{"issue":"2","key":"3459_CR40","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1109\/TITS.2019.2899321","volume":"21","author":"AA Rasheed","year":"2020","unstructured":"Rasheed, A. A., Mahapatra, R. N., & Hamza-Lup, F. G. (2020). Adaptive group-based zero knowledge proof-authentication protocol in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 21(2), 867\u2013881. https:\/\/doi.org\/10.1109\/TITS.2019.2899321","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"August","key":"3459_CR41","doi-asserted-by":"publisher","first-page":"101636","DOI":"10.1016\/j.sysarc.2019.101636","volume":"99","author":"I Ali","year":"2019","unstructured":"Ali, I., Gervais, M., Ahene, E., & Li, F. (2019). A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99(August), 101636. https:\/\/doi.org\/10.1016\/j.sysarc.2019.101636","journal-title":"Journal of Systems Architecture"},{"key":"3459_CR42","doi-asserted-by":"publisher","first-page":"142858","DOI":"10.1109\/ACCESS.2020.3014038","volume":"8","author":"SA Alfadhli","year":"2020","unstructured":"Alfadhli, S. A., Lu, S., Chen, K., & Sebai, M. (2020). MFSPV: A multi-factor secured and lightweight privacy-preserving authentication scheme for VANETs. IEEE Access, 8, 142858\u2013142874. https:\/\/doi.org\/10.1109\/ACCESS.2020.3014038","journal-title":"IEEE Access"},{"key":"3459_CR43","doi-asserted-by":"publisher","first-page":"100228","DOI":"10.1016\/j.vehcom.2019.100228","volume":"22","author":"I Ali","year":"2020","unstructured":"Ali, I., & Li, F. (2020). An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs. Vehicular Communications, 22, 100228. https:\/\/doi.org\/10.1016\/j.vehcom.2019.100228","journal-title":"Vehicular Communications"},{"issue":"January","key":"3459_CR44","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1016\/j.comcom.2020.03.041","volume":"160","author":"H Zhang","year":"2020","unstructured":"Zhang, H., & Lu, X. (2020). Vehicle communication network in intelligent transportation system based on Internet of Things. Computer Communications, 160(January), 799\u2013806. https:\/\/doi.org\/10.1016\/j.comcom.2020.03.041","journal-title":"Computer Communications"},{"key":"3459_CR45","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3317","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Guo, W., Zhong, Q., & Yao, G. (2017). LVAP: Lightweight V2I authentication protocol using group communication in VANETs. International Journal of Communication Systems. https:\/\/doi.org\/10.1002\/dac.3317","journal-title":"International Journal of Communication Systems"},{"key":"3459_CR46","doi-asserted-by":"publisher","first-page":"150914","DOI":"10.1109\/ACCESS.2020.3017018","volume":"8","author":"MA Al-shareeda","year":"2020","unstructured":"Al-shareeda, M. A., & Anbar, M. (2020). VPPCS: Vanet-based privacy-preserving communication scheme. IEEE Access, 8, 150914\u2013150928.","journal-title":"IEEE Access"},{"issue":"6","key":"3459_CR47","doi-asserted-by":"publisher","first-page":"4435","DOI":"10.1109\/JIOT.2021.3104010","volume":"9","author":"I Ali","year":"2022","unstructured":"Ali, I., Chen, Y., Pan, C., & Zhou, A. (2022). ECCHSC: Computationally and bandwidth efficient ECC-based hybrid signcryption protocol for secure heterogeneous vehicle-to-infrastructure communications. IEEE Internet of Things Journal, 9(6), 4435\u20134450. https:\/\/doi.org\/10.1109\/JIOT.2021.3104010","journal-title":"IEEE Internet of Things Journal"},{"issue":"September 2021","key":"3459_CR48","doi-asserted-by":"publisher","first-page":"108016","DOI":"10.1016\/j.compeleceng.2022.108016","volume":"100","author":"GS Rawat","year":"2022","unstructured":"Rawat, G. S., Singh, K., Arshad, N. I., Hadidi, K., & Ahmadian, A. (2022). A lightweight authentication scheme with privacy preservation for vehicular networks. Computers and Electrical Engineering, 100(September 2021), 108016. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108016","journal-title":"Computers and Electrical Engineering"},{"issue":"15","key":"3459_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app9153131","volume":"9","author":"F Zhou","year":"2019","unstructured":"Zhou, F., Li, Y., & Ding, Y. (2019). Practical V2I secure communication schemes for heterogeneous VANETs. Applied Sciences, 9(15), 1\u201316. https:\/\/doi.org\/10.3390\/app9153131","journal-title":"Applied Sciences"},{"issue":"4","key":"3459_CR50","doi-asserted-by":"publisher","first-page":"5373","DOI":"10.1109\/JSYST.2020.2977670","volume":"14","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Zhong, H., Xu, Y., Cui, J., & Wu, G. (2020). Enhanced security identity-based privacy-preserving authentication scheme supporting revocation for VANETs. IEEE Systems Journal, 14(4), 5373\u20135383. https:\/\/doi.org\/10.1109\/JSYST.2020.2977670","journal-title":"IEEE Systems Journal"},{"key":"3459_CR51","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4070283","author":"Y Zhou","year":"2018","unstructured":"Zhou, Y., Liu, S., Xiao, M., Deng, S., & Wang, X. (2018). An efficient V2I authentication scheme for VANETs. Mobile Information Systems. https:\/\/doi.org\/10.1155\/2018\/4070283","journal-title":"Mobile Information Systems"},{"key":"3459_CR52","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/TIFS.2019.2923156","volume":"15","author":"J Zhou","year":"2020","unstructured":"Zhou, J., Cao, Z., Qin, Z., Dong, X., & Ren, K. (2020). LPPA: Lightweight privacy-preserving authentication from efficient multi-key secure outsourced computation for location-based services in VANETs. IEEE Transactions on Information Forensics and Security, 15, 420\u2013434. https:\/\/doi.org\/10.1109\/TIFS.2019.2923156","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3459_CR53","doi-asserted-by":"publisher","first-page":"3888","DOI":"10.1109\/TIFS.2021.3098971","volume":"16","author":"X Feng","year":"2021","unstructured":"Feng, X., Shi, Q., Xie, Q., & Wang, L. (2021). P2BA: A privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 16, 3888\u20133899. https:\/\/doi.org\/10.1109\/TIFS.2021.3098971","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3459_CR54","doi-asserted-by":"publisher","first-page":"177693","DOI":"10.1109\/ACCESS.2020.3027718","volume":"8","author":"J Qi","year":"2020","unstructured":"Qi, J., & Gao, T. (2020). A privacy-preserving authentication and pseudonym revocation scheme for VANETs. IEEE Access, 8, 177693\u2013177707. https:\/\/doi.org\/10.1109\/ACCESS.2020.3027718","journal-title":"IEEE Access"},{"key":"3459_CR55","doi-asserted-by":"publisher","first-page":"154560","DOI":"10.1109\/ACCESS.2019.2948382","volume":"7","author":"Y Gao","year":"2019","unstructured":"Gao, Y., Wu, H., Song, B., Jin, Y., Luo, X., & Zeng, X. (2019). A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access, 7, 154560\u2013154571. https:\/\/doi.org\/10.1109\/ACCESS.2019.2948382","journal-title":"IEEE Access"},{"issue":"3","key":"3459_CR56","doi-asserted-by":"publisher","first-page":"3931","DOI":"10.1007\/s11042-022-13440-8","volume":"82","author":"RP Nayak","year":"2023","unstructured":"Nayak, R. P., Sethi, S., Bhoi, S. K., Sahoo, K. S., & Nayyar, A. (2023). ML-MDS: Machine learning based misbehavior detection system for cognitive software-defined multimedia VANETs (CSDMV) in smart cities. Multimedia Tools and Applications, 82(3), 3931\u20133951. https:\/\/doi.org\/10.1007\/s11042-022-13440-8","journal-title":"Multimedia Tools and Applications"},{"issue":"2019","key":"3459_CR57","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.comcom.2019.10.011","volume":"149","author":"J Bhatia","year":"2020","unstructured":"Bhatia, J., Dave, R., Bhayani, H., Tanwar, S., & Nayyar, A. (2020). SDN-based real-time urban traffic analysis in VANET environment. Computer and Communications, 149(2019), 162\u2013175. https:\/\/doi.org\/10.1016\/j.comcom.2019.10.011","journal-title":"Computer and Communications"},{"issue":"7","key":"3459_CR58","doi-asserted-by":"publisher","first-page":"7863","DOI":"10.1109\/TVT.2022.3169948","volume":"71","author":"X Zhou","year":"2022","unstructured":"Zhou, X., Luo, M., Vijayakumar, P., Peng, C., & He, D. (2022). Efficient certificateless conditional privacy-preserving authentication for VANETs. IEEE Transactions on Vehicular Technology, 71(7), 7863\u20137875. https:\/\/doi.org\/10.1109\/TVT.2022.3169948","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"12","key":"3459_CR59","doi-asserted-by":"publisher","first-page":"12902","DOI":"10.1109\/TVT.2021.3121449","volume":"70","author":"W Othman","year":"2021","unstructured":"Othman, W., Fuyou, M., Xue, K., & Hawbani, A. (2021). Physically secure lightweight and privacy-preserving message authentication protocol for VANET in smart city. IEEE Transactions on Vehicular Technology, 70(12), 12902\u201312917. https:\/\/doi.org\/10.1109\/TVT.2021.3121449","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"7","key":"3459_CR60","doi-asserted-by":"publisher","first-page":"6633","DOI":"10.1109\/TITS.2021.3059638","volume":"23","author":"S Lv","year":"2022","unstructured":"Lv, S., & Liu, Y. (2022). PLVA: Privacy-preserving and lightweight V2I authentication protocol. IEEE Transactions on Intelligent Transportation Systems, 23(7), 6633\u20136639. https:\/\/doi.org\/10.1109\/TITS.2021.3059638","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"9","key":"3459_CR61","doi-asserted-by":"publisher","first-page":"3280","DOI":"10.1109\/TMC.2021.3056712","volume":"21","author":"L Wei","year":"2022","unstructured":"Wei, L., Cui, J., Zhong, H., Xu, Y., & Liu, L. (2022). Proven secure tree-based authenticated key agreement for securing V2V and V2I communications in VANETs. IEEE Transactions on Mobile Computing, 21(9), 3280\u20133297. https:\/\/doi.org\/10.1109\/TMC.2021.3056712","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"3459_CR62","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TVT.2021.3050399","volume":"70","author":"I Ali","year":"2021","unstructured":"Ali, I., Chen, Y., Ullah, N., Kumar, R., & He, W. (2021). An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Transactions on Vehicular Technology, 70(2), 1278\u20131291. https:\/\/doi.org\/10.1109\/TVT.2021.3050399","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"11","key":"3459_CR63","doi-asserted-by":"publisher","first-page":"12158","DOI":"10.1109\/TVT.2021.3118892","volume":"70","author":"M Umar","year":"2021","unstructured":"Umar, M., Hafizul Islam, S. K., Mahmood, K., Ahmed, S., Ghaffar, Z., & Saleem, M. A. (2021). Provable secure identity-based anonymous and privacy-preserving inter-vehicular authentication protocol for VANETS using PUF. IEEE Transactions on Vehicular Technology, 70(11), 12158\u201312167. https:\/\/doi.org\/10.1109\/TVT.2021.3118892","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"6","key":"3459_CR64","doi-asserted-by":"publisher","first-page":"957","DOI":"10.18576\/amis\/140602","volume":"14","author":"MA Al-shareeda","year":"2020","unstructured":"Al-shareeda, M. A., et al. (2020). SWPPA: A new and efficient conditional privacy-preserving authentication scheme for Vehicular Ad Hoc Networks (VANETs). Applied Mathematics and Information Sciences, 14(6), 957\u2013966. https:\/\/doi.org\/10.18576\/amis\/140602","journal-title":"Applied Mathematics and Information Sciences"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03459-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03459-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03459-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T06:06:38Z","timestamp":1705644398000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03459-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,16]]},"references-count":64,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["3459"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03459-6","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,16]]},"assertion":[{"value":"16 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}