{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:07:37Z","timestamp":1771330057494,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s11704-023-2495-0","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T01:01:54Z","timestamp":1694566914000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Exploiting blockchain for dependable services in zero-trust vehicular networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Min","family":"Hao","sequence":"first","affiliation":[]},{"given":"Beihai","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Siming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ryan Wen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lisu","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"issue":"2","key":"2495_CR1","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1109\/JPROC.2019.2954595","volume":"108","author":"F Tang","year":"2020","unstructured":"Tang F, Kawamoto Y, Kato N, Liu J. Future intelligent and secure vehicular network toward 6g: machine-learning approaches. Proceedings of the IEEE, 2020, 108(2): 292\u2013307","journal-title":"Proceedings of the IEEE"},{"issue":"8","key":"2495_CR2","doi-asserted-by":"publisher","first-page":"5437","DOI":"10.1109\/TITS.2020.3038558","volume":"22","author":"X Han","year":"2021","unstructured":"Han X, Tian D, Sheng Z, Duan X, Zhou J, Hao W, Long K, Chen M, Leung V C M. Reliability-aware joint optimization for cooperative vehicular communication and computing. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(8): 5437\u20135446","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"2","key":"2495_CR3","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/JPROC.2019.2961937","volume":"108","author":"H Zhou","year":"2020","unstructured":"Zhou H, Xu W, Chen J, Wang W. Evolutionary V2X technologies toward the internet of vehicles: challenges and opportunities. Proceedings of the IEEE, 2020, 108(2): 308\u2013323","journal-title":"Proceedings of the IEEE"},{"issue":"7","key":"2495_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.23919\/JCC.2021.07.001","volume":"18","author":"X Duan","year":"2021","unstructured":"Duan X, Jiang H, Tian D, Zou T, Zhou J, Cao Y. V2I based environment perception for autonomous vehicles at intersections. China Communications, 2021, 18(7): 1\u201312","journal-title":"China Communications"},{"issue":"14","key":"2495_CR5","doi-asserted-by":"publisher","first-page":"12813","DOI":"10.1109\/JIOT.2021.3138557","volume":"9","author":"J Song","year":"2022","unstructured":"Song J, Harn P W, Sakai K, Sun M T, Ku W S. An RFID zero-knowledge authentication protocol based on quadratic residues. IEEE Internet of Things Journal, 2022, 9(14): 12813\u201312824","journal-title":"IEEE Internet of Things Journal"},{"issue":"9","key":"2495_CR6","doi-asserted-by":"publisher","first-page":"9355","DOI":"10.1109\/TVT.2021.3098170","volume":"70","author":"X Huang","year":"2021","unstructured":"Huang X, Li P, Yu R, Wu Y, Xie K, Xie S. FedParking: A federated learning based parking space estimation with parked vehicle assisted edge computing. IEEE Transactions on Vehicular Technology, 2021, 70(9): 9355\u20139368","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"2","key":"2495_CR7","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TNSM.2022.3157248","volume":"19","author":"Y Bello","year":"2022","unstructured":"Bello Y, Hussein A R, Ulema M, Koilpillai J. On sustained zero trust conceptualization security for mobile core networks in 5G and beyond. IEEE Transactions on Network and Service Management, 2022, 19(2): 1876\u20131889","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"9","key":"2495_CR8","first-page":"3004","volume":"44","author":"M Hao","year":"2022","unstructured":"Hao M, Ye D, Yu R, Wang J, Liao J. Blockchain empowered trustworthy access scheme for 6G zero-trust vehicular networks. Journal of Electronics & Information Technology, 2022, 44(9): 3004\u20133013","journal-title":"Journal of Electronics & Information Technology"},{"issue":"2","key":"2495_CR9","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1109\/TITS.2019.2899321","volume":"21","author":"A A Rasheed","year":"2020","unstructured":"Rasheed A A, Mahapatra R N, Hamza-Lup F G. Adaptive group-based zero knowledge proof-authentication protocol in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 2020, 21(2): 867\u2013881","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"3","key":"2495_CR10","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TETC.2021.3099701","volume":"10","author":"A A Rasheed","year":"2022","unstructured":"Rasheed A A, Mahapatra R N, Varol C, Narashimha K. Exploiting zero knowledge proof and blockchain towards the enforcement of anonymity, data integrity and privacy (ADIP) on IoT. IEEE Transactions on Emerging Topics in Computing, 2022, 10(3): 1476\u20131491","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"issue":"6","key":"2495_CR11","first-page":"13","volume":"58","author":"J Lu","year":"2021","unstructured":"Lu J, Aliaosha Y, Liu X, Dou J, Jiang H. Research on distributed energy metering data collection and security mechanism based on blockchain technology. Electrical Measurement & Instrumentation, 2021, 58(6): 13\u201320","journal-title":"Electrical Measurement & Instrumentation"},{"issue":"6","key":"2495_CR12","first-page":"21","volume":"58","author":"T Wang","year":"2021","unstructured":"Wang T, Guo J, Ming T, Yang X. Application of block chain technology in life cycle asset management. Electrical Measurement & Instrumentation, 2021, 58(6): 21\u201325","journal-title":"Electrical Measurement & Instrumentation"},{"key":"2495_CR13","doi-asserted-by":"crossref","unstructured":"Lin W, Zhang X, Cui Q, Zhang Z. Blockchain based unified authentication with zero-knowledge proof in heterogeneous MEC. In: Proceedings of 2021 IEEE International Conference on Communications Workshops (ICC Workshops). 2021, 1\u20136","DOI":"10.1109\/ICCWorkshops50388.2021.9473702"},{"key":"2495_CR14","doi-asserted-by":"publisher","first-page":"3888","DOI":"10.1109\/TIFS.2021.3098971","volume":"16","author":"X Feng","year":"2021","unstructured":"Feng X, Shi Q, Xie Q, Wang L. P2BA: A privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 2021, 16: 3888\u20133899","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"2495_CR15","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/3538381","volume":"22","author":"Z Xia","year":"2022","unstructured":"Xia Z, Zeng L, Gu K, Li X, Jia W. Conditional identity privacy-preserving authentication scheme based on cooperation of multiple fog servers under fog computing-based IoVs. ACM Transactions on Internet Technology, 2022, 22(4): 107","journal-title":"ACM Transactions on Internet Technology"},{"key":"2495_CR16","doi-asserted-by":"publisher","first-page":"101470","DOI":"10.1016\/j.phycom.2021.101470","volume":"49","author":"M Hao","year":"2021","unstructured":"Hao M, Ye D, Wang S, Tan B, Yu R. URLLC resource slicing and scheduling for trustworthy 6G vehicular services: A federated reinforcement learning approach. Physical Communication, 2021, 49: 101470","journal-title":"Physical Communication"},{"key":"2495_CR17","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207","volume-title":"Zero trust architecture","author":"S W Rose","year":"2020","unstructured":"Rose S W, Borchert O, Mitchell S, Connelly S. Zero trust architecture. Gaithersburg: National Institute of Standards and Technology, 2020"},{"key":"2495_CR18","doi-asserted-by":"publisher","first-page":"9947347","DOI":"10.1155\/2021\/9947347","volume":"2021","author":"S Teerakanok","year":"2021","unstructured":"Teerakanok S, Uehara T, Inomata A. Migrating to zero trust architecture: reviews and challenges. Security and Communication Networks, 2021, 2021: 9947347","journal-title":"Security and Communication Networks"},{"key":"2495_CR19","doi-asserted-by":"publisher","first-page":"102351","DOI":"10.1016\/j.cose.2021.102351","volume":"108","author":"S W Shah","year":"2021","unstructured":"Shah S W, Syed N F, Shaghaghi A, Anwar A, Baig Z, Doss R. LCDA: Lightweight continuous device-todevice authentication for a zero trust architecture (ZTA). Computers & Security, 2021, 108: 102351","journal-title":"Computers & Security"},{"issue":"2","key":"2495_CR20","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/TC.2022.3157996","volume":"72","author":"Y Liu","year":"2023","unstructured":"Liu Y, Hao X, Ren W, Xiong R, Zhu T, Choo K K R, Min G. A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things. IEEE Transactions on Computers, 2023, 72(2): 501\u2013512","journal-title":"IEEE Transactions on Computers"},{"issue":"11","key":"2495_CR21","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612\u2013613","journal-title":"Communications of the ACM"},{"issue":"3","key":"2495_CR22","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1287\/moor.2015.0762","volume":"41","author":"B Von Stengel","year":"2016","unstructured":"Von Stengel B. Recursive inspection games. Mathematics of Operations Research, 2016, 41(3): 935\u2013952","journal-title":"Mathematics of Operations Research"},{"key":"2495_CR23","doi-asserted-by":"publisher","unstructured":"Huang C, Wang W, Liu D, Lu R, Shen X. Blockchain-assisted personalized car insurance with privacy preservation and fraud resistance. IEEE Transactions on Vehicular Technology, 2022, doi: https:\/\/doi.org\/10.1109\/TVT.2022.3215811","DOI":"10.1109\/TVT.2022.3215811"},{"issue":"3","key":"2495_CR24","doi-asserted-by":"publisher","first-page":"2906","DOI":"10.1109\/TVT.2019.2894944","volume":"68","author":"J Kang","year":"2019","unstructured":"Kang J, Xiong Z, Niyato D, Ye D, Kim D I, Zhao J. Toward secure blockchain-enabled internet of vehicles: optimizing consensus management using reputation and contract theory. IEEE Transactions on Vehicular Technology, 2019, 68(3): 2906\u20132920","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"4","key":"2495_CR25","doi-asserted-by":"publisher","first-page":"3773","DOI":"10.1109\/TVT.2021.3064426","volume":"70","author":"X Huang","year":"2021","unstructured":"Huang X, Yu R, Ye D, Shu L, Xie S. Efficient workload allocation and user-centric utility maximization for task scheduling in collaborative vehicular edge computing. IEEE Transactions on Vehicular Technology, 2021, 70(4): 3773\u20133787","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"4","key":"2495_CR26","doi-asserted-by":"publisher","first-page":"1632","DOI":"10.1109\/TDSC.2019.2922958","volume":"18","author":"J Liang","year":"2021","unstructured":"Liang J, Qin Z, Xiao S, Ou L, Lin X. Efficient and secure decision tree classification for cloud-assisted online diagnosis services. IEEE Transactions on Dependable and Secure Computing, 2021, 18(4): 1632\u20131644","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"5","key":"2495_CR27","doi-asserted-by":"publisher","first-page":"3083","DOI":"10.1007\/s11276-019-02039-x","volume":"26","author":"M Bayat","year":"2020","unstructured":"Bayat M, Pournaghi M, Rahimi M, Barmshoory M. NERA: a new and efficient RSU based authentication scheme for VANETs. Wireless Networks, 2020, 26(5): 3083\u20133098","journal-title":"Wireless Networks"},{"key":"2495_CR28","doi-asserted-by":"publisher","first-page":"5896","DOI":"10.1109\/ACCESS.2016.2597169","volume":"4","author":"K Zhang","year":"2016","unstructured":"Zhang K, Mao Y, Leng S, Zhao Q, Li L, Peng X, Pan L, Maharjan S, Zhang Y. Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks. IEEE Access, 2016, 4: 5896\u20135907","journal-title":"IEEE Access"},{"issue":"5","key":"2495_CR29","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/LWC.2018.2820009","volume":"7","author":"X Liu","year":"2018","unstructured":"Liu X, Wang W, Niyato D, Zhao N, Wang P. Evolutionary game for mining pool selection in blockchain networks. IEEE Wireless Communications Letters, 2018, 7(5): 760\u2013763","journal-title":"IEEE Wireless Communications Letters"},{"issue":"9","key":"2495_CR30","doi-asserted-by":"publisher","first-page":"8322","DOI":"10.1109\/TVT.2019.2926732","volume":"68","author":"Z Zhou","year":"2019","unstructured":"Zhou Z, Liao H, Zhao X, Ai B, Guizani M. Reliable task offloading for vehicular fog computing under information asymmetry and information uncertainty. IEEE Transactions on Vehicular Technology, 2019, 68(9): 8322\u20138335","journal-title":"IEEE Transactions on Vehicular Technology"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-023-2495-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-023-2495-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-023-2495-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T01:04:19Z","timestamp":1694567059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-023-2495-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["2495"],"URL":"https:\/\/doi.org\/10.1007\/s11704-023-2495-0","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,13]]},"assertion":[{"value":"30 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"182805"}}