{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T03:04:23Z","timestamp":1763348663883,"version":"3.28.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s12083-024-01672-4","type":"journal-article","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T07:01:56Z","timestamp":1713423716000},"page":"2065-2089","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques"],"prefix":"10.1007","volume":"17","author":[{"given":"M. S.","family":"Minu","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"P. Jona Innisai","family":"Rani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Vijaya Krishna","family":"Sonthi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"G.","family":"Shankar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"E","family":"Mohan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"A.","family":"Rajesh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,4,18]]},"reference":[{"issue":"7","key":"1672_CR1","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun Y, Lu R, Lin X, Shen X, Su J (2010) An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications. IEEE Trans Veh Technol 59(7):3589\u20133603","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"1672_CR2","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1109\/TPDS.2014.2308215","volume":"26","author":"J Li","year":"2015","unstructured":"Li J, Lu H, Guizani M (2015) ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs. IEEE Trans Parallel Distrib Syst 26(4):938\u2013948","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"7","key":"1672_CR3","doi-asserted-by":"publisher","first-page":"9391","DOI":"10.1109\/TITS.2021.3117950","volume":"23","author":"H Cheng","year":"2022","unstructured":"Cheng H, Shojafar M, Alazab M, Tafazolli R, Liu Y (2022) PPVF: Privacy-Preserving Protocol for Vehicle Feedback in Cloud-Assisted VANET. IEEE Trans Intell Transp Syst 23(7):9391\u20139403","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1672_CR4","doi-asserted-by":"publisher","first-page":"102782","DOI":"10.1016\/j.adhoc.2022.102782","volume":"128","author":"S Goudarzi","year":"2022","unstructured":"Goudarzi S, Soleymani SA, Anisi MH, Azgomi MA, Movahedi Z, Kama N, Rusli HM, Khan MK (2022) A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Networks 128:102782","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"1672_CR5","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1109\/JSYST.2022.3180221","volume":"17","author":"Y Liang","year":"2023","unstructured":"Liang Y, Liu Y (2023) Analysis and Improvement of an Efficient Certificateless Aggregate Signature with Conditional Privacy Preservation in VANETs. IEEE Syst J 17(1):664\u2013672","journal-title":"IEEE Syst J"},{"issue":"4","key":"1672_CR6","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1109\/TVT.2015.2406877","volume":"66","author":"SF Tzeng","year":"2017","unstructured":"Tzeng SF, Horng SJ, Li T, Wang X, Huang PH, Khan MK (2017) Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs. IEEE Trans Veh Technol 66(4):3235\u20133248","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"1672_CR7","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TITS.2011.2164068","volume":"13","author":"R Lu","year":"2012","unstructured":"Lu R, Lin X, Liang X, Shen X (2012) A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs. IEEE Trans Intell Transp Syst 13(1):127\u2013139","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1672_CR8","doi-asserted-by":"publisher","first-page":"7770","DOI":"10.1109\/ACCESS.2016.2620999","volume":"4","author":"U Rajput","year":"2016","unstructured":"Rajput U, Abbas F, Oh H (2016) A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET. IEEE Access 4:7770\u20137784","journal-title":"IEEE Access"},{"issue":"5","key":"1672_CR9","doi-asserted-by":"publisher","first-page":"3491","DOI":"10.1109\/JIOT.2018.2797206","volume":"5","author":"J Cui","year":"2018","unstructured":"Cui J, Wen J, Han S, Zhong H (2018) Efficient Privacy-Preserving Scheme for Real-Time Location Data in Vehicular Ad-Hoc Network. IEEE Internet Things J 5(5):3491\u20133498","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"1672_CR10","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1109\/TVT.2015.2402166","volume":"65","author":"F Wang","year":"2016","unstructured":"Wang F, Xu Y, Zhang H, Zhang Y, Zhu L (2016) 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET. IEEE Trans Veh Technol 65(2):896\u2013911","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"1672_CR11","doi-asserted-by":"publisher","first-page":"2629","DOI":"10.1109\/TITS.2017.2653103","volume":"18","author":"Y Xia","year":"2017","unstructured":"Xia Y, Chen W, Liu X, Zhang L, Li X, Xiang Y (2017) Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks. IEEE Trans Intell Transp Syst 18(10):2629\u20132641","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"9","key":"1672_CR12","doi-asserted-by":"publisher","first-page":"8647","DOI":"10.1109\/TVT.2018.2839979","volume":"67","author":"S Tangade","year":"2018","unstructured":"Tangade S, Manvi SS, Lorenz P (2018) Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs. IEEE Trans Veh Technol 67(9):8647\u20138655","journal-title":"IEEE Trans Veh Technol"},{"issue":"18","key":"1672_CR13","doi-asserted-by":"publisher","first-page":"20998","DOI":"10.1109\/JSEN.2021.3097172","volume":"21","author":"T Nandy","year":"2021","unstructured":"Nandy T, Idris MYI, Md Noor R, Wahab AWA, Bhattacharyy S (2021) A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs. IEEE Sensors Journal 21(18):20998\u201321011","journal-title":"IEEE Sensors Journal"},{"issue":"1","key":"1672_CR14","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1109\/TVT.2019.2946935","volume":"69","author":"J Shen","year":"2020","unstructured":"Shen J, Liu D, Chen X, Li J, Kumar N, Vijayakumar P (2020) Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs. IEEE Trans Veh Technol 69(1):807\u2013817","journal-title":"IEEE Trans Veh Technol"},{"key":"1672_CR15","doi-asserted-by":"publisher","first-page":"100370","DOI":"10.1016\/j.vehcom.2021.100370","volume":"31","author":"MLM Peixoto","year":"2021","unstructured":"Peixoto MLM, Maia AHO, Mota E, Rangel E, Costa DG, Turgut D, Villas LA (2021) \"A traffic data clustering framework based on fog computing for VANETs. Vehicular Communications 31:100370","journal-title":"Vehicular Communications"},{"issue":"4","key":"1672_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-023-00662-6","volume":"22","author":"R Al-Ani","year":"2023","unstructured":"Al-Ani R, Baker T, Zhou B, Shi Q (2023) Privacy and safety improvement of VANET data via a safety-related privacy scheme. Int J Inf Secur 22(4):1\u201321","journal-title":"Int J Inf Secur"},{"key":"1672_CR17","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.pmcj.2015.07.007","volume":"24","author":"R Hussain","year":"2015","unstructured":"Hussain R, Rezaeifar Z, Lee Y-H, Oh H (2015) \"Secure and privacy-aware traffic information as a service in VANET-based clouds. Pervasive and Mobile Computing 24:194\u2013209","journal-title":"Pervasive and Mobile Computing"},{"key":"1672_CR18","doi-asserted-by":"publisher","first-page":"100335","DOI":"10.1016\/j.vehcom.2021.100335","volume":"29","author":"SA Soleymani","year":"2021","unstructured":"Soleymani SA, Goudarzi S, Mohammad HA, Mahdi Z, Abdul HA, Kama N (2021) A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET. Vehicular Communications 29:100335","journal-title":"Vehicular Communications"},{"key":"1672_CR19","doi-asserted-by":"publisher","first-page":"117716","DOI":"10.1109\/ACCESS.2019.2936575","volume":"7","author":"D Zheng","year":"2019","unstructured":"Zheng D, Jing C, Guo R, Gao S, Wang L (2019) A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs. IEEE Access 7:117716\u2013117726","journal-title":"IEEE Access"},{"key":"1672_CR20","first-page":"5","volume":"65","author":"S Biswas","year":"2015","unstructured":"Biswas S, Misic J (2015) \"A Cross-Layer Approach to Privacy-Preserving Authentication in Wave-Enabled VANETs. IEEE Trans Vehicular Technol 65:5","journal-title":"IEEE Trans Vehicular Technol"},{"key":"1672_CR21","doi-asserted-by":"publisher","first-page":"24012","DOI":"10.1109\/ACCESS.2017.2768499","volume":"5","author":"C Sun","year":"2017","unstructured":"Sun C, Liu J, Xu X, Ma J (2017) A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs. IEEE Access 5:24012\u201324022","journal-title":"IEEE Access"},{"key":"1672_CR22","doi-asserted-by":"publisher","first-page":"87299","DOI":"10.1109\/ACCESS.2021.3086225","volume":"9","author":"A Alharthi","year":"2021","unstructured":"Alharthi A, Ni Q, Jiang R (2021) A Privacy-Preservation Framework Based on Biometrics Blockchain (BBC) to Prevent Attacks in VANET. IEEE Access 9:87299\u201387309","journal-title":"IEEE Access"},{"key":"1672_CR23","doi-asserted-by":"publisher","first-page":"102158","DOI":"10.1016\/j.sysarc.2021.102158","volume":"117","author":"X Feng","year":"2021","unstructured":"Feng X, Shi Q, Xie Q, Liu L (2021) An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs. J Systems Architecture 117:102158","journal-title":"J Systems Architecture"},{"key":"1672_CR24","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/s00607-014-0393-x","volume":"98","author":"M Wang","year":"2016","unstructured":"Wang M, Liu D, Zhu L, Yongjun X, Wang F (2016) \"LESPP: lightWeight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98:685\u2013708","journal-title":"Computing"},{"key":"1672_CR25","doi-asserted-by":"publisher","first-page":"100330","DOI":"10.1016\/j.iot.2020.100350","volume":"13","author":"SS Moni","year":"2021","unstructured":"Moni SS, Manivannan D (2021) \"A scalable and distributed architecture for secure and privacy-preserving authentication and message dissemination in VANETs. Internet of Things 13:100330","journal-title":"Internet of Things"},{"key":"1672_CR26","doi-asserted-by":"publisher","first-page":"19836","DOI":"10.1109\/ACCESS.2022.3149376","volume":"10","author":"M Tanveer","year":"2022","unstructured":"Tanveer M, Alkhayyat A, Naushad A, Khan AU, Kumar N, Alharbi AG (2022) RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones. IEEE Access 10:19836\u201319851","journal-title":"IEEE Access"},{"key":"1672_CR27","unstructured":"Tanveer M, Alasmary H, Kumar N, Nayak A (2023) SAAF-IoD: Secure and Anonymous Authentication Framework for the Internet of Drones. IEEE Trans Veh Technol (Early Access) 1\u201313"},{"key":"1672_CR28","first-page":"1","volume":"99","author":"M Tanveer","year":"2022","unstructured":"Tanveer M, Khan AU, Kumar N, Hassan MM (2022) RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones. IEEE Internet Things J 99:1\u20131","journal-title":"IEEE Internet Things J"},{"key":"1672_CR29","doi-asserted-by":"publisher","first-page":"100265","DOI":"10.1016\/j.vehcom.2020.100265","volume":"26","author":"M Arif","year":"2020","unstructured":"Arif M, Wang G, Balas VE, Geman O, Castiglione A, Chen J (2020) SDN based communications privacy-preserving architecture for VANETs using fog computing. Vehicular Communications 26:100265","journal-title":"Vehicular Communications"},{"key":"1672_CR30","first-page":"1079","volume":"14","author":"S Bodenstedt","year":"2019","unstructured":"Bodenstedt S, Rivoir D, Jenke A, Wagner M, Breucha M, M\u00fcller-Stich B, Mees ST, Weitz J, Speidel S (2019) Active learning using deep Bayesian networks for surgical workflow analysis. Computer Vision and Pattern Recognition 14:1079\u20131087","journal-title":"Computer Vision and Pattern Recognition"},{"issue":"1","key":"1672_CR31","first-page":"1","volume":"56","author":"M Azizi","year":"2022","unstructured":"Azizi M, Talatahari S, Gandomi AH (2022) Fire hawk optimizer: a novel metaheuristic algorithm. Artif Intell Rev 56(1):1\u201377","journal-title":"Artif Intell Rev"},{"key":"1672_CR32","doi-asserted-by":"crossref","unstructured":"Kaur S, Awasthi LK, Sangal AL, Dhiman G (2020) Tunicate swarm algorithm: a new bio-inspired based metaheuristic paradigm for global optimization. Eng Appl Artificial Intel 90","DOI":"10.1016\/j.engappai.2020.103541"},{"key":"1672_CR33","doi-asserted-by":"crossref","unstructured":"Jason Hinek M, Jiang S, Safavi-Naini R, Shahandashti Siamak F (2012) Attribute-based encryption without key cloning. Int J Appl Cryptography 2(3)","DOI":"10.1504\/IJACT.2012.045587"},{"key":"1672_CR34","doi-asserted-by":"crossref","unstructured":"Tezcan C (2021) Optimization of advanced encryption standard on graphics processing units 9: 67315\u201367326","DOI":"10.1109\/ACCESS.2021.3077551"},{"key":"1672_CR35","doi-asserted-by":"crossref","unstructured":"De Vita F, Bruneo D (2019) On the use of LSTM networks for Predictive Maintenance in Smart Industries 241\u2013248","DOI":"10.1109\/SMARTCOMP.2019.00059"},{"key":"1672_CR36","doi-asserted-by":"publisher","first-page":"132306","DOI":"10.1016\/j.physd.2019.132306","volume":"404","author":"A Sherstinsky","year":"2020","unstructured":"Sherstinsky A (2020) Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) network. Physica D 404:132306","journal-title":"Physica D"},{"key":"1672_CR37","doi-asserted-by":"crossref","unstructured":"Kumar V, Arora H, Sisodia J (2020) ResNet-based approach for detection and classification of plant leaf diseases 495\u2013502","DOI":"10.1109\/ICESC48915.2020.9155585"},{"key":"1672_CR38","doi-asserted-by":"crossref","unstructured":"Umucu EH (2022) Elliptic curve cryptography in blockchain technology, FINRA","DOI":"10.2139\/ssrn.4033934"},{"key":"1672_CR39","doi-asserted-by":"publisher","first-page":"109215","DOI":"10.1016\/j.knosys.2022.109215","volume":"251","author":"C Zhong","year":"2022","unstructured":"Zhong C, Li G, Meng Z (2022) Beluga whale optimization: a novel nature-inspired metaheuristic algorithm. Knowl-Based Syst 251:109215","journal-title":"Knowl-Based Syst"},{"key":"1672_CR40","doi-asserted-by":"crossref","unstructured":"Giernacki W, Espinoza Fraire T, Kozierski P (2017) Cuttlefish optimization algorithm in autotuning of altitude controller of Unmanned Aerial Vehicle (UAV)","DOI":"10.1007\/978-3-319-70833-1_68"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01672-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01672-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01672-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T13:41:34Z","timestamp":1731764494000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01672-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["1672"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01672-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,4,18]]},"assertion":[{"value":"11 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}