{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:36:09Z","timestamp":1774449369138,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T00:00:00Z","timestamp":1635552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T00:00:00Z","timestamp":1635552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Vehicular ad hoc network (VANET) is commonly employed in intelligent transportation system (ITS) that allows the exchange of traffic data among vehicles and nearby environment to accomplish effective driving experience. Privacy and security are the challenging issues that exist in the safety needs of the VANET. Any particular leakage of the vehicle details such as route data might result in serious impacts, and therefore, authentication and privacy-preserving protocols are needed to enhance safety in VANET. With this motivation, this paper presents a new lightweight authentication and privacy-preserving protocol using improved timed efficient stream loss-tolerant authentication with cuckoo filter (ITESLA-CF) for VANETs. The proposed model encompasses different stages of operations such as initialization, registration, mutual authentication, broadcast and verification, and vehicle revocation phases. In addition, the ITESLA-CF technique has effective broadcast authentication as TESLA with minimal memory requirement. Besides, the ITESLA-CF technique includes a cuckoo filter to save the authentic information of vehicles that exist in the RSU\u2019s range. The proposed model has lightweight mutual authentication among the parties and it offers robust anonymity to accomplish privacy and resists ordinary attacks. To ensure the better performance of the ITESLA-CF technique, an extensive set of simulations take place and the results are assessed in terms of different measures. The resultant experimental values pointed out the supremacy of the ITESLA-CF technique over the recent state of art methods.<\/jats:p>","DOI":"10.1007\/s40747-021-00562-z","type":"journal-article","created":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T07:02:54Z","timestamp":1635577374000},"page":"2981-2991","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A novel lightweight authentication and privacy-preserving protocol for vehicular ad hoc networks"],"prefix":"10.1007","volume":"9","author":[{"given":"Shaji K. A.","family":"Theodore","sequence":"first","affiliation":[]},{"given":"K. Rajiv","family":"Gandhi","sequence":"additional","affiliation":[]},{"given":"V.","family":"Palanisamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,30]]},"reference":[{"key":"562_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.305988","author":"A Rehman","year":"2021","unstructured":"Rehman A, Rehman SU, Khan M, Alazab M, Reddy T (2021) CANintelliIDS: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Transa Netw Sci Eng. https:\/\/doi.org\/10.1109\/TNSE.2021.305988","journal-title":"IEEE Transa Netw Sci Eng"},{"key":"562_CR2","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1016\/j.jss.2016.04.005","volume":"117","author":"GMN Ali","year":"2016","unstructured":"Ali GMN et al (2016) Efficient data dissemination in cooperative multi-RSU vehicular ad hoc networks (VANETs). J Syst Softw 117:508\u2013527","journal-title":"J Syst Softw"},{"key":"562_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3025875","author":"AR Javed","year":"2020","unstructured":"Javed AR, Usman M, Rehman SU, Khan MU, Haghighi MS (2020) Anomaly detection in automated vehicles using multistage attention-based convolutional neural network. IEEE Trans Intell Transp Syst. https:\/\/doi.org\/10.1109\/TITS.2020.3025875","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"562_CR4","doi-asserted-by":"crossref","unstructured":"Singh S, Agrawal S (2014) VANET routing protocols: issues and challenges. In: Engineering and computational sciences (RAECS), 2014 recent advances in, 2014, pp. 1\u20135","DOI":"10.1109\/RAECS.2014.6799625"},{"key":"562_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3084753","author":"W Wang","year":"2021","unstructured":"Wang W, Xu H, Alazab M, Gadekallu TR, Han Z, Su C (2021) Blockchain-based reliable and efficient certificateless signature for IIoT devices. IEEE Trans Ind Inf. https:\/\/doi.org\/10.1109\/TII.2021.3084753","journal-title":"IEEE Trans Ind Inf"},{"key":"562_CR6","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MWC.2015.7054724","volume":"22","author":"S Bitam","year":"2015","unstructured":"Bitam S et al (2015) VANET-cloud: a generic cloud computing model for vehicular Ad hoc networks. IEEE Wirel Commun 22:96\u2013102","journal-title":"IEEE Wirel Commun"},{"key":"562_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4315","author":"L Zhang","year":"2021","unstructured":"Zhang L, Peng M, Wang W, Jin Z, Su Y, Chen H (2021) Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.4315","journal-title":"Trans Emerg Telecommun Technol"},{"key":"562_CR8","doi-asserted-by":"crossref","unstructured":"Wang W, Huang H, Zhang L, Han Z, Qiu C, Su C (2020) BlockSLAP: Blockchain-based secure and lightweight authentication protocol for smart grid. In 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom), IEEE. pp. 1332\u20131338","DOI":"10.1109\/TrustCom50675.2020.00179"},{"issue":"1","key":"562_CR9","first-page":"1","volume":"10","author":"SA Alfadhli","year":"2020","unstructured":"Alfadhli SA, Lu S, Fatani A, Al-Fedhly H, Ince M (2020) SD2PA: a fully safe driving and privacy-preserving authentication scheme for VANETs. HCIS 10(1):1\u201325","journal-title":"HCIS"},{"issue":"5","key":"562_CR10","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.3390\/app10051758","volume":"10","author":"S Yu","year":"2020","unstructured":"Yu S, Park K, Lee J, Park Y, Park Y, Lee S, Chung B (2020) Privacy-preserving lightweight authentication protocol for demand response management in smart grid environment. Appl Sci 10(5):1758","journal-title":"Appl Sci"},{"key":"562_CR11","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.dsp.2018.06.003","volume":"85","author":"PSV SathyaNarayanan","year":"2019","unstructured":"SathyaNarayanan PSV (2019) A sensor enabled secure vehicular communication for emergency message dissemination using cloud services. Digit Signal Process 85:10\u201316","journal-title":"Digit Signal Process"},{"issue":"12","key":"562_CR12","first-page":"6121","volume":"13","author":"MA Alazzawi","year":"2019","unstructured":"Alazzawi MA, Lu H, Yassin AA, Chen K (2019) Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks. KSII Trans Internet Inf Syst 13(12):6121\u20136144","journal-title":"KSII Trans Internet Inf Syst"},{"key":"562_CR13","first-page":"100228","volume":"22","author":"I Ali","year":"2020","unstructured":"Ali I, Li F (2020) An efficient CPPA scheme for vehicle-to-infrastructure communication in VANETs. Veh Commun 22:100228","journal-title":"Veh Commun"},{"key":"562_CR14","doi-asserted-by":"publisher","first-page":"142858","DOI":"10.1109\/ACCESS.2020.3014038","volume":"8","author":"SA Alfadhli","year":"2020","unstructured":"Alfadhli SA, Lu S, Chen K, Sebai M (2020) Mfspv: A multi-factor secured and lightweight privacy-preserving authentication scheme for vanets. IEEE Access 8:142858\u2013142874","journal-title":"IEEE Access"},{"key":"562_CR15","doi-asserted-by":"publisher","first-page":"100350","DOI":"10.1016\/j.iot.2020.100350","volume":"13","author":"SS Moni","year":"2021","unstructured":"Moni SS, Manivannan D (2021) A scalable and distributed architecture for secure and privacy-preserving authentication and message dissemination in VANETs. Internet Things 13:100350","journal-title":"Internet Things"},{"key":"562_CR16","doi-asserted-by":"publisher","first-page":"102158","DOI":"10.1016\/j.sysarc.2021.102158","volume":"117","author":"X Feng","year":"2021","unstructured":"Feng X, Shi Q, Xie Q, Liu L (2021) An efficient privacy-preserving authentication model based on blockchain for VANETs. J Syst Arch 117:102158","journal-title":"J Syst Arch"},{"issue":"4","key":"562_CR17","doi-asserted-by":"publisher","first-page":"3456","DOI":"10.1109\/TVT.2021.3064337","volume":"70","author":"W Xiong","year":"2021","unstructured":"Xiong W, Wang R, Wang Y, Zhou F, Luo X (2021) CPPA-D: efficient conditional privacy-preserving authentication scheme with double-insurance in VANETs. IEEE Trans Veh Technol 70(4):3456\u20133468","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"562_CR18","doi-asserted-by":"publisher","first-page":"3547","DOI":"10.1109\/JSYST.2020.2991168","volume":"14","author":"X Li","year":"2020","unstructured":"Li X, Liu T, Obaidat MS, Wu F, Vijayakumar P, Kumar N (2020) A lightweight privacy-preserving authentication protocol for VANETs. IEEE Syst J 14(3):3547\u20133557","journal-title":"IEEE Syst J"},{"issue":"7","key":"562_CR19","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun Y, Lu R, Lin X, Shen X, Su J (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(7):3589\u20133603","journal-title":"IEEE Trans Veh Technol"},{"issue":"11","key":"562_CR20","doi-asserted-by":"publisher","first-page":"10283","DOI":"10.1109\/TVT.2017.2718101","volume":"66","author":"J Cui","year":"2017","unstructured":"Cui J, Zhang J, Zhong H, Xu Y (2017) SPACF: a secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans Veh Technol 66(11):10283\u201310295","journal-title":"IEEE Trans Veh Technol"},{"issue":"11","key":"562_CR21","doi-asserted-by":"publisher","first-page":"194","DOI":"10.23919\/JCC.2020.11.016","volume":"17","author":"Z Wu","year":"2020","unstructured":"Wu Z, Zhang Y, Liu L, Yue M (2020) TESLA-based authentication for BeiDou civil navigation message. China Commun 17(11):194\u2013218","journal-title":"China Commun"},{"key":"562_CR22","unstructured":"Bin F, Andersen DG, Kaminsky M, Mitzenmacher MD (2014) Cuckoo filter: practically better than bloom. In: Proc. of the 10th ACM international on conference sydney, Australia, December 2\u20135, pp. 75\u201388"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00562-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00562-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00562-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T17:36:50Z","timestamp":1686332210000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00562-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,30]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["562"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00562-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,30]]},"assertion":[{"value":"22 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Available based on request.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data availability"}},{"value":"Available based on request.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}