{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:44:27Z","timestamp":1774539867608,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T00:00:00Z","timestamp":1733529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T00:00:00Z","timestamp":1733529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004543","name":"Program of China Scholarship Council","doi-asserted-by":"crossref","award":["202306960051"],"award-info":[{"award-number":["202306960051"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["No. YJSJ24010"],"award-info":[{"award-number":["No. YJSJ24010"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["62171352"],"award-info":[{"award-number":["62171352"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01833-5","type":"journal-article","created":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T03:18:56Z","timestamp":1733541536000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A secure and lightweight data sharing scheme in vehicular digital twin network"],"prefix":"10.1007","volume":"18","author":[{"given":"Guanjie","family":"Li","sequence":"first","affiliation":[]},{"given":"Tom H.","family":"Luan","sequence":"additional","affiliation":[]},{"given":"Jinkai","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Dihao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Cao","sequence":"additional","affiliation":[]},{"given":"YaLun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,7]]},"reference":[{"key":"1833_CR1","doi-asserted-by":"crossref","unstructured":"Wang X, Zhu H, Ning Z, Guo L, Zhang Y (2023) Blockchain intelligence for internet of vehicles: Challenges and solutions. IEEE Communications Surveys & Tutorials","DOI":"10.1109\/COMST.2023.3305312"},{"issue":"1","key":"1833_CR2","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MVT.2022.3227723","volume":"18","author":"W Xu","year":"2023","unstructured":"Xu W, Zhang Y, Wang F, Qin Z, Liu C, Zhang P (2023) Semantic communication for the internet of vehicles: A multiuser cooperative approach. IEEE Veh Technol Mag 18(1):100\u2013109","journal-title":"IEEE Veh Technol Mag"},{"issue":"2","key":"1833_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MNET.001.1900220","volume":"34","author":"C Lai","year":"2020","unstructured":"Lai C, Lu R, Zheng D, Shen X (2020) Security and privacy challenges in 5g-enabled vehicular networks. IEEE Netw 34(2):37\u201345","journal-title":"IEEE Netw"},{"issue":"11","key":"1833_CR4","doi-asserted-by":"publisher","first-page":"8291","DOI":"10.1109\/JIOT.2022.3159591","volume":"9","author":"K Sehla","year":"2022","unstructured":"Sehla K, Nguyen TMT, Pujolle G, Velloso PB (2022) Resource allocation modes in c-v2x: from lte-v2x to 5g\u2013v2x. IEEE Internet of Things Journal 9(11):8291\u20138314","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"1833_CR5","doi-asserted-by":"publisher","first-page":"2811","DOI":"10.1109\/TII.2021.3083596","volume":"18","author":"C Hu","year":"2021","unstructured":"Hu C, Fan W, Zeng E, Hang Z, Wang F, Qi L, Bhuiyan MZA (2021) Digital twin-assisted real-time traffic data prediction method for 5g-enabled internet of vehicles. IEEE Trans Ind Inf 18(4):2811\u20132819","journal-title":"IEEE Trans Ind Inf"},{"key":"1833_CR6","doi-asserted-by":"crossref","unstructured":"Niaz A, Shoukat MU, Jia Y, Khan S, Niaz F, Raza MU (2021) Autonomous driving test method based on digital twin: A survey. In: 2021 International conference on computing, electronic and electrical engineering (ICE Cube), pp 1\u20137. IEEE","DOI":"10.1109\/ICECube53880.2021.9628341"},{"key":"1833_CR7","doi-asserted-by":"crossref","unstructured":"Zheng J, Zhang Y, Luan TH, Mu PK, Li G, Dong M, Wu Y (2023) Digital twin enabled task offloading for iovs: A learning-based approach. IEEE Transactions on Network Science and Engineering","DOI":"10.1109\/TNSE.2023.3303461"},{"key":"1833_CR8","doi-asserted-by":"crossref","unstructured":"Cai G, Fan B, Dong Y, Li T, Wu Y, Zhang Y (2023) Task-efficiency oriented v2x communications: Digital twin meets mobile edge computing. IEEE Wireless Communications","DOI":"10.1109\/MWC.012.2200465"},{"issue":"3","key":"1833_CR9","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/COMST.2022.3171465","volume":"24","author":"C Alcaraz","year":"2022","unstructured":"Alcaraz C, Lopez J (2022) Digital twin: A comprehensive survey of security threats. IEEE Communications Surveys & Tutorials 24(3):1475\u20131503","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"7","key":"1833_CR10","doi-asserted-by":"publisher","first-page":"8857","DOI":"10.1109\/TITS.2021.3086976","volume":"23","author":"J Cui","year":"2021","unstructured":"Cui J, Ouyang F, Ying Z, Wei L, Zhong H (2021) Secure and efficient data sharing among vehicles based on consortium blockchain. IEEE Trans Intell Trans Syst 23(7):8857\u20138867","journal-title":"IEEE Trans Intell Trans Syst"},{"key":"1833_CR11","doi-asserted-by":"crossref","unstructured":"Lai C, Li M, Li G, Zheng D (2023) Efficient group authentication and key agreement scheme for vehicular digital twin. In: 2023 IEEE\/CIC international conference on communications in china (ICCC), pp. 1\u20136. IEEE","DOI":"10.1109\/ICCC57788.2023.10233652"},{"key":"1833_CR12","doi-asserted-by":"crossref","unstructured":"Li G, Luan TH, Zheng J, Hu D, Lai C, Su Z, Peng H (2023) Digital twin-enabled secure charging reservation for electric vehicle. In: 2023 IEEE\/CIC international conference on communications in china (ICCC), pp 1\u20136. IEEE","DOI":"10.1109\/ICCC57788.2023.10233485"},{"key":"1833_CR13","doi-asserted-by":"crossref","unstructured":"Tan C, Li X, Gao L, Luan TH, Qu Y, Xiang Y, Lu R (2023) Digital twin enabled remote data sharing for internet of vehicles: System and incentive design. IEEE Transactions on Vehicular Technology","DOI":"10.1109\/TVT.2023.3275591"},{"key":"1833_CR14","doi-asserted-by":"crossref","unstructured":"Wang C, Ming Y, Liu H, Feng J, Zhang N (2024) Secure and flexible data sharing with dual privacy protection in vehicular digital twin networks. IEEE Transactions on Intelligent Transportation Systems","DOI":"10.1109\/TITS.2024.3368342"},{"issue":"5","key":"1833_CR15","doi-asserted-by":"publisher","first-page":"4535","DOI":"10.1109\/TVT.2021.3133308","volume":"71","author":"G Li","year":"2021","unstructured":"Li G, Lai C, Lu R, Zheng D (2021) Seccdv: A security reference architecture for cybertwin-driven 6g v2x. IEEE Trans Veh Technol 71(5):4535\u20134550","journal-title":"IEEE Trans Veh Technol"},{"key":"1833_CR16","doi-asserted-by":"crossref","unstructured":"He C, Luan TH, Lu R, Su Z, Dong M (2022) Security and privacy in vehicular digital twin networks: Challenges and solutions. IEEE Wireless Communications","DOI":"10.1109\/MWC.002.2200015"},{"key":"1833_CR17","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TIFS.2022.3144869","volume":"17","author":"T Li","year":"2022","unstructured":"Li T, Wang H, He D, Yu J (2022) Synchronized provable data possession based on blockchain for digital twin. IEEE Trans Inf Forensics Secur 17:472\u2013485","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1833_CR18","doi-asserted-by":"crossref","unstructured":"Okegbile SD, Cai J, Chen J, Yi C (2024) A reputation-enhanced shard-based byzantine fault-tolerant scheme for secure data sharing in zero trust human digital twin systems. IEEE Internet of Things Journal","DOI":"10.36227\/techrxiv.23511708.v2"},{"key":"1833_CR19","doi-asserted-by":"crossref","unstructured":"Dietz M, Putz B, Pernul G (2019) A distributed ledger approach to digital twin secure data sharing. In: Data and applications security and privacy XXXIII: 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15\u201317, 2019, Proceedings 33, pp 281\u2013300. Springer","DOI":"10.1007\/978-3-030-22479-0_15"},{"key":"1833_CR20","doi-asserted-by":"publisher","first-page":"102112","DOI":"10.1016\/j.sysarc.2021.102112","volume":"117","author":"Q Fan","year":"2021","unstructured":"Fan Q, Chen J, Deborah LJ, Luo M (2021) A secure and efficient authentication and data sharing scheme for internet of things based on blockchain. J Syst Archit 117:102112","journal-title":"J Syst Archit"},{"issue":"5","key":"1833_CR21","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial iot. IEEE J Sel Areas Commun 38(5):942\u2013954","journal-title":"IEEE J Sel Areas Commun"},{"issue":"1","key":"1833_CR22","doi-asserted-by":"publisher","first-page":"2186316","DOI":"10.1080\/09540091.2023.2186316","volume":"35","author":"S Xu","year":"2023","unstructured":"Xu S, Zhong J, Wang L, He D, Zhang S, Shao W (2023) A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mhealth. Connect Sci 35(1):2186316","journal-title":"Connect Sci"},{"issue":"2","key":"1833_CR23","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1007\/s11227-023-05577-6","volume":"80","author":"D Rani","year":"2024","unstructured":"Rani D, Tripathi S (2024) Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network. The Journal of Supercomputing 80(2):2681\u20132717","journal-title":"The Journal of Supercomputing"},{"key":"1833_CR24","doi-asserted-by":"crossref","unstructured":"Sun J, Xu G, Zhang T, Cheng X, Han X, Tang M (2022) Secure data sharing with flexible cross-domain authorization in autonomous vehicle systems. IEEE Transactions on Intelligent Transportation Systems","DOI":"10.1109\/TITS.2022.3157309"},{"key":"1833_CR25","doi-asserted-by":"crossref","unstructured":"Backes M, Pfitzmann B (2004) Symmetric encryption in a simulatable dolev-yao style cryptographic library. In: Proceedings. 17th IEEE computer security foundations workshop, 2004., pp 204\u2013218. IEEE","DOI":"10.1109\/CSFW.2004.1310742"},{"issue":"3","key":"1833_CR26","first-page":"370","volume":"8","author":"K Gupta","year":"2011","unstructured":"Gupta K, Silakari S (2011) Ecc over rsa for asymmetric encryption: A review. International Journal of Computer Science Issues (IJCSI) 8(3):370","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"1833_CR27","doi-asserted-by":"crossref","unstructured":"Xu J, He C, Luan TH (2021) Efficient authentication for vehicular digital twin communications. In: 2021 IEEE 94th vehicular technology conference (VTC2021-Fall), pp 1\u20135. IEEE","DOI":"10.1109\/VTC2021-Fall52928.2021.9625561"},{"key":"1833_CR28","doi-asserted-by":"crossref","unstructured":"Lai C, Ma Y, Lu R, Zhang Y, Zheng D (2022) A novel authentication scheme supporting multiple user access for 5g and beyond. IEEE Transactions on Dependable and Secure Computing 20(4):2970\u20132987","DOI":"10.1109\/TDSC.2022.3198723"},{"key":"1833_CR29","doi-asserted-by":"publisher","first-page":"136119","DOI":"10.1109\/ACCESS.2020.3011477","volume":"8","author":"Y Hou","year":"2020","unstructured":"Hou Y, Garg S, Hui L, Jayakody DNK, Jin R, Hossain MS (2020) A data security enhanced access control mechanism in mobile edge computing. IEEE Access 8:136119\u2013136130","journal-title":"IEEE Access"},{"issue":"1","key":"1833_CR30","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst (TOCS) 8(1):18\u201336","journal-title":"ACM Trans Comput Syst (TOCS)"},{"key":"1833_CR31","doi-asserted-by":"crossref","unstructured":"K\u00fcsters R, Truderung T (2009) Using proverif to analyze protocols with diffie-hellman exponentiation. In: 2009 22nd IEEE computer security foundations symposium, pp 157\u2013171. IEEE","DOI":"10.1109\/CSF.2009.17"},{"issue":"15","key":"1833_CR32","doi-asserted-by":"publisher","first-page":"17261","DOI":"10.1007\/s11227-022-04558-5","volume":"78","author":"Y Li","year":"2022","unstructured":"Li Y, Xu M, Xu G (2022) Blockchain-based mutual authentication protocol without ca. The Journal of Supercomputing 78(15):17261\u201317283","journal-title":"The Journal of Supercomputing"},{"issue":"2","key":"1833_CR33","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","volume":"16","author":"HH Kilinc","year":"2013","unstructured":"Kilinc HH, Yanik T (2013) A survey of sip authentication and key agreement schemes. IEEE Communications Surveys & Tutorials 16(2):1005\u20131023","journal-title":"IEEE Communications Surveys & Tutorials"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01833-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01833-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01833-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:32:45Z","timestamp":1747459965000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01833-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,7]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1833"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01833-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4544872\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,7]]},"assertion":[{"value":"7 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing of interest"}},{"value":"The work has not been published before. The work is not under consideration elsewhere. Copyright has not been breached in seeking its publication. The publication has been approved by all co-authors and responsible authorities at the institute or organization where the work has been carried out. The submitted work is original and the results\/data\/figures in this manuscript have not been published elsewhere, nor are they under consideration by another publisher. Informed consent was obtained from all individual participants included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and Consent to participate"}},{"value":"The Author agrees to publication of the article in English by Springer in Springer\u2019s corresponding English-language journal.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"37"}}