{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T15:59:09Z","timestamp":1774799949571,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T00:00:00Z","timestamp":1706313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T00:00:00Z","timestamp":1706313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-02566-7","type":"journal-article","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T10:01:56Z","timestamp":1706522516000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Security Metrics and Authentication-based RouTing (SMART) Protocol for Vehicular IoT Networks"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5370-3071","authenticated-orcid":false,"given":"Rakesh","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sunil K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"D. K.","family":"Lobiyal","sequence":"additional","affiliation":[]},{"given":"Sudhakar","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Shashi","family":"Jawla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,27]]},"reference":[{"key":"2566_CR1","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1007\/s11227-023-05463-1","volume":"80","author":"R Kumar","year":"2024","unstructured":"Kumar R, Singh SK, Lobiyal DK. UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks. J Supercomput. 2024;80:942\u201369. https:\/\/doi.org\/10.1007\/s11227-023-05463-1.","journal-title":"J Supercomputing"},{"issue":"1","key":"2566_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJICA.2022.121387","volume":"12","author":"R Kumar","year":"2022","unstructured":"Kumar R, Singh SK, Lobiyal DK, Chui KT, Santaniello D, Rafsanjani MK. A Novel Decentralized Group Key Management Scheme for Cloud-Based Vehicular IoT Networks. Int J Cloud Appl Comput (IJCAC). 2022;12(1):1\u201334.","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"2566_CR3","doi-asserted-by":"crossref","unstructured":"Malhotra S, Trivedi MC. Authentication, KDC, and key pre-distribution techniques-based model for securing AODV routing protocol in MANET. In: Smart Innovations in Communication and Computational Sciences: Proceedings of ICSICCS 2017, vol. 1, Springer Singapore, 2019. p. 175\u201386","DOI":"10.1007\/978-981-10-8968-8_15"},{"issue":"8","key":"2566_CR4","doi-asserted-by":"publisher","first-page":"5050","DOI":"10.1109\/TITS.2020.3008361","volume":"22","author":"S Safavat","year":"2020","unstructured":"Safavat S, Rawat DB. On the elliptic curve cryptography for privacy-aware secure ACO-AODV routing in intent-based internet of vehicles for smart cities. IEEE Trans Intell Transp Syst. 2020;22(8):5050\u20139.","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2566_CR5","doi-asserted-by":"publisher","DOI":"10.1201\/9781003333500-34","volume-title":"Automation and computation","author":"R Kumar","year":"2023","unstructured":"Kumar R, Singh SK, Lobiyal DK. Communication structure for Vehicular Internet of Things (VIoTs) and review for vehicular networks. In: Vats S, Sharma V, Singh K, Gupta A, Bordoloi D, Garg N, editors. Automation and computation. London: CRC Press; 2023, https:\/\/doi.org\/10.1201\/9781003333500-34"},{"issue":"3","key":"2566_CR6","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/j.adhoc.2011.09.001","volume":"10","author":"K Mershad","year":"2012","unstructured":"Mershad K, Artail H, Gerla M. Roamer: Roadside units as message routers in vanets. Ad Hoc Netw. 2012;10(3):479\u201396.","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"2566_CR7","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1109\/TVT.2015.2402177","volume":"65","author":"M Azimifar","year":"2016","unstructured":"Azimifar M, Todd TD, Khezrian A, Karakostas G. Vehicle-to-vehicle forwarding in green roadside infrastructure. IEEE Trans Veh Technol. 2016;65(2):780\u201395.","journal-title":"IEEE Trans Veh Technol"},{"key":"2566_CR8","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s11277-019-06587-5","volume":"109","author":"MT Abbas","year":"2019","unstructured":"Abbas MT, Muhammad A, Song WC. Road-aware estimation model for path duration in Internet of Vehicles (IoV). Wirel Pers Commun. 2019;109:715\u201338.","journal-title":"Wirel Pers Commun"},{"key":"2566_CR9","doi-asserted-by":"crossref","unstructured":"Alsharif N, C\u00e9spedes S, Shen XS. ICAR: Intersection-based connectivity aware routing in vehicular ad hoc networks. In: 2013 IEEE International Conference on Communications (ICC). 2013, p. 1736\u201341","DOI":"10.1109\/ICC.2013.6654769"},{"key":"2566_CR10","doi-asserted-by":"publisher","unstructured":"Mengi G, Singh SK, Kumar S, Mahto D, Sharma A. Automated Machine Learning (AutoML): The Future of Computational Intelligence. In: International Conference on Cyber Security, Privacy and Networking. Springer International Publishing, Cham. 2021. p. 309-17. https:\/\/doi.org\/10.1007\/978-3-031-22018-0_28","DOI":"10.1007\/978-3-031-22018-0_28"},{"key":"2566_CR11","unstructured":"Kaur P, Singh SK, Singh I, Kumar S. Exploring Convolutional Neural Network in Computer Vision-based Image Classification. In: International Conference on Smart Systems and Advanced Computing (Syscom-2021). 2021"},{"key":"2566_CR12","doi-asserted-by":"publisher","unstructured":"Gupta S, Agrawal S, Singh SK, Kumar S. A Novel Transfer Learning-Based Model for Ultrasound Breast Cancer Image Classification. In: Computational Vision and Bio-Inspired Computing: Proceedings of ICCVBIC 2022. Springer Nature Singapore, Singapore, 2022. p. 511\u201323. https:\/\/doi.org\/10.1007\/978-981-19-9819-5_37.","DOI":"10.1007\/978-981-19-9819-5_37"},{"key":"2566_CR13","unstructured":"Saini T, Kumar S, Vats T, Singh M. Edge Computing in Cloud Computing Environment: Opportunities and Challenges. In: International Conference on Smart Systems and Advanced Computing (Syscom-2021). 2020"},{"key":"2566_CR14","doi-asserted-by":"publisher","unstructured":"Singh M, Singh SK, Kumar S, Madan U, Maan T. Sustainable Framework for Metaverse Security and Privacy: Opportunities and Challenges. In: International Conference on Cyber Security, Privacy and Networking. Springer International Publishing, Cham. 2020. p. 329\u201340. https:\/\/doi.org\/10.1007\/978-3-031-22018-0_30","DOI":"10.1007\/978-3-031-22018-0_30"},{"key":"2566_CR15","doi-asserted-by":"publisher","unstructured":"Sharma A, Singh SK, Kumar S, Chhabra A, Gupta S. Security of Android Banking Mobile Apps: Challenges and Opportunities. In: International Conference on Cyber Security, Privacy and Networking. Springer International Publishing, Cham, 2021, p. 406\u201316. https:\/\/doi.org\/10.1007\/978-3-031-22018-0_39","DOI":"10.1007\/978-3-031-22018-0_39"},{"key":"2566_CR16","volume-title":"SDN-supported edge-cloud interplay for next generation internet of things","author":"R Singh","year":"2022","unstructured":"Singh R, Singh SK, Kumar S, Gill SS. SDN-Aided edge computing-enabled AI for IoT and smart cities. In: SagarSahoo K, Solanki A, Kumar Mishra S, Sahoo B, Nayyar A, editors. SDN-supported edge-cloud interplay for next generation internet of things. Boca Raton: Chapman and Hall\/CRC; 2022"},{"issue":"1","key":"2566_CR17","first-page":"1","volume":"12","author":"FJG Pe\u00f1alvo","year":"2022","unstructured":"Pe\u00f1alvo FJG, Sharma A, Chhabra A, Singh SK, Kumar S, Arya V, Gaurav A. Mobile cloud computing and sustainable development: Opportunities, challenges, and future directions. Int J Cloud Appl Comput (IJCAC). 2022;12(1):1\u201320","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"2566_CR18","doi-asserted-by":"publisher","unstructured":"A Sharma et al 2023 Fuzzy Based Clustering of Consumers Big Data in Industrial Applications. 2023 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 2023. p. 01\u201303. https:\/\/doi.org\/10.1109\/ICCE56470.2023.10043451","DOI":"10.1109\/ICCE56470.2023.10043451"},{"key":"2566_CR19","doi-asserted-by":"publisher","unstructured":"Khade G, Kumar S, Bhattacharya S. Classification of web pages on attractiveness: A supervised learning approach. In: 2012 4th International Conference on Intelligent Human Computer Interaction (IHCI). 2012;1\u20135. IEEE. https:\/\/doi.org\/10.1109\/IHCI.2012.6481867","DOI":"10.1109\/IHCI.2012.6481867"},{"key":"2566_CR20","doi-asserted-by":"publisher","DOI":"10.1201\/9781003369066-2","volume-title":"Advanced computer science applications","author":"S Kumar","year":"2023","unstructured":"Kumar S, Singh SK, Aggarwal N. Speculative parallelism on multicore chip architecture strengthen green computing concept: a survey. In: Singh K, Banda L, Manjul M, editors. Advanced computer science applications. New York: Apple Academic Press; 2023. https:\/\/doi.org\/10.1201\/9781003369066-2"},{"key":"2566_CR21","unstructured":"Kumar S, Singh SK, Aggarwal N, Aggarwal K. Efficient Speculative Parallelization Architecture for Overcoming Speculation Overheads. In: Proc. of International Conference on Smart Systems and Advanced Computing (Syscom-2021). 2022"},{"issue":"12","key":"2566_CR22","doi-asserted-by":"publisher","first-page":"11764","DOI":"10.1002\/int.23062","volume":"37","author":"S Kumar","year":"2022","unstructured":"Kumar S, Singh SK, Aggarwal N, Gupta BB, Alhalabi W, Band SS. An efficient hardware-supported and parallelization architecture for intelligent systems to overcome speculative overheads. Int J Intell Syst. 2022;37(12):11764\u201390","journal-title":"Int J Intell Syst"},{"issue":"5","key":"2566_CR23","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1080\/09720529.2021.1951435","volume":"24","author":"S Kumar","year":"2021","unstructured":"Kumar S, Singh SK, Aggarwal N, Aggarwal K. Evaluation of automatic parallelization algorithms to minimize speculative parallelism overheads: an experiment. J Discret Math Sci Cryptogr. 2021;24(5):1517\u201328","journal-title":"J Discret Math Sci Cryptogr"},{"key":"2566_CR24","unstructured":"Chopra M, Kumar S, Madan U, Sharma S. Influence and establishment of smart transport in smart cities. In: International Conference on Smart Systems and Advanced Computing (Syscom-2021). 2021"},{"issue":"5","key":"2566_CR25","doi-asserted-by":"publisher","first-page":"4231","DOI":"10.1109\/TVT.2016.2600481","volume":"66","author":"N Alsharif","year":"2017","unstructured":"Alsharif N, Shen X. iCAR-II: Infrastructure-based connectivity aware routing in vehicular networks. IEEE Trans Veh Technol. 2017;66(5):4231\u201344","journal-title":"IEEE Trans Veh Technol"},{"key":"2566_CR26","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1007\/s11277-021-09390-3","volume":"124","author":"P Remya krishnan","year":"2022","unstructured":"Remya krishnan, P., Arun Raj Kumar, P. Detection and mitigation of smart blackhole and gray hole attacks in VANET using dynamic time warping. Wireless Pers Commun 2022;124:931\u201366. https:\/\/doi.org\/10.1007\/s11277-021-09390-3","journal-title":"Wireless Pers Commun"},{"key":"2566_CR27","doi-asserted-by":"crossref","unstructured":"Albouq SS, Fredericks EM. Lightweight detection and isolation of black hole attacks in connected vehicles. In: 2017 IEEE 37th International Conference on Distributed Computing Systems workshops (ICDCSW). 2017;97\u2013104. IEEE","DOI":"10.1109\/ICDCSW.2017.23"},{"key":"2566_CR28","doi-asserted-by":"publisher","first-page":"39515","DOI":"10.1109\/ACCESS.2018.2853112","volume":"6","author":"X Yang","year":"2018","unstructured":"Yang X, Li M, Qian Z, Di T. Improvement of gpsr protocol in vehicular ad hoc network. IEEE Access. 2018;6:39515\u201324","journal-title":"IEEE Access"},{"key":"2566_CR29","doi-asserted-by":"crossref","unstructured":"Yadav P, Hussain M. A secure AODV routing protocol with node authentication. In: 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA).2017;1:489\u201393. IEEE","DOI":"10.1109\/ICECA.2017.8203733"},{"issue":"1","key":"2566_CR30","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/JSYST.2018.2806996","volume":"13","author":"F Goudarzi","year":"2018","unstructured":"Goudarzi F, Asgari H, Al-Raweshidy HS. Traffic-aware VANET routing for city environments\u2014A protocol based on ant colony optimization. IEEE Syst J. 2018;13(1):571\u201381","journal-title":"IEEE Syst J"},{"key":"2566_CR31","doi-asserted-by":"crossref","unstructured":"Ferdous F, Mahmud MS. Intelligent traffic monitoring system using VANET infrastructure and ant colony optimization. In: 2016 5th International Conference on informatics, electronics, and vision (ICIEV). 2016;356\u201360. IEEE","DOI":"10.1109\/ICIEV.2016.7760025"},{"key":"2566_CR32","doi-asserted-by":"publisher","DOI":"10.1201\/9780429446047","volume-title":"Linux yourself: concept and programming","author":"Sunil K Singh","year":"2021","unstructured":"Singh SK. Linux yourself: concept and programming. CRC Taylor & Francis Group; 2021"},{"issue":"1","key":"2566_CR33","doi-asserted-by":"publisher","first-page":"98","DOI":"10.3390\/s21010098","volume":"21","author":"DY Kim","year":"2020","unstructured":"Kim DY, Jung M, Kim S. An Internet of vehicles (IoV) access gateway design considering the efficiency of the in-vehicle ethernet backbone. Sensors. 2020;21(1):98","journal-title":"Sensors"},{"issue":"4","key":"2566_CR34","doi-asserted-by":"publisher","first-page":"e0282031","DOI":"10.1371\/journal.pone.0282031","volume":"18","author":"E Khezri","year":"2023","unstructured":"Khezri E, Zeinali E, Sargolzaey H. SGHRP: Secure Greedy Highway Routing Protocol with authentication and increased privacy in vehicular ad hoc networks. PLoS\u00a0ONE. 2023;18(4):e0282031","journal-title":"PLoS\u00a0ONE"},{"issue":"1","key":"2566_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-021-01938-y","volume":"2021","author":"C Ran","year":"2021","unstructured":"Ran C, Yan S, Huang L, Zhang L. An improved AODV routing security algorithm based on blockchain technology in ad hoc networks. EURASIP J Wirel Commun Netw. 2021;2021(1):1\u201316","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"2566_CR36","doi-asserted-by":"crossref","unstructured":"Perkins C, Belding-Royer E, Dasn S. Ad hoc on-demand distance vector (AODV) routing. Internet Eng Task Force (IETF). 2003; No. rfc3561","DOI":"10.17487\/rfc3561"},{"key":"2566_CR37","unstructured":"O\u2019Loughlin, D.  Daniel O\u2019Loughlin. ChipEstimate.com. https:\/\/www.chipestimate.com\/ECC-Drives-Next-Generation-Hardware-Security-Applications\/Certicom\/Technical-Article. Accessed 23 Aug 2023"},{"issue":"5","key":"2566_CR38","first-page":"229","volume":"3","author":"P Sachan","year":"2011","unstructured":"Sachan P, Khilar PM. Securing AODV routing protocol in MANET based on cryptographic authentication mechanism. Int J Netw Secur Appl. 2011;3(5):229.","journal-title":"Int J Netw Secur Appl"},{"key":"2566_CR39","doi-asserted-by":"crossref","unstructured":"Lo NW, Chiang MC, Hsu CY. The hash-based anonymous secure routing protocol in mobile ad hoc networks. In: 2015 10th Asia Joint Conference on Information Security. 2015; 55\u201362. IEEE.","DOI":"10.1109\/AsiaJCIS.2015.27"},{"issue":"19","key":"2566_CR40","doi-asserted-by":"publisher","first-page":"7503","DOI":"10.3390\/s22197503","volume":"22","author":"Y Shibasaki","year":"2022","unstructured":"Shibasaki Y, Iwamura K, Sato K. A communication-efficient secure routing protocol for IoT networks. Sensors. 2022;22(19):7503.","journal-title":"Sensors"},{"key":"2566_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-08612-z","author":"D Mavaluru","year":"2023","unstructured":"Mavaluru D, Enduri MK, Thiyagarajan A, Anamalamudi S, Srinivasan K, Carie CA, Narapureddy BR. An AI fuzzy clustering-based routing protocol for vehicular image recognition in vehicular ad hoc IoT networks. Soft Comput. 2023. https:\/\/doi.org\/10.1007\/s00500-023-08612-z.","journal-title":"Soft Comput"},{"key":"2566_CR42","doi-asserted-by":"publisher","first-page":"3567","DOI":"10.1007\/s12652-021-03486-1","volume":"14","author":"B Yelure","year":"2023","unstructured":"Yelure B, Sonavane S. SARP: secure routing protocol using anonymous authentication in vehicular Ad-hoc networks. J Ambient Intell Humaniz Comput. 2023;14:3567\u201381.","journal-title":"J Ambient Intell Humaniz Comput."},{"key":"2566_CR43","doi-asserted-by":"publisher","first-page":"103247","DOI":"10.1016\/j.advengsoft.2022.103247","volume":"173","author":"K Ambika","year":"2022","unstructured":"Ambika K, Malliga S. Secure hyper intelligence in routing protocol with low-power (RPL) networks in IoT. Adv Eng Softw. 2022;173:103247.","journal-title":"Adv Eng Softw"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02566-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02566-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02566-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T14:30:05Z","timestamp":1706797805000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-02566-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,27]]},"references-count":43,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["2566"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-02566-7","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,27]]},"assertion":[{"value":"16 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors whose names are listed immediately below certify that they have <b>NO<\/b> affiliations with or involvement in any organization or entity with any financial interest (such as honoraria, educational grants, participation in speakers\u2019 bureaus, membership, employment, consultancies, stock ownership, or other equity interest; and expert testimony or patent-licensing arrangements) or non-financial interest (such as personal or professional relationships, affiliations, knowledge, or beliefs) in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"236"}}