{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:22:30Z","timestamp":1761110550061,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61872059","61502085"],"award-info":[{"award-number":["61872059","61502085"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. Netw."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s42045-020-00041-y","type":"journal-article","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T11:03:17Z","timestamp":1604401397000},"page":"205-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks"],"prefix":"10.1007","volume":"3","author":[{"given":"Zhiguang","family":"Qin","sequence":"first","affiliation":[]},{"given":"Yuedi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Minsheng","family":"Cao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0745-5836","authenticated-orcid":false,"given":"Dajiang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,3]]},"reference":[{"issue":"3","key":"41_CR1","doi-asserted-by":"publisher","first-page":"5520","DOI":"10.1109\/JIOT.2019.2903245","volume":"6","author":"L Ale","year":"2019","unstructured":"Ale, L., Zhang, N., Wu, H., Chen, D., Han, T.: Online proactive caching in mobile edge computing using bidirectional deep recurrent neural network. IEEE Internet Things J. 6(3), 5520\u20135530 (2019)","journal-title":"IEEE Internet Things J."},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13\u201316 (2012)","DOI":"10.1145\/2342509.2342513"},{"issue":"10","key":"41_CR3","doi-asserted-by":"publisher","first-page":"7905","DOI":"10.1109\/TVT.2016.2538791","volume":"65","author":"X Cao","year":"2016","unstructured":"Cao, X., Liu, L., Cheng, Y., Cai, L.X., Sun, C.: On optimal device-to-device resource allocation for minimizing end-to-end delay in VANETs. IEEE Trans. Veh. Technol. 65(10), 7905\u20137916 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"41_CR4","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JIOT.2016.2619679","volume":"4","author":"D Chen","year":"2016","unstructured":"Chen, D., Zhang, N., Qin, Z., Mao, X., Qin, Z., Shen, X., Li, X.Y.: S2M: a lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet Things J. 4(1), 88\u2013100 (2016)","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"41_CR5","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/TDSC.2018.2846258","volume":"17","author":"D Chen","year":"2018","unstructured":"Chen, D., Zhang, N., Cheng, N., Zhang, K., Qin, Z., Shen, X.S.: Physical layer based message authentication with secure channel codes. IEEE Trans. Dependable Secure Comput. 17(5), 1079\u20131093 (2018a)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"41_CR6","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1109\/JSAC.2018.2825079","volume":"36","author":"D Chen","year":"2018","unstructured":"Chen, D., Zhang, N., Lu, R., et al.: An LDPC Code based Physical layer Message Authentication Scheme with Prefect Security. IEEE J. Sel. Areas Commun. 36(4), 748\u2013761 (2018b)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"41_CR7","doi-asserted-by":"publisher","first-page":"6417","DOI":"10.1109\/JIOT.2019.2895136","volume":"6","author":"J Cui","year":"2019","unstructured":"Cui, J., Zhang, X., Zhong, H., Ying, Z., Liu, L.: RSMA: reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks. IEEE Internet Things J. 6(4), 6417\u20136428 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"41_CR8","doi-asserted-by":"publisher","first-page":"e0228319","DOI":"10.1371\/journal.pone.0228319","volume":"15","author":"M Han","year":"2020","unstructured":"Han, M., Liu, S., Ma, S., Wan, A.: Anonymous-authentication scheme based on fog computing for VANET. PLoS One 15(2), e0228319 (2020)","journal-title":"PLoS One"},{"issue":"12","key":"41_CR9","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681\u20132691 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"41_CR10","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1109\/TITS.2012.2207952","volume":"13","author":"JA Jang","year":"2012","unstructured":"Jang, J.A., Choi, K., Cho, H.: A Fixed Sensor-based intersection collision warning system in vulnerable line-of-sight and\/or traffic-violation-prone environment. IEEE Trans. Intell. Transp. Syst. 13(4), 1880\u20131890 (2012)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"5","key":"41_CR11","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/WC-M.2006.250356","volume":"13","author":"D Jiang","year":"2006","unstructured":"Jiang, D., Taliwal, V., Meier, A., Holfelder, W., Herrtwich, R.: Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wirel. Commun. 13(5), 36\u201343 (2006)","journal-title":"IEEE Wirel. Commun."},{"issue":"7","key":"41_CR12","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","volume":"99","author":"JB Kenney","year":"2011","unstructured":"Kenney, J.B.: Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 99(7), 1162\u20131182 (2011). https:\/\/doi.org\/10.1109\/JPROC.2011.2132790","journal-title":"Proc. IEEE"},{"issue":"2\u20133","key":"41_CR13","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Cryptogr. 19(2\u20133), 173\u2013193 (2000)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"41_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1186\/s13673-015-0054-x","volume":"5","author":"JK Lee","year":"2015","unstructured":"Lee, J.K., Jeong, Y.S., Park, J.H.: s-ITSF: a service based intelligent transportation system framework for smart accident management. Human-centric Computing and Information Sciences 5(1), 34 (2015)","journal-title":"Human-centric Computing and Information Sciences"},{"key":"41_CR15","first-page":"104","volume":"13","author":"J Li","year":"2018","unstructured":"Li, J., Choo, K.K.R., Zhang, W., Kumari, S., Rodrigues, J.J., Khan, M.K., Hogrefe, D.: EPA-CPPA: an efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 13, 104\u2013113 (2018)","journal-title":"Veh. Commun."},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Liu, J., Ren, J., Dai, W., Zhang, D., Zhou, P., Zhang, Y., Najjari, N., et\u00a0al.: Online multi-workflow scheduling under uncertain task execution time in IaaS clouds. IEEE Transactions on Cloud Computing, vol. 1, pp. 1\u201310 (2019)","DOI":"10.1109\/TCC.2019.2906300"},{"issue":"5","key":"41_CR17","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.1016\/j.eswa.2013.10.003","volume":"41","author":"JK Liu","year":"2014","unstructured":"Liu, J.K., Yuen, T.H., Au, M.H., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5), 2559\u20132564 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"41_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MWC.2019.1800535","volume":"26","author":"F Lyu","year":"2019","unstructured":"Lyu, F., Ren, J., Yang, P., Cheng, N., Tang, W., Zhang, Y., Shen, X.S.: Fine-grained TDMA MAC design toward ultra-reliable broadcast for autonomous driving. IEEE Wirel. Commun. 26(4), 46\u201353 (2019)","journal-title":"IEEE Wirel. Commun."},{"key":"41_CR18","doi-asserted-by":"publisher","unstructured":"Lyu, F., Ren, J., Cheng, N., Yang, P., Li, M., Zhang, Y., Shen, X.: LEAD: large-scale edge cache deployment based on spatio-temporal WiFi traffic statistics. IEEE Trans. Mob. Comput. (2020) https:\/\/doi.org\/10.1109\/TMC.2020.2984261","DOI":"10.1109\/TMC.2020.2984261"},{"issue":"5","key":"41_CR20","doi-asserted-by":"publisher","first-page":"8065","DOI":"10.1109\/JIOT.2019.2902840","volume":"6","author":"M Ma","year":"2019","unstructured":"Ma, M., He, D., Wang, H., Kumar, N., Choo, K.K.R.: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 6(5), 8065\u20138075 (2019)","journal-title":"IEEE Internet Things J."},{"key":"41_CR21","doi-asserted-by":"crossref","unstructured":"Martens, M. H., Van Den Beukel, A. P.: The road to automated driving: Dual mode and human factors considerations. In:16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013). pp. 2262\u20132267 (2013)","DOI":"10.1109\/ITSC.2013.6728564"},{"key":"41_CR22","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.future.2018.12.031","volume":"95","author":"L Nkenyereye","year":"2019","unstructured":"Nkenyereye, L., Liu, C.H., Song, J.: Towards secure and privacy preserving collision avoidance system in 5G fog based Internet of Vehicles. Future Gener. Comput. Syst. 95, 488\u2013499 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"41_CR23","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000)","journal-title":"J. Cryptol."},{"key":"41_CR24","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.comnet.2018.01.015","volume":"134","author":"SM Pournaghi","year":"2018","unstructured":"Pournaghi, S.M., Zahednejad, B., Bayat, M., Farjami, Y.: NECPPA: a novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput. Netw. 134, 78\u201392 (2018)","journal-title":"Comput. Netw."},{"key":"41_CR25","unstructured":"Prema, G., Kalpana, C.: Performance evaluation of emergency messaging via wireless collision avoidance systems for improved traffic safety in VANET. Int. J. Comput. Appl. 88(10), 35\u201341 (2014)"},{"key":"41_CR26","unstructured":"Ravi, S., Raghunathan, A., Chakradhar, S.: Tamper resistance mechanisms for secure embedded systems. In: 17th International Conference on VLSI Design. Proceedings, pp. 605\u2013611 (2004)"},{"issue":"1","key":"41_CR27","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"issue":"5","key":"41_CR28","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MNET.2017.1700030","volume":"31","author":"J Ren","year":"2017","unstructured":"Ren, J., Guo, H., Xu, C., Zhang, Y.: Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw. 31(5), 96\u2013105 (2017)","journal-title":"IEEE Netw."},{"issue":"6","key":"41_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3362031","volume":"52","author":"J Ren","year":"2019","unstructured":"Ren, J., Zhang, D., He, S., Zhang, Y., Li, T.: A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet. ACM Comput. Surv. (CSUR) 52(6), 1\u201336 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"41_CR30","doi-asserted-by":"crossref","unstructured":"Sarencheh, A., Asaar, M. R., Salmasizadeh, M., Aref, M. R.: Rapp: an efficient revocation scheme with authentication and privacy preserving for vehicular ad-hoc networks. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 359\u2013366 (2017)","DOI":"10.1109\/ICCKE.2017.8167905"},{"issue":"4","key":"41_CR31","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TVT.2012.2186992","volume":"61","author":"KA Shim","year":"2012","unstructured":"Shim, K.A.: $${\\cal{C}}{\\cal{P}}{\\cal{A}}{\\cal{S}}$$: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874\u20131883 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"41_CR32","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1002\/cpe.3485","volume":"28","author":"I Stojmenovic","year":"2016","unstructured":"Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of Fog computing and its security issues. Concurr. Comput. Pract. Exp. 28(10), 2991\u20133005 (2016)","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"6","key":"41_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3341104","volume":"10","author":"W Tang","year":"2019","unstructured":"Tang, W., Ren, J., Zhang, K., Zhang, D., Zhang, Y., Shen, X.: Efficient and privacy-preserving fog-assisted health data sharing scheme. ACM Trans. Intell. Syst. Technol. (TIST) 10(6), 1\u201323 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"issue":"3","key":"41_CR34","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1109\/TMM.2018.2889934","volume":"21","author":"W Tang","year":"2019","unstructured":"Tang, W., Ren, J., Zhang, Y.: Enabling trusted and privacy-preserving healthcare services in social media health networks. IEEE Trans. Multimed. 21(3), 579\u2013590 (2019)","journal-title":"IEEE Trans. Multimed."},{"key":"41_CR35","doi-asserted-by":"publisher","unstructured":"Toroyan, T., Peden, M. M., Iaych, K.: WHO launches second global status report on road safety. Inj Prev. 19(2), 150 (2013). https:\/\/doi.org\/10.1136\/injuryprev-2013-040775","DOI":"10.1136\/injuryprev-2013-040775"},{"issue":"2","key":"41_CR36","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1109\/TVT.2015.2402166","volume":"65","author":"F Wang","year":"2015","unstructured":"Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896\u2013911 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"41_CR37","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P. H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246\u2013250 (2008)","DOI":"10.1109\/INFOCOM.2008.58"},{"issue":"1","key":"41_CR38","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MWC.2018.1700193","volume":"25","author":"N Zhang","year":"2018","unstructured":"Zhang, N., Yang, P., Ren, J., Chen, D., Yu, L., Shen, X.: Synergy of big data and 5g wireless networks: opportunities, approaches, and challenges. IEEE Wirel. Commun. 25(1), 12\u201318 (2018)","journal-title":"IEEE Wirel. Commun."}],"container-title":["CCF Transactions on Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42045-020-00041-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42045-020-00041-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42045-020-00041-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,2]],"date-time":"2020-12-02T17:08:08Z","timestamp":1606928888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42045-020-00041-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,3]]},"references-count":38,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["41"],"URL":"https:\/\/doi.org\/10.1007\/s42045-020-00041-y","relation":{},"ISSN":["2520-8462","2520-8470"],"issn-type":[{"type":"print","value":"2520-8462"},{"type":"electronic","value":"2520-8470"}],"subject":[],"published":{"date-parts":[[2020,11,3]]},"assertion":[{"value":"6 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}