{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:55:39Z","timestamp":1762624539846,"version":"3.37.3"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61872059","No. 61502085"],"award-info":[{"award-number":["No. 61872059","No. 61502085"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s12083-020-01034-w","type":"journal-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T21:13:31Z","timestamp":1610054011000},"page":"1388-1400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A location privacy protection scheme for convoy driving in autonomous driving era"],"prefix":"10.1007","volume":"14","author":[{"given":"Xin","family":"Ye","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5194-9756","authenticated-orcid":false,"given":"Jin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yuedi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mingsheng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Dajiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhiguang","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,7]]},"reference":[{"key":"1034_CR1","unstructured":"Davies A (2018) The wired guide to self-driving cars. Wired, 1\u201313"},{"key":"1034_CR2","unstructured":"Mohamad N M V, Ambastha P, Gautam S, Jain R, Subramaniyam H, Muthukaruppan L (2020) Dynamic Sectorization and parallel processing for device-to-device (D2D) resource allocation in 5G and B5G cellular network. Peer-to-Peer Networking and Applications, 1\u20139"},{"issue":"3","key":"1034_CR3","doi-asserted-by":"publisher","first-page":"5520","DOI":"10.1109\/JIOT.2019.2903245","volume":"6","author":"L Ale","year":"2019","unstructured":"Ale L, Zhang N, Wu H, Chen D, Han T (2019) Online proactive caching in mobile edge computing using bidirectional deep recurrent neural network. IEEE Internet of Things Journal 6(3):5520\u20135530","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"1034_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MNET.2017.1600248","volume":"31","author":"N Zhang","year":"2017","unstructured":"Zhang N, Yang P, Zhang S, Chen D, Zhuang W, Liang B, Shen X S (2017) Software defined networking enabled wireless network virtualization: Challenges and solutions. IEEE Netw 31(5):42\u201349","journal-title":"IEEE Netw"},{"issue":"2","key":"1034_CR5","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/JAS.2020.1003021","volume":"7","author":"Y Ma","year":"2020","unstructured":"Ma Y, Wang Z, Yang H (2020) Artificial intelligence applications in the development of autonomous vehicles: A survey[J]. IEEE\/CAA Journal of Automatica Sinica 7(2):315\u2013329","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"1","key":"1034_CR6","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/JAS.2019.1911825","volume":"7","author":"P Kebria","year":"2019","unstructured":"Kebria P, Khosravi A, Salaken S (2019) Deep imitation learning for autonomous vehicles based on convolutional neural networks[J]. IEEE\/CAA Journal of Automatica Sinica 7(1):82\u201395","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"2","key":"1034_CR7","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/TNNLS.2018.2846646","volume":"30","author":"S Gao","year":"2018","unstructured":"Gao S, Zhou M, Wang Y (2018) Dendritic neuron model with effective learning algorithms for classification, approximation, and prediction[J]. IEEE Trans Neural Netw Learning Sys 30(2):601\u2013614","journal-title":"IEEE Trans Neural Netw Learning Sys"},{"issue":"12","key":"1034_CR8","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2015.7355568","volume":"53","author":"L Hobert","year":"2015","unstructured":"Hobert L, Festag A, Llatser I, Altomare L, Visintainer F, Kovacs A (2015) Enhancements of V2X communication in support of cooperative autonomous driving. IEEE Commun Mag 53(12):64\u201370","journal-title":"IEEE Commun Mag"},{"key":"1034_CR9","unstructured":"Calmettes T, Michel M, Damien S (2017) Driving vehicles in convoy. U.S. Patent No. 9,786,182. 10 Oct. 2017"},{"key":"1034_CR10","unstructured":"Khan MA, Boloni L (2005) Convoy driving through ad-hoc coalition formation. In: 11th IEEE real time and embedded technology and applications symposium, pp 98\u2013105"},{"key":"1034_CR11","doi-asserted-by":"crossref","unstructured":"Llatser I, Jornod G, Festag A, Mansolino D, Navarro I, Martinoli A (2017) Simulation of cooperative automated driving by bidirectional coupling of vehicle and network simulators. In: 2017 IEEE Intelligent Vehicles Symposium (IV), pp 1881\u20131886","DOI":"10.1109\/IVS.2017.7995979"},{"issue":"1","key":"1034_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MWC.2018.1700193","volume":"25","author":"N Zhang","year":"2018","unstructured":"Zhang N, Yang P, Ren J, Chen D, Yu L, Shen X S (2018) Synergy of big data and 5g wireless networks: Opportunities, approaches, and challenges. IEEE Wirel Commun 25(1):12\u201318","journal-title":"IEEE Wirel Commun"},{"issue":"11","key":"1034_CR13","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.1109\/JSAC.2013.131130","volume":"31","author":"N Zhang","year":"2013","unstructured":"Zhang N, Lu N, Cheng N, Mark J W, Shen X S (2013) Cooperative spectrum access towards secure information transfer for CRNs. IEEE J Sel Areas Commun 31(11):2453\u20132464","journal-title":"IEEE J Sel Areas Commun"},{"key":"1034_CR14","unstructured":"Green D, Karl C, Faber F (2015) Cooperative intelligent transport systems (C-ITS) standards assessment, No. AP-R474\/15"},{"key":"1034_CR15","doi-asserted-by":"crossref","unstructured":"Marjovi A, Vasic M, Lemaitre J, Martinoli A (2015) Distributed graph-based convoy control for networked intelligent vehicles. In: 2015 IEEE Intelligent Vehicles Symposium (IV), pp 138\u2013143","DOI":"10.1109\/IVS.2015.7225676"},{"issue":"7","key":"1034_CR16","doi-asserted-by":"publisher","first-page":"1272","DOI":"10.1177\/0018720814524594","volume":"56","author":"EM Skottke","year":"2014","unstructured":"Skottke E M, Debus G, Wang L, Huestegge L (2014) Carryover effects of highly automated convoy driving on subsequent manual driving performance. Human Factors 56(7):1272\u20131283","journal-title":"Human Factors"},{"issue":"5","key":"1034_CR17","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1007\/s12083-019-00786-4","volume":"12","author":"H Li","year":"2019","unstructured":"Li H, Pei L, Liao D, Sun G, Xu D (2019) Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer Peer Netw Appl 12(5):1178\u20131193","journal-title":"Peer Peer Netw Appl"},{"key":"1034_CR18","doi-asserted-by":"publisher","unstructured":"Chen D, Zhang N, Cheng N, Zhang K, Qin Z, Shen XS (2018) Physical layer based message authentication with secure channel codes. IEEE Transactions on dependable and secure computing. https:\/\/doi.org\/10.1109\/TDSC.2018.2846258","DOI":"10.1109\/TDSC.2018.2846258"},{"issue":"6","key":"1034_CR19","doi-asserted-by":"publisher","first-page":"5260","DOI":"10.1109\/TVT.2019.2909468","volume":"68","author":"M Hadian","year":"2019","unstructured":"Hadian M, Altuwaiyan T, Liang X, Zhu H (2019) Privacy-preserving task scheduling for time-sharing services of autonomous vehicles. IEEE Trans Veh Technol 68(6):5260\u20135270","journal-title":"IEEE Trans Veh Technol"},{"issue":"11","key":"1034_CR20","doi-asserted-by":"publisher","first-page":"2898","DOI":"10.1109\/TITS.2017.2665968","volume":"18","author":"S Parkinson","year":"2017","unstructured":"Parkinson S, Ward P, Wilson K, Miller J (2017) Cyber threats facing autonomous and connected vehicles: Future challenges. IEEE Trans Intell Transpo Syst 18(11):2898\u20132915","journal-title":"IEEE Trans Intell Transpo Syst"},{"issue":"3","key":"1034_CR21","doi-asserted-by":"publisher","first-page":"4472","DOI":"10.1109\/JIOT.2018.2876419","volume":"6","author":"L Zhou","year":"2018","unstructured":"Zhou L, Yu L, Du S, Zhu H, Chen C (2018) Achieving differentially private location privacy in edge-assistant connected vehicles. IEEE Internet of Things Journal 6(3):4472\u20134481","journal-title":"IEEE Internet of Things Journal"},{"key":"1034_CR22","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.ins.2019.07.034","volume":"504","author":"E Deng","year":"2019","unstructured":"Deng E, Zhang H, Wu P, Guo F, Liu Z, Zhu H, Cao Z (2019) Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing. Information Sciences 504:354\u2013371","journal-title":"Information Sciences"},{"key":"1034_CR23","doi-asserted-by":"crossref","unstructured":"Ardagna C, Cremonini M, Damiani E (2007) Location privacy protection through obfuscation-based techniques[C]. In: IFIP Annual conference on data and applications security and privacy. Springer, Heidelberg, pp 47\u201360","DOI":"10.1007\/978-3-540-73538-0_4"},{"key":"1034_CR24","doi-asserted-by":"crossref","unstructured":"Xu T, Cai Y (2009) Feeling-based location privacy protection for location-based services[C]. Proceedings of the 16th ACM conference on computer and communications security, pp 348\u2013357","DOI":"10.1145\/1653662.1653704"},{"key":"1034_CR25","unstructured":"Miyazawa M, Tanabe H, Yamane M, Sen N, Yashima J, Nakahama H, Ishiyama M, Hiroma T (2019) Convoy travel control apparatus. U.S. Patent 10,262,541[P]. 2019-4-16"},{"issue":"1","key":"1034_CR26","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/MNET.2018.1700392","volume":"33","author":"D Chen","year":"2018","unstructured":"Chen D, Zhang N, Lu R, Cheng N, Zhang K, Qin Z (2018) Channel precoding based message authentication in wireless networks: Challenges and solutions. IEEE Netw 33(1):99\u2013105","journal-title":"IEEE Netw"},{"issue":"4","key":"1034_CR27","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1109\/JSAC.2018.2825079","volume":"36","author":"D Chen","year":"2018","unstructured":"Chen D, Zhang N, Lu R, Fang X, Zhang K, Qin Z, Shen X (2018) An LDPC code based physical layer message authentication scheme with prefect security. IEEE J Sel Areas Commun 36(4):748\u2013761","journal-title":"IEEE J Sel Areas Commun"},{"issue":"5","key":"1034_CR28","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s12083-017-0626-9","volume":"11","author":"R Mo","year":"2018","unstructured":"Mo R, Ma J, Liu X, Liu H (2018) EOABS: Expressive outsourced attribute-based signature. Peer Peer Netw Appl 11(5):979\u2013988","journal-title":"Peer Peer Netw Appl"},{"issue":"1","key":"1034_CR29","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s12083-017-0627-8","volume":"12","author":"A Adavoudi-Jolfaei","year":"2019","unstructured":"Adavoudi-Jolfaei A, Ashouri-Talouki M, Aghili S F (2019) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer Peer Netw Appl 12(1):43\u201359","journal-title":"Peer Peer Netw Appl"},{"issue":"1","key":"1034_CR30","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JIOT.2016.2619679","volume":"4","author":"D Chen","year":"2016","unstructured":"Chen D, Zhang N, Qin Z, Mao X, Qin Z, Shen X, Li X Y (2016) S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet of Things Journal 4(1):88\u2013100","journal-title":"IEEE Internet of Things Journal"},{"key":"1034_CR31","doi-asserted-by":"crossref","unstructured":"Teramoto T, Matsuura S, Kakiuchi M, Inomata A, Fujikawa K (2013) Location tracking prevention with dummy messages for vehicular communications. In: 2013 13th International Conference on ITS Telecommunications (ITST), pp 56\u201361","DOI":"10.1109\/ITST.2013.6685521"},{"issue":"8","key":"1034_CR32","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1109\/TKDE.2011.105","volume":"24","author":"X Pan","year":"2011","unstructured":"Pan X, Xu J, Meng X (2011) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506\u20131519","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1034_CR33","doi-asserted-by":"crossref","unstructured":"Palanisamy B, Liu L (2011) Mobimix: Protecting location privacy with mix-zones over road networks. In: 2011 IEEE 27th International conference on data engineering, pp 494\u2013505","DOI":"10.1109\/ICDE.2011.5767898"},{"key":"1034_CR34","unstructured":"Huang L, Matsuura K, Yamane H, Sezaki K (2005) Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference, vol 2, pp 1187\u20131192"},{"key":"1034_CR35","doi-asserted-by":"crossref","unstructured":"Buttyn L, Holczer T, Weimerskirch A, Whyte W (2009) Slow: A practical pseudonym changing scheme for location privacy in vanets. In: 2009 IEEE Vehicular Networking Conference (VNC), pp 1\u20138","DOI":"10.1109\/VNC.2009.5416380"},{"issue":"1","key":"1034_CR36","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/s11036-009-0167-4","volume":"15","author":"J-H Song","year":"2010","unstructured":"Song J-H, Wong VWS, Leung VCM (2010) Wireless location privacy protection in vehicular ad-hoc networks. Mob Netw Appl 15(1):160\u2013171","journal-title":"Mob Netw Appl"},{"issue":"12","key":"1034_CR37","doi-asserted-by":"publisher","first-page":"5631","DOI":"10.1109\/TVT.2015.2487262","volume":"64","author":"B Ying","year":"2015","unstructured":"Ying B, Makrakis D, Hou Z (2015) Motivation for protecting selfish vehicles\u2019 location privacy in vehicular networks. IEEE Trans Veh Technol 64(12):5631\u20135641","journal-title":"IEEE Trans Veh Technol"},{"key":"1034_CR38","unstructured":"Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2005) CARAVAN: Providing location privacy for VANET. Washington Univ Seattle Dept of Electrical Engineering"},{"issue":"5","key":"1034_CR39","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MWC.2016.7721742","volume":"23","author":"J Kang","year":"2016","unstructured":"Kang J, Yu R, Huang X (2016) Location privacy attacks and defenses in cloud-enabled internet of vehicles[J]. IEEE Wirel Commun 23(5):52\u201359","journal-title":"IEEE Wirel Commun"},{"issue":"1","key":"1034_CR40","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/COMST.2014.2345420","volume":"17","author":"J Petit","year":"2017","unstructured":"Petit J, Schaub F, Feiri M (2017) Pseudonym schemes in vehicular networks: A survey[J]. IEEE Commun Surv Tutor 17(1):228\u2013255","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"1034_CR41","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/TDSC.2009.38","volume":"8","author":"PP Tsang","year":"2009","unstructured":"Tsang P P, Kapadia A, Cornelius C, Smith S W (2009) Nymble: Blocking misbehaving users in anonymizing networks. IEEE Trans Dependable Secure Comput 8(2):256\u2013269","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1034_CR42","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1353-4858(10)70006-4","volume":"12","author":"S Heron","year":"2009","unstructured":"Heron S (2009) Advanced encryption standard (AES). Netw Secur 12:8\u201312","journal-title":"Netw Secur"},{"issue":"12","key":"1034_CR43","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He D, Zeadally S, Xu B (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. IEEE Trans Info Forensics Sec 10(12):2681\u20132691","journal-title":"IEEE Trans Info Forensics Sec"},{"key":"1034_CR44","doi-asserted-by":"crossref","unstructured":"Bai L, Zhang Y, Yang G (2012) SM2 cryptographic algorithm based on discrete logarithm problem and prospect[C]. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, pp 1294\u20131297","DOI":"10.1109\/CECNet.2012.6201878"},{"issue":"9","key":"1034_CR45","doi-asserted-by":"publisher","first-page":"4565","DOI":"10.1109\/TVT.2013.2266347","volume":"62","author":"S Du","year":"2013","unstructured":"Du S, Zhu H, Li X, Ota K, Dong M (2013) Mixzone in motion: Achieving dynamically cooperative location privacy protection in delay-tolerant networks. EEE Trans Veh Technol 62(9):4565\u20134575","journal-title":"EEE Trans Veh Technol"},{"key":"1034_CR46","unstructured":"Brinkhoff T, Thomas B (2012) Network-based generator of moving objects. Available:http:\/\/iapg.jade-hs.de\/personen\/brinkhoff\/generator. Accessed 12 July 2012"},{"issue":"2","key":"1034_CR47","first-page":"95","volume":"1","author":"D Pigatto","year":"2011","unstructured":"Pigatto D, da Silva N, Branco K (2011) Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries[J]. J Appl Comput Res 1 (2):95\u2013103","journal-title":"J Appl Comput Res"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-01034-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-01034-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-01034-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T12:25:06Z","timestamp":1618403106000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-01034-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,7]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["1034"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-01034-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2021,1,7]]},"assertion":[{"value":"2 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}