{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:56:50Z","timestamp":1772063810363,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","doi-asserted-by":"crossref","award":["2015YPXH4W-004"],"award-info":[{"award-number":["2015YPXH4W-004"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s12652-019-01476-y","type":"journal-article","created":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T13:04:31Z","timestamp":1568034271000},"page":"755-762","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["An integrated framework for blockchain inspired fog communications and computing in internet of vehicles"],"prefix":"10.1007","volume":"11","author":[{"given":"Alessio","family":"Bonadio","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0267-4733","authenticated-orcid":false,"given":"Francesco","family":"Chiti","sequence":"additional","affiliation":[]},{"given":"Romano","family":"Fantacci","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Vespri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"issue":"2","key":"1476_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MNET.2016.7437024","volume":"30","author":"T Abdelkader","year":"2016","unstructured":"Abdelkader T, Naik K, Nayak A, Goel N, Srivastava V (2016) A performance comparison of delay-tolerant network routing protocols. IEEE Netw 30(2):46\u201353","journal-title":"IEEE Netw"},{"issue":"1","key":"1476_CR2","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/SURV.2013.070813.00285","volume":"16","author":"S Abolfazli","year":"2014","unstructured":"Abolfazli S, Sanaei Z, Ahmed E, Gani A, Buyya R (2014) Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. IEEE Commun Surv Tuts 16(1):337\u2013368","journal-title":"IEEE Commun Surv Tuts"},{"key":"1476_CR3","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/ACCESS.2015.2416657","volume":"3","author":"KM Alam","year":"2015","unstructured":"Alam KM, Saini M, Saddik AE (2015) Toward social internet of vehicles: concept, architecture, and applications. IEEE Access 3:343\u2013357","journal-title":"IEEE Access"},{"issue":"4","key":"1476_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1145\/1282427.1282422","volume":"37","author":"A Balasubramanian","year":"2007","unstructured":"Balasubramanian A, Levine B, Venkataramani A (2007) Dtn routing as a resource allocation problem. SIGCOMM Comput Commun Rev 37(4):373\u2013384. \nhttps:\/\/doi.org\/10.1145\/1282427.1282422","journal-title":"SIGCOMM Comput Commun Rev"},{"issue":"5","key":"1476_CR5","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.1109\/TITS.2016.2600300","volume":"18","author":"C Bila","year":"2017","unstructured":"Bila C, Sivrikaya F, Khan MA, Albayrak S (2017) Vehicles of the future: a survey of research on safety issues. IEEE Trans Intell Transp Syst 18(5):1046\u20131065","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"12","key":"1476_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/MCOM.2017.1700879","volume":"55","author":"A Dorri","year":"2017","unstructured":"Dorri A, Steger M, Kanhere SS, Jurdak R (2017) Blockchain: a distributed solution to automotive security and privacy. IEEE Commun Mag 55(12):119\u2013125","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"1476_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MVT.2011.941898","volume":"6","author":"F Dressler","year":"2011","unstructured":"Dressler F, Sommer C, Eckhoff D, Tonguz OK (2011) Toward realistic simulation of intervehicle communication. IEEE Veh Technol Mag 6(3):43\u201351. \nhttps:\/\/doi.org\/10.1109\/MVT.2011.941898","journal-title":"IEEE Veh Technol Mag"},{"issue":"7","key":"1476_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/MCOM.2017.1601160","volume":"55","author":"X Duan","year":"2017","unstructured":"Duan X, Liu Y, Wang X (2017) Sdn enabled 5g-vanet: adaptive vehicle clustering and beamformed transmission for aggregated traffic. IEEE Commun Mag 55(7):120\u2013127","journal-title":"IEEE Commun Mag"},{"issue":"9","key":"1476_CR9","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2017.3571042","volume":"50","author":"I Eyal","year":"2017","unstructured":"Eyal I (2017) Blockchain technology: transforming libertarian cryptocurrency dreams to finance and banking realities. Computer 50(9):38\u201349","journal-title":"Computer"},{"issue":"4","key":"1476_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2018.3111245","volume":"16","author":"R Henry","year":"2018","unstructured":"Henry R, Herzberg A, Kate A (2018) Blockchain access privacy: challenges and directions. IEEE Secur Privacy 16(4):38\u201345","journal-title":"IEEE Secur Privacy"},{"issue":"8","key":"1476_CR11","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1109\/TMC.2007.1016","volume":"6","author":"EPC Jones","year":"2007","unstructured":"Jones EPC, Li L, Schmidtke JK, Ward PAS (2007) Practical routing in delay-tolerant networks. IEEE Trans Mob Comput 6(8):943\u2013959","journal-title":"IEEE Trans Mob Comput"},{"key":"1476_CR12","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.pmcj.2014.09.009","volume":"17","author":"C Krupitzer","year":"2015","unstructured":"Krupitzer C, Roth FM, VanSyckel S, Schiele G, Becker C (2015) A survey on engineering approaches for self-adaptive systems. Pervasive Mob Comput 17:184\u2013206. \nhttps:\/\/doi.org\/10.1016\/j.pmcj.2014.09.009\n\n (10 years of Pervasive Computing\u2019 In Honor of Chatschik Bisdikian)","journal-title":"Pervasive Mob Comput"},{"key":"1476_CR13","doi-asserted-by":"publisher","unstructured":"Lee U, Park JS, Yeh J, Pau G, Gerla M (2006) Code torrent: content distribution using network coding in vanet. In: Proceedings of MobiShare \u201906, ACM, New York, NY, USA, pp 1\u20135. \nhttps:\/\/doi.org\/10.1145\/1161252.1161254","DOI":"10.1145\/1161252.1161254"},{"issue":"6","key":"1476_CR14","doi-asserted-by":"publisher","first-page":"1832","DOI":"10.1109\/JIOT.2017.2740569","volume":"4","author":"A Lei","year":"2017","unstructured":"Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun Z (2017) Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J 4(6):1832\u20131843","journal-title":"IEEE Internet Things J"},{"key":"1476_CR15","first-page":"19","volume":"9","author":"SS Manvi","year":"2017","unstructured":"Manvi SS, Tangade S (2017) A survey on authentication schemes in vanets for secured communication. Veh Commun 9:19\u201330","journal-title":"Veh Commun"},{"key":"1476_CR16","doi-asserted-by":"crossref","unstructured":"Mukherjee M, Shu L, Wang D (2018) Survey of fog computing: fundamental, network applications, and research challenges. IEEE Commun Surveys Tuts","DOI":"10.1109\/COMST.2018.2814571"},{"issue":"5","key":"1476_CR17","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1007\/s12652-018-0790-7","volume":"9","author":"FA Nakahara","year":"2018","unstructured":"Nakahara FA, Beder DM (2018) A context-aware and self-adaptive offloading decision support model for mobile cloud computing system. J Ambient Intell Humaniz Comput 9(5):1561\u20131572. \nhttps:\/\/doi.org\/10.1007\/s12652-018-0790-7","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"5","key":"1476_CR18","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s12652-015-0309-4","volume":"7","author":"Y Park","year":"2016","unstructured":"Park Y, Sur C, Rhee KH (2016) Pseudonymous authentication for secure v2i services in cloud-based vehicular networks. J Ambient Intell Humaniz Comput 7(5):661\u2013671. \nhttps:\/\/doi.org\/10.1007\/s12652-015-0309-4","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"1476_CR19","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MCE.2017.2776459","volume":"7","author":"D Puthal","year":"2018","unstructured":"Puthal D, Malik N, Mohanty SP, Kougianos E, Yang C (2018) The blockchain as a decentralized security framework [future directions]. IEEE Consum Electron Mag 7(2):18\u201321","journal-title":"IEEE Consum Electron Mag"},{"issue":"2","key":"1476_CR20","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s12652-016-0397-9","volume":"8","author":"F Silva","year":"2017","unstructured":"Silva F, Analide C (2017) Ubiquitous driving and community knowledge. J Ambient Intell Humaniz Comput 8(2):157\u2013166. \nhttps:\/\/doi.org\/10.1007\/s12652-016-0397-9","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1476_CR21","doi-asserted-by":"publisher","first-page":"15619","DOI":"10.1109\/ACCESS.2017.2733225","volume":"5","author":"SA Soleymani","year":"2017","unstructured":"Soleymani SA, Abdullah AH, Zareei M, Anisi MH, Vargas-Rosales C, Khan MK, Goudarzi S (2017) A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5:15619\u201315629","journal-title":"IEEE Access"},{"issue":"4","key":"1476_CR22","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/964723.383071","volume":"31","author":"I Stoica","year":"2001","unstructured":"Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. SIGCOMM Comput Commun Rev 31(4):149\u2013160","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"1476_CR23","doi-asserted-by":"crossref","unstructured":"Tacconi D, Carreras I, Miorandi D, Chlamtac I, Chiti F, Fantacci R (2007) Supporting the sink mobility: a case study for wireless sensor networks. In: 2007 IEEE international conference on communications, pp 3948\u20133953","DOI":"10.1109\/ICC.2007.650"},{"issue":"3","key":"1476_CR24","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/COMST.2008.4625806","volume":"10","author":"Y Toor","year":"2008","unstructured":"Toor Y, Muhlethaler P, Laouiti A, Fortelle ADL (2008) Vehicle ad hoc networks: applications and related technical issues. IEEE Commun Surveys Tuts 10(3):74\u201388","journal-title":"IEEE Commun Surveys Tuts"},{"issue":"2","key":"1476_CR25","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/COMST.2014.2375340","volume":"17","author":"SM Tornell","year":"2015","unstructured":"Tornell SM, Calafate CT, Cano JC, Manzoni P (2015) Dtn protocols for vehicular networks: an application oriented overview. IEEE Commun Surveys Tuts 17(2):868\u2013887","journal-title":"IEEE Commun Surveys Tuts"},{"issue":"5","key":"1476_CR26","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MCOM.2009.4939288","volume":"47","author":"RA Uzcategui","year":"2009","unstructured":"Uzcategui RA, Sucre AJD, Acosta-Marum G (2009) Wave: a tutorial. IEEE Commun Mag 47(5):126\u2013133","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"1476_CR27","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s12652-017-0470-z","volume":"8","author":"M Veeresha","year":"2017","unstructured":"Veeresha M, Sugumaran M (2017) Optimal hybrid broadcast scheduling and adaptive cooperative caching for spatial queries in road networks. J Ambient Intell Humaniz Comput 8(4):607\u2013624. \nhttps:\/\/doi.org\/10.1007\/s12652-017-0470-z","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"6","key":"1476_CR28","doi-asserted-by":"publisher","first-page":"1861","DOI":"10.1007\/s12652-017-0650-x","volume":"9","author":"C Wan","year":"2018","unstructured":"Wan C, Zhang J (2018) Efficient identity-based data transmission for vanet. J Ambient Intell Humaniz Comput 9(6):1861\u20131871. \nhttps:\/\/doi.org\/10.1007\/s12652-017-0650-x","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1476_CR29","doi-asserted-by":"publisher","first-page":"1513","DOI":"10.1109\/ACCESS.2017.2779263","volume":"6","author":"K Yeow","year":"2018","unstructured":"Yeow K, Gani A, Ahmad RW, Rodrigues JJPC, Ko K (2018) Decentralized consensus for edge-centric internet of things: a review, taxonomy, and research issues. IEEE Access 6:1513\u20131524","journal-title":"IEEE Access"},{"issue":"3","key":"1476_CR30","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/JSAC.2011.110308","volume":"29","author":"T Zhou","year":"2011","unstructured":"Zhou T, Choudhury RR, Ning P, Chakrabarty K (2011) P2dap-sybil attacks detection in vehicular ad hoc networks. IEEE J Sel Areas Commun 29(3):582\u2013594","journal-title":"IEEE J Sel Areas Commun"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01476-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01476-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01476-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T23:08:27Z","timestamp":1599520107000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01476-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1476"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01476-y","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"6 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}