{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:32:59Z","timestamp":1776076379239,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T00:00:00Z","timestamp":1591401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T00:00:00Z","timestamp":1591401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN Appl. Sci."],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s42452-020-2984-9","type":"journal-article","created":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T07:02:23Z","timestamp":1591426943000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Privacy and security challenges in smart and sustainable mobility"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0041-8939","authenticated-orcid":false,"given":"Sara","family":"Paiva","sequence":"first","affiliation":[]},{"given":"Mohd Abdul","family":"Ahad","sequence":"additional","affiliation":[]},{"given":"Sherin","family":"Zafar","sequence":"additional","affiliation":[]},{"given":"Gautami","family":"Tripathi","sequence":"additional","affiliation":[]},{"given":"Aqeel","family":"Khalique","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,6]]},"reference":[{"issue":"4","key":"2984_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MPRV.2006.69","volume":"5","author":"B Hoh","year":"2006","unstructured":"Hoh B, Gruteser M, Xiong H, Alrabady A (2006) Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Comput 5(4):38\u201346","journal-title":"IEEE Pervasive Comput"},{"issue":"11","key":"2984_CR2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.2009.5307471","volume":"47","author":"P Papadimitratos","year":"2009","unstructured":"Papadimitratos P, Fortelle AL, Evenssen K, Brignolo R, Cosenza S (2009) Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun Mag 47(11):84\u201395","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"2984_CR3","doi-asserted-by":"publisher","first-page":"332","DOI":"10.3390\/s19020332","volume":"19","author":"T Sobral","year":"2019","unstructured":"Sobral T, Galv\u00e3o T, Borges J (2019) Visualization of urban mobility data from intelligent transportation systems. Sensors 19(2):332","journal-title":"Sensors"},{"issue":"3","key":"2984_CR4","first-page":"342","volume":"6","author":"L Staricco","year":"2013","unstructured":"Staricco L (2013) Smart mobility: opportunit\u00e0 e condizioni. J Land Use Mob Environ 6(3):342\u2013354","journal-title":"J Land Use Mob Environ"},{"issue":"1","key":"2984_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MVT.2009.935537","volume":"5","author":"G Dimitrakopoulos","year":"2010","unstructured":"Dimitrakopoulos G, Demestichas P (2010) Intelligent transportation systems. IEEE Veh Technol Mag 5(1):77\u201384","journal-title":"IEEE Veh Technol Mag"},{"key":"2984_CR6","unstructured":"GEOTAB (2018) What is smart mobility? Last accessed on 30 Aug. https:\/\/www.geotab.com\/blog\/what-is-smart-mobility\/"},{"key":"2984_CR7","unstructured":"Mimbela LEY, Klein LA (2000) Summary of vehicle detection and surveillance technologies used in intelligent transportation systems. Federal Highway Administration s (FHWA) Intelligent Transportation Systems Joint Program Office. Available at https:\/\/www.fhwa.dot.gov\/ohim\/tvtw\/vdstits.pdf. Accessed 1 Feb 2020"},{"key":"2984_CR8","doi-asserted-by":"publisher","unstructured":"Papa R, Gargiulo C, Russo L (2017) The evolution of smart mobility strategies and behaviors to build the smart city, pp 409\u2013414. https:\/\/doi.org\/10.1109\/mtits.2017.8005707","DOI":"10.1109\/mtits.2017.8005707"},{"key":"2984_CR9","volume-title":"Blockchain: blueprint for a new economy","author":"M Swan","year":"2015","unstructured":"Swan M (2015) Blockchain: blueprint for a new economy. O\u2019Reilly Media Inc, Sebastopol"},{"key":"2984_CR10","volume-title":"Projecting the growth and economic impact of the internet of things","author":"A Thierer","year":"2015","unstructured":"Thierer A, Castillo A (2015) Projecting the growth and economic impact of the internet of things, vol 15. Mercatus Center, George Mason University, Fairfax"},{"key":"2984_CR11","unstructured":"Carlson M, Yoder A, Schoeb L, Deel D, Pratt C, Lionetti C, Voigt D (2014) Software defined storage. Storage Networking Industry Association, working draft, pp 20\u201324"},{"issue":"3","key":"2984_CR12","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2004.26","volume":"2","author":"J-P Hubaux","year":"2004","unstructured":"Hubaux J-P, Capkun S, Luo J (2004) The security and privacy of smart vehicles. IEEE Secur Priv 2(3):49\u201355","journal-title":"IEEE Secur Priv"},{"issue":"1","key":"2984_CR13","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.inffus.2010.06.001","volume":"12","author":"NE El Faouzi","year":"2011","unstructured":"El Faouzi NE, Leung H, Kurian A (2011) Data fusion in intelligent transportation systems: progress and challenges\u2014a survey. Inf Fusion 12(1):4\u201310","journal-title":"Inf Fusion"},{"key":"2984_CR14","unstructured":"Gerdes RM, Winstead C, Heaslip K (2019) CPS: an efficiency-motivated attack against autonomous vehicular transportation. In: Proceedings of ACM 2"},{"issue":"3","key":"2984_CR15","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1002\/wcm.616","volume":"9","author":"M Tubaishat","year":"2009","unstructured":"Tubaishat M, Zhuang P, Qi Q, Shang Y (2009) Wireless sensor networks in intelligent transportation systems. Wirel Commun Mob Comput 9(3):287\u2013302","journal-title":"Wirel Commun Mob Comput"},{"key":"2984_CR16","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.trc.2019.01.014","volume":"100","author":"AA Ganin","year":"2019","unstructured":"Ganin AA, Mersky AC, Jin AS, Kitsak M, Keisler JM, Linkov I (2019) Resilience in intelligent transportation systems (ITS). Transp Res C Emerg Technol 100:318\u2013329","journal-title":"Transp Res C Emerg Technol"},{"key":"2984_CR17","doi-asserted-by":"crossref","unstructured":"Schoettle B, Sivak M (2014) A survey of public opinion about autonomous and self-driving vehicles in the US, the UK, and Australia","DOI":"10.1109\/ICCVE.2014.7297637"},{"issue":"1","key":"2984_CR18","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/6979.869021","volume":"1","author":"Y Zhao","year":"2000","unstructured":"Zhao Y (2000) Mobile phone location determination and its impact on intelligent transportation systems. IEEE Trans Intell Transp Syst 1(1):55\u201364","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2984_CR19","doi-asserted-by":"publisher","first-page":"10","DOI":"10.4271\/11-01-02-0004","volume":"10","author":"KB Kelarestaghi","year":"2018","unstructured":"Kelarestaghi KB, Heaslip K, Fessmann V, Khalilikhah M, Fuentes A (2018) Intelligent transportation system security: hacked message signs. SAE Int J Transp Cybersecur Priv 10:10. https:\/\/doi.org\/10.4271\/11-01-02-0004","journal-title":"SAE Int J Transp Cybersecur Priv"},{"issue":"1","key":"2984_CR20","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.inffus.2010.01.002","volume":"12","author":"ML Tam","year":"2011","unstructured":"Tam ML, Lam WH (2011) Application of automatic vehicle identification technology for real-time journey time estimation. Inf Fusion 12(1):11\u201319","journal-title":"Inf Fusion"},{"issue":"3","key":"2984_CR21","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes BAA, Mendonca M, Nguyen XN, Obraczka K, Turletti T (2014) A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun Surv Tutor 16(3):1617\u20131634","journal-title":"IEEE Commun Surv Tutor"},{"key":"2984_CR22","doi-asserted-by":"crossref","unstructured":"Thereska E, Ballani H, O\u2019Shea G, Karagiannis T, Rowstron A, Talpey T, Zhu T (2013) IOFlow: a software-defined storage architecture. In: Proceedings of the twenty-fourth acm symposium on operating systems principles. ACM, pp 182\u2013196","DOI":"10.1145\/2517349.2522723"},{"issue":"5","key":"2984_CR23","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.3390\/s18051573","volume":"18","author":"Y Ming","year":"2018","unstructured":"Ming Y, Shen X (2018) PCPA: a practical certificateless conditional privacy preserving authentication scheme for vehicular ad hoc networks. Sensors 18(5):1573","journal-title":"Sensors"},{"key":"2984_CR24","doi-asserted-by":"crossref","unstructured":"D\u00f6tzer F (2005) Privacy issues in vehicular ad hoc networks. In: Proceedings of international workshop privacy enhancing technologies, pp 197\u2013209","DOI":"10.1007\/11767831_13"},{"key":"2984_CR25","unstructured":"Ozbay K, Kachroo P (1999) Incident management in intelligent transportation systems. Norwood, MA: Artech House Publishers, pp 1\u2013248. https:\/\/digitalscholarship.unlv.edu\/ece_fac_articles\/103"},{"key":"2984_CR26","volume-title":"Smart mobility, reducing congestion and fostering faster, greener, and cheaper transportation options","author":"P Viechnicki","year":"2015","unstructured":"Viechnicki P, Khuperkar A, Fishman T, Eggers W (2015) Smart mobility, reducing congestion and fostering faster, greener, and cheaper transportation options. Deloitte University Press, New York"},{"key":"2984_CR27","unstructured":"Elmaghraby A (2013) Security and privacy in the Smart City. In: 6th Ajman international urban planning conference AIUPC, United Arab Emirates"},{"issue":"2","key":"2984_CR28","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1109\/JPROC.2006.888405","volume":"95","author":"C Miyajima","year":"2007","unstructured":"Miyajima C et al (2007) Driver modeling based on driving behavior and its evaluation in driver identification. Proc IEEE 95(2):427\u2013437","journal-title":"Proc IEEE"},{"key":"2984_CR29","doi-asserted-by":"crossref","unstructured":"Darabseh A, Al-Ayyoub M, Jararweh Y, Benkhelifa E, Vouk M, Rindos A (2015) Sdstorage: a software defined storage experimental framework. In: 2015 IEEE international conference on cloud engineering. IEEE, pp 341\u2013346","DOI":"10.1109\/IC2E.2015.60"},{"issue":"4","key":"2984_CR30","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1109\/TITS.2011.2158001","volume":"12","author":"J Zhang","year":"2011","unstructured":"Zhang J, Wang FY, Wang K, Lin WH, Xu X, Chen C (2011) Data-driven intelligent transportation systems: a survey. IEEE Trans Intell Transp Syst 12(4):1624\u20131639","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2984_CR31","doi-asserted-by":"crossref","unstructured":"Figueiredo L, Jesus I, Machado JT, Ferreira JR, De Carvalho JM (2001) Towards the development of intelligent transportation systems. In: Proceedings of the ITSC 2001. 2001 IEEE intelligent transportation systems (cat. no. 01TH8585). IEEE, pp 1206\u20131211","DOI":"10.1109\/ITSC.2001.948835"},{"key":"2984_CR32","unstructured":"Fink WG (1995) Intelligent transportation systems. In: IEEE 1995 microwave and millimeter-wave. monolithic circuits symposium. Digest of papers. IEEE, p 3"},{"key":"2984_CR33","first-page":"31","volume":"43","author":"KB Kelarestaghi","year":"2017","unstructured":"Kelarestaghi KB, Zhang W, Wang Y, Xiao L, Hancock K, Heaslip KP (2017) Impacts to crash severity outcome due to adverse weather and other causation factors. Adv Transp Stud 43:31\u201342","journal-title":"Adv Transp Stud"},{"issue":"6","key":"2984_CR34","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","volume":"16","author":"F Qu","year":"2015","unstructured":"Qu F, Wu Z, Wang F-Y, Cho W (2015) A security and privacy review of VANETs. IEEE Trans Intell Transp Syst 16(6):2985\u20132996","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2984_CR35","unstructured":"Ishtiaq Roufa RM et al (2010) Security and privacy vulnerabilities of incar wireless networks: a tire pressure monitoring system case study. In: Proceedings of the 19th USENIX security symposium, Washington, DC, pp 11\u201313"},{"key":"2984_CR36","unstructured":"Selyukh A (2017) Yahoo hack likely breached 3 billion accounts, all that existed in mid-2013: the two-way: NPR. https:\/\/www.npr.org\/sections\/thetwo-way\/2017\/10\/03\/555016024\/every-yahoo-account-that-existed-in-mid-2013-was-likely-hacked. Accessed 7 Jan 2019"},{"key":"2984_CR37","unstructured":"Newman LH (2019) Equifax officially has no excuse. Wired. https:\/\/www.wired.com\/story\/equifax-breach-noexcuse\/. Accessed 7 Jan 2019"},{"issue":"3","key":"2984_CR38","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/TITS.2010.2060218","volume":"11","author":"FY Wang","year":"2010","unstructured":"Wang FY (2010) Parallel control and management for intelligent transportation systems: concepts, architectures, and applications. IEEE Trans Intell Trans Sys 11(3):630\u2013638","journal-title":"IEEE Trans Intell Trans Sys"},{"key":"2984_CR39","doi-asserted-by":"crossref","unstructured":"Kreutz D, Ramos F, Verissimo P, Rothenberg CE, Azodolmolky S, Uhlig S (2014) Software-defined networking: a comprehensive survey. arXiv preprint arXiv:1406.0440","DOI":"10.1109\/JPROC.2014.2371999"},{"issue":"2","key":"2984_CR40","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2013.6461195","volume":"51","author":"H Kim","year":"2013","unstructured":"Kim H, Feamster N (2013) Improving network management with software defined networking. IEEE Commun Mag 51(2):114\u2013119","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"2984_CR41","first-page":"30","volume":"17","author":"N McKeown","year":"2009","unstructured":"McKeown N (2009) Software-defined networking. INFOCOM Keynote Talk 17(2):30\u201332","journal-title":"INFOCOM Keynote Talk"},{"issue":"6\u201310","key":"2984_CR42","first-page":"71","volume":"2","author":"M Crosby","year":"2016","unstructured":"Crosby M, Pattanayak P, Verma S, Kalyanaraman V (2016) Blockchain technology: beyond bitcoin. Appl Innov 2(6\u201310):71","journal-title":"Appl Innov"},{"key":"2984_CR43","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops. IEEE, pp 180\u2013184","DOI":"10.1109\/SPW.2015.27"},{"key":"2984_CR44","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/j.procs.2019.11.018","volume":"160","author":"S Parikh","year":"2019","unstructured":"Parikh S, Dave D, Patel R, Doshi N (2019) Security and privacy issues in cloud, fog and edge computing. Procedia Comput Sci 160:734\u2013739","journal-title":"Procedia Comput Sci"},{"key":"2984_CR45","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680\u2013698","journal-title":"Future Gener Comput Syst"},{"key":"2984_CR46","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W et al (2016) Edge computing: vision and challenges. IEEE Internet Things 3:637\u2013646","journal-title":"IEEE Internet Things"},{"key":"2984_CR47","unstructured":"Kalloniatis C, Kavroudakis D, Polydoropoulou A, Gritzalis S (2019) Secure and privacy-aware intelligent transport systems and their role on smart cities development (no. 19-05814)"},{"issue":"1","key":"2984_CR48","doi-asserted-by":"publisher","first-page":"73","DOI":"10.4018\/IJAGR.2019010104","volume":"10","author":"C Kalloniatis","year":"2019","unstructured":"Kalloniatis C, Kavroudakis D, Polidoropoulou A, Gritzalis S (2019) Designing privacy-aware intelligent transport systems: a roadmap for identifying the major privacy concepts. Int J Appl Geospat Res IJAGR 10(1):73\u201391","journal-title":"Int J Appl Geospat Res IJAGR"}],"container-title":["SN Applied Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42452-020-2984-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42452-020-2984-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42452-020-2984-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,5]],"date-time":"2021-06-05T23:06:18Z","timestamp":1622934378000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42452-020-2984-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,6]]},"references-count":48,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["2984"],"URL":"https:\/\/doi.org\/10.1007\/s42452-020-2984-9","relation":{},"ISSN":["2523-3963","2523-3971"],"issn-type":[{"value":"2523-3963","type":"print"},{"value":"2523-3971","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,6]]},"assertion":[{"value":"7 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}],"article-number":"1175"}}