{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T12:18:28Z","timestamp":1775218708349,"version":"3.50.1"},"reference-count":107,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101095717"],"award-info":[{"award-number":["101095717"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["12-RC-2289-P2"],"award-info":[{"award-number":["12-RC-2289-P2"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["RS-2024-00450915"],"award-info":[{"award-number":["RS-2024-00450915"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Vehicular Communications"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.vehcom.2026.101014","type":"journal-article","created":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T22:51:43Z","timestamp":1772405503000},"page":"101014","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["EAGLE: A provably and verifiably secure blockchain-enabled dual-mode authentication scheme using reconfigurable PUFs for V2I communication"],"prefix":"10.1016","volume":"59","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3661-6048","authenticated-orcid":false,"given":"Basker","family":"Palaniswamy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5340-8526","authenticated-orcid":false,"given":"Raveendra Babu","family":"Ponnuru","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8008-8203","authenticated-orcid":false,"given":"Khondokar Fida","family":"Hasan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9819-4880","authenticated-orcid":false,"given":"Paolo","family":"Palmieri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8377-7015","authenticated-orcid":false,"given":"Venkatachalapathy Chikkadevudu","family":"Diniesh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9823-2920","authenticated-orcid":false,"given":"Palanisamy","family":"Anbarasan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5476-5461","authenticated-orcid":false,"given":"Madathil","family":"Sethumadhavan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0406-6547","authenticated-orcid":false,"given":"Youngho","family":"Park","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.vehcom.2026.101014_bib0001","doi-asserted-by":"crossref","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","article-title":"Eaap: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks","volume":"18","author":"Azees","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0002","unstructured":"H. Ahmadvand, F. Foroutan, Latency and privacy-aware resource allocation in vehicular edge computing, 2025. arXiv: 2501.02804."},{"key":"10.1016\/j.vehcom.2026.101014_bib0003","doi-asserted-by":"crossref","first-page":"2562","DOI":"10.1109\/TC.2015.2485225","article-title":"Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response","volume":"65","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/j.vehcom.2026.101014_sbref0004","series-title":"Upstream Security, Upstream\u2019s 2023 Global Automotive Cybersecurity Report","author":"Upstream Security","year":"2023"},{"key":"10.1016\/j.vehcom.2026.101014_bib0005","series-title":"IEEE International Instrumentation and Measurement Technology Conference","first-page":"1","article-title":"Internet of things: vehicle collision detection and avoidance in a vanet environment","author":"Anadu","year":"2018"},{"key":"10.1016\/j.vehcom.2026.101014_bib0006","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1109\/MCOM.2008.4539481","article-title":"A tutorial survey on vehicular ad hoc networks","volume":"46","author":"Hartenstein","year":"2008","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.vehcom.2026.101014_bib0007","doi-asserted-by":"crossref","DOI":"10.1109\/TITS.2025.3528932","article-title":"Identity-based authentication in VANETs: a review","author":"Manasrah","year":"2025","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0008","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1002\/spy2.210","article-title":"A survey on security challenges and protocols of electric vehicle dynamic charging system","volume":"5","author":"Babu","year":"2022","journal-title":"Secur. Privacy"},{"issue":"1","key":"10.1016\/j.vehcom.2026.101014_bib0009","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"Raya","year":"2007","journal-title":"J. Comput. Secur."},{"key":"10.1016\/j.vehcom.2026.101014_bib0010","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1109\/TITS.2015.2492981","article-title":"Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks","volume":"17","author":"Vijayakumar","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0011","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MVT.2017.2752760","article-title":"Secure group communications in vehicular networks: a software-defined network-enabled architecture and solution","volume":"12","author":"Lai","year":"2017","journal-title":"IEEE Veh. Technol. Mag."},{"key":"10.1016\/j.vehcom.2026.101014_bib0012","series-title":"IEEE INFOCOM 2008-The 27th Conference on Computer Communications","first-page":"246","article-title":"An efficient identity-based batch verification scheme for vehicular sensor networks","author":"Zhang","year":"2008"},{"key":"10.1016\/j.vehcom.2026.101014_bib0013","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1007\/s11276-013-0543-7","article-title":"Toward a secure batch verification with group testing for vanet","volume":"19","author":"Lee","year":"2013","journal-title":"Wireless Netw."},{"key":"10.1016\/j.vehcom.2026.101014_bib0014","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1109\/TITS.2016.2579162","article-title":"Distributed aggregate privacy-preserving authentication in vanets","volume":"18","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0015","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1109\/TITS.2015.2502322","article-title":"An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings","volume":"17","author":"Lo","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0016","doi-asserted-by":"crossref","first-page":"10283","DOI":"10.1109\/TVT.2017.2718101","article-title":"A secure privacy-preserving authentication scheme for vanet with cuckoo filter","volume":"66","author":"Cui","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.vehcom.2026.101014_bib0017","doi-asserted-by":"crossref","first-page":"7408","DOI":"10.1109\/TITS.2020.3002096","article-title":"Bcppa: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks","volume":"22","author":"Lin","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0018","doi-asserted-by":"crossref","first-page":"2792","DOI":"10.1109\/TVLSI.2019.2929420","article-title":"A blockchain-based privacy-preserving authentication scheme for vanets","volume":"27","author":"Lu","year":"2019","journal-title":"IEEE Trans. Very Large Scale Integr. VLSI Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0019","doi-asserted-by":"crossref","first-page":"2034","DOI":"10.1109\/TVT.2019.2957744","article-title":"Blockchain enabled trust-based location privacy protection scheme in vanet","volume":"69","author":"Luo","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.vehcom.2026.101014_bib0020","doi-asserted-by":"crossref","first-page":"4146","DOI":"10.1109\/TII.2019.2948053","article-title":"Bpas: blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks","volume":"16","author":"Feng","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.vehcom.2026.101014_bib0021","doi-asserted-by":"crossref","first-page":"3888","DOI":"10.1109\/TIFS.2021.3098971","article-title":"BA: a privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks","volume":"16","author":"Feng","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.vehcom.2026.101014_bib0022","doi-asserted-by":"crossref","first-page":"3547","DOI":"10.1109\/JSYST.2020.2991168","article-title":"A lightweight privacy-preserving authentication protocol for vanets","volume":"14","author":"Li","year":"2020","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.vehcom.2026.101014_bib0023","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.comcom.2021.03.022","article-title":"Three-factor authentication protocol using physical unclonable function for iov","volume":"173","author":"Jiang","year":"2021","journal-title":"Comput. Commun."},{"key":"10.1016\/j.vehcom.2026.101014_bib0024","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1109\/TDSC.2021.3135016","article-title":"A lightweight and conditional privacy-preserving authenticated key agreement scheme with multi-ta model for fog-based vanets","volume":"20","author":"Wei","year":"2021","journal-title":"IEEE Trans. Dependa. Secure Comput."},{"key":"10.1016\/j.vehcom.2026.101014_bib0025","first-page":"1739","article-title":"Aake-bivt: anonymous authenticated key exchange scheme for blockchain-enabled internet of vehicles in smart transportation","volume":"24","author":"Badshah","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0026","doi-asserted-by":"crossref","first-page":"9940","DOI":"10.1109\/TITS.2023.3266030","article-title":"An efficient and physically secure privacy-preserving key-agreement protocol for vehicular ad-hoc network","volume":"24","author":"Saleem","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0027","doi-asserted-by":"crossref","DOI":"10.1109\/TITS.2024.3383670","article-title":"A cost-efficient anonymous authenticated and key agreement scheme for v2i-based vehicular ad-hoc networks","author":"Saleem","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0028","doi-asserted-by":"crossref","first-page":"6727","DOI":"10.1109\/TVT.2023.3341693","article-title":"Puf-based privacy-preserving simultaneous authentication among multiple vehicles in vanet","volume":"73","author":"Awais","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.vehcom.2026.101014_bib0029","first-page":"1","article-title":"Blockchain-assisted privacy-preserving and synchronized key agreement for vdtns","author":"Wang","year":"2025","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"10.1016\/j.vehcom.2026.101014_bib0030","series-title":"A provable privacy protection authentication protocol for vehicle-to-vehicle communication","author":"Tian","year":"2025"},{"key":"10.1016\/j.vehcom.2026.101014_bib0031","doi-asserted-by":"crossref","DOI":"10.1109\/TVT.2025.3587756","article-title":"Authentication framework with enhanced privacy and batch verifiable message sharing in VANETs","author":"Naskar","year":"2025","journal-title":"IEEE Trans. Vehicul. Technol."},{"key":"10.1016\/j.vehcom.2026.101014_bib0032","article-title":"AuthUp: a privacy-preserving V2I authentication scheme for vehicular ad hoc networks","author":"Li","year":"2025","journal-title":"IEEE Trans. Vehicul. Technol."},{"key":"10.1016\/j.vehcom.2026.101014_bib0033","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2025.3532120","article-title":"Towards resilience 5G-V2N: efficient and privacy-preserving authentication protocol for multi-service access and handover","author":"Bi","year":"2025","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.vehcom.2026.101014_bib0034","article-title":"DTHA: a digital twin-assisted handover authentication scheme for 5G and beyond","author":"Li","year":"2025","journal-title":"IEEE Trans. Consmer Electron."},{"key":"10.1016\/j.vehcom.2026.101014_bib0035","article-title":"BAST: blockchain-assisted secure and traceable data sharing scheme for vehicular networks","author":"Liu","year":"2025","journal-title":"IEEE Trans. Inf. Foren. Secur."},{"key":"10.1016\/j.vehcom.2026.101014_bib0036","article-title":"Towards byzantine fault-tolerant non-interactive zero knowledge cross-domain batch authentication in VANET","author":"Qiu","year":"2025","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.vehcom.2026.101014_bib0037","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2025.104369","article-title":"CPPA-SKU: towards efficient conditional privacy-preserving authentication protocol with secret key update in VANET","volume":"245","author":"Fan","year":"2026","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.vehcom.2026.101014_bib0038","article-title":"Quantum-resistant blockchain-assisted certificateless authentication and three-party key agreement scheme for VANET","author":"Yan","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.vehcom.2026.101014_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109947","article-title":"A secure and efficient authentication and key agreement protocol in blockchain-enabled VANETs","volume":"122","author":"Shahparian","year":"2025","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.vehcom.2026.101014_bib0040","article-title":"GSAAS: a group signature-based anonymous authentication scheme for VANETs","author":"Deng","year":"2025","journal-title":"Vehic. Commun."},{"key":"10.1016\/j.vehcom.2026.101014_bib0041","article-title":"V-PISL: post-quantum identity-based signature scheme over lattice for VANETs","author":"Zou","year":"2025","journal-title":"Veh. Commun."},{"key":"10.1016\/j.vehcom.2026.101014_bib0042","article-title":"A blockchain-enhanced trust-driven batch authentication scheme for secure VANETs","author":"Liao","year":"2025","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.vehcom.2026.101014_bib0043","article-title":"Lightweight anonymous aggregate authentication in VANET based on offline\/online certificateless signcryption using one-time key","author":"Imam","year":"2025","journal-title":"Vehic. Commun."},{"key":"10.1016\/j.vehcom.2026.101014_bib0044","article-title":"Quantum-safe and provable secure vehicle to infrastructure authenticated key-agreement for VANETs","volume":"95","author":"Wani","year":"2025","journal-title":"J. Infor. Secur. Appl."},{"key":"10.1016\/j.vehcom.2026.101014_bib0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2024.103670","article-title":"Escrow-free and efficient dynamic anonymous privacy-preserving batch verifiable authentication scheme for VANETs","volume":"166","author":"Verma","year":"2025","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.vehcom.2026.101014_bib0046","doi-asserted-by":"crossref","DOI":"10.1109\/TVT.2025.3566415","article-title":"Dynamic anonymous hierarchical edge-assisted batch verifiable authentication for VANETs","author":"Verma","year":"2025","journal-title":"IEEE Trans. Vehic. Technol."},{"key":"10.1016\/j.vehcom.2026.101014_bib0047","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2025.108048","article-title":"Dbva: double-layered blockchain architecture for enhanced security in vanet vehicular authentication","volume":"232","author":"Frimpong","year":"2025","journal-title":"Comput. Commun."},{"key":"10.1016\/j.vehcom.2026.101014_bib0048","series-title":"Adaptive and efficient authentication for VANETs: a cross-layer framework for resilient communication","first-page":"111581","author":"Ramadan","year":"2025"},{"key":"10.1016\/j.vehcom.2026.101014_bib0049","article-title":"Three-factor authentication and key agreement protocol with collusion resistance in VANETs","volume":"90","author":"Pan","year":"2025","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.vehcom.2026.101014_bib0050","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-08656-1","article-title":"A lightweight certificateless aggregate signature scheme without pairing for VANETs","volume":"15","author":"Yue","year":"2025","journal-title":"Sci. Rep."},{"key":"10.1016\/j.vehcom.2026.101014_bib0051","article-title":"Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks","volume":"163","author":"Xiong","year":"2025","journal-title":"Fut. Gen. Comput. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0052","series-title":"Authentication Protocol for Vehicular Networks using Zero-Knowledge Proofs and Elliptic Curve Cryptography","author":"Lo","year":"2025"},{"key":"10.1016\/j.vehcom.2026.101014_bib0053","series-title":"Proceedings of the 1st ACM Conference on Computer and Communications Security","first-page":"62","article-title":"Random oracles are practical: a paradigm for designing efficient protocols","author":"Bellare","year":"1993"},{"issue":"5","key":"10.1016\/j.vehcom.2026.101014_bib0054","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","article-title":"Securing vehicular communications","volume":"13","author":"Raya","year":"2006","journal-title":"IEEE Wireless Commun."},{"issue":"6","key":"10.1016\/j.vehcom.2026.101014_bib0055","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","article-title":"GSIS: a secure and privacy-preserving protocol for vehicular communications","volume":"56","author":"Lin","year":"2007","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.vehcom.2026.101014_bib0056","doi-asserted-by":"crossref","first-page":"10626","DOI":"10.1109\/TVT.2017.2744182","article-title":"Anonymous and lightweight authentication for secure vehicular networks","volume":"66","author":"Ying","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.vehcom.2026.101014_bib0057","article-title":"Continuous authentication for vanet","volume":"25","author":"Palaniswamy","year":"2020","journal-title":"Veh. Commun."},{"key":"10.1016\/j.vehcom.2026.101014_bib0058","first-page":"1","article-title":"Secure and reliable authentication protocol for energy internet-enabled vehicle-to-grid communication system","author":"Khan","year":"2025","journal-title":"IEEE Trans. Consum. Electron."},{"key":"10.1016\/j.vehcom.2026.101014_bib0059","article-title":"A secure and efficient lattice-based conditional privacy-preserving authentication protocol for the VANET","author":"Shi","year":"2025","journal-title":"Veh. Commun."},{"key":"10.1016\/j.vehcom.2026.101014_bib0060","article-title":"A blockchain-based efficient traceability authentication scheme in VANET","author":"Zhao","year":"2025","journal-title":"Dig. Commun. Netw."},{"key":"10.1016\/j.vehcom.2026.101014_bib0061","unstructured":"R. Pappu, Physical One-Way Functions, Massachusetts Institute of Technology, 2001. Ph.D. dissertation."},{"key":"10.1016\/j.vehcom.2026.101014_bib0062","series-title":"Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting","author":"Tuyls","year":"2007"},{"key":"10.1016\/j.vehcom.2026.101014_bib0063","series-title":"Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems (CHES)","first-page":"451","article-title":"Secure lightweight entity authentication with strong PUFs: mission impossible?","author":"Delvaux","year":"2014"},{"key":"10.1016\/j.vehcom.2026.101014_bib0064","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical unclonable functions and applications: a tutorial","volume":"102","author":"Herder","year":"2014","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.vehcom.2026.101014_bib0065","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1109\/TIFS.2019.2891223","article-title":"Machine-learning attacks on polypufs, ob-pufs, rpufs, lhs-pufs, and puf-fsms","volume":"14","author":"Delvaux","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.vehcom.2026.101014_bib0066","series-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security","first-page":"237","article-title":"Modeling attacks on physical unclonable functions","author":"R\u00fchrmair","year":"2010"},{"key":"10.1016\/j.vehcom.2026.101014_bib0067","series-title":"2016 International Conference on Compliers, Architectures, and Sythesis of Embedded Systems (CASES)","first-page":"1","article-title":"An intrinsically reconfigurable DRAM PUF for device authentication in embedded systems","author":"Sutar","year":"2016"},{"key":"10.1016\/j.vehcom.2026.101014_bib0068","first-page":"350","article-title":"An approximation to the gamma function","volume":"2","author":"Ramanujan","year":"1917","journal-title":"Proc. London Math. Soc."},{"key":"10.1016\/j.vehcom.2026.101014_bib0069","series-title":"The Art of Computer Programming, Volume 1: Fundamental Algorithms","article-title":"Section 1.2.11 discusses stirling\u2019s approximation and bounds","volume":"1","author":"Knuth","year":"1997"},{"key":"10.1016\/j.vehcom.2026.101014_bib0070","series-title":"Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS)","first-page":"28","article-title":"Public-key encryption based on chebyshev maps","volume":"3","author":"Kocarev","year":"2001"},{"key":"10.1016\/j.vehcom.2026.101014_bib0071","first-page":"1310","article-title":"Chaotic block ciphers: from theory to practical algorithms","volume":"53","author":"Kocarev","year":"2006","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"10.1016\/j.vehcom.2026.101014_bib0072","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","article-title":"Security of public-key cryptosystems based on chebyshev polynomials","volume":"52","author":"Bergamo","year":"2005","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"10.1016\/j.vehcom.2026.101014_bib0073","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.chaos.2007.01.017","article-title":"Security of a key agreement protocol based on chaotic maps","volume":"38","author":"Han","year":"2008","journal-title":"Chaos Solitons Fract."},{"key":"10.1016\/j.vehcom.2026.101014_bib0074","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10.1016\/j.vehcom.2026.101014_bib0075","first-page":"918","article-title":"Monte Carlo methods for index computation (mod p)","volume":"32","author":"Pollard","year":"1978","journal-title":"Math. Comput."},{"key":"10.1016\/j.vehcom.2026.101014_bib0076","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1996"},{"key":"10.1016\/j.vehcom.2026.101014_bib0077","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","article-title":"Dedicated short-range communications (DSRC) standards in the United States","volume":"99","author":"Kenney","year":"2011","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.vehcom.2026.101014_bib0078","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10.1016\/j.vehcom.2026.101014_bib0079","doi-asserted-by":"crossref","first-page":"44772","DOI":"10.1109\/ACCESS.2023.3267764","article-title":"Privacy-preserving and security in sdn-based iot: a survey","volume":"11","author":"Ahmadvand","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.vehcom.2026.101014_bib0080","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/71.877936","article-title":"Key agreement in dynamic peer groups","volume":"11","author":"Steiner","year":"2000","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0081","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"453","article-title":"Analysis of key-exchange protocols and their use for building secure channels","author":"Canetti","year":"2001"},{"key":"10.1016\/j.vehcom.2026.101014_bib0082","article-title":"Continuous authentication for VANET","volume":"25","author":"Palaniswamy","year":"2020","journal-title":"Veh. Commun."},{"key":"10.1016\/j.vehcom.2026.101014_bib0083","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1109\/COMST.2014.2345420","article-title":"Pseudonym schemes in vehicular networks: a survey","volume":"17","author":"Petit","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.vehcom.2026.101014_bib0084","first-page":"1091","article-title":"A dynamically configurable puf and dynamic matching authentication protocol","volume":"10","author":"Wang","year":"2022","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"10.1016\/j.vehcom.2026.101014_bib0085","doi-asserted-by":"crossref","first-page":"51","DOI":"10.3390\/cryptography6040051","article-title":"Efficient ro-puf for generation of identifiers and keys in resource-constrained embedded systems","volume":"6","author":"Mart\u00ednez-Rodr\u00edguez","year":"2022","journal-title":"Cryptography"},{"key":"10.1016\/j.vehcom.2026.101014_bib0086","article-title":"Integration of blockchain with connected and autonomous vehicles: vision and challenge","volume":"14","author":"Dargahi","year":"2021","journal-title":"J. Data Inf. Qual."},{"key":"10.1016\/j.vehcom.2026.101014_bib0087","series-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security","first-page":"241","article-title":"Security proofs for an efficient password-based key exchange","author":"Bresson","year":"2003"},{"key":"10.1016\/j.vehcom.2026.101014_bib0088","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/0166-218X(92)90177-C","article-title":"Birthday paradox, coupon collectors, caching algorithms and self-organizing search","volume":"39","author":"Flajolet","year":"1992","journal-title":"Discrete Appl. Math."},{"key":"10.1016\/j.vehcom.2026.101014_bib0089","series-title":"The Nature of Statistical Learning Theory","author":"Vapnik","year":"1999"},{"key":"10.1016\/j.vehcom.2026.101014_bib0090","doi-asserted-by":"crossref","first-page":"3107","DOI":"10.1109\/TIFS.2020.2983285","article-title":"An efficient authentication scheme for intra-vehicular controller area network","volume":"15","author":"Palaniswamy","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.vehcom.2026.101014_bib0091","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1773","article-title":"A comprehensive symbolic analysis of tls 1.3","author":"Cremers","year":"2017"},{"key":"10.1016\/j.vehcom.2026.101014_bib0092","series-title":"Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security","article-title":"Secure authentication in the grid: a formal analysis of dnp3","author":"Cremers","year":"2017"},{"key":"10.1016\/j.vehcom.2026.101014_bib0093","series-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security 22)","first-page":"3935","article-title":"SAPIC : protocol verifiers of the world, unite!","author":"Cheval","year":"2022"},{"key":"10.1016\/j.vehcom.2026.101014_sbref0094","series-title":"Tepla library","author":"Tepla library","year":"2025"},{"key":"10.1016\/j.vehcom.2026.101014_bib0095","doi-asserted-by":"crossref","first-page":"2193","DOI":"10.1109\/TITS.2016.2517603","article-title":"An efficient anonymous batch authentication scheme based on hmac for vanets","volume":"17","author":"Jiang","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.vehcom.2026.101014_bib0096","series-title":"Technical Report","article-title":"Analysis and evaluation of real-time and safety characteristics of ieee 802.11 p protocol in vanet","author":"Ahmadvand","year":"2016"},{"key":"10.1016\/j.vehcom.2026.101014_sbref0098","series-title":"Ireland\u2019s National Cooperative ITS (C-ITS) Pilot, Web page","author":"Transport Infrastructure Ireland (TII)","year":"2025"},{"key":"10.1016\/j.vehcom.2026.101014_sbref0099","series-title":"Connected Vehicle Pilot (C-ITS Pilot Participant Platform), Web portal","author":"Transport Infrastructure Ireland (TII)","year":"2025"},{"key":"10.1016\/j.vehcom.2026.101014_sbref0100","series-title":"Connected vehicle technology to safeguard road users","author":"Department of Transport","year":"2024"},{"key":"10.1016\/j.vehcom.2026.101014_sbref0101","series-title":"Directorate-General for Mobil ITS Progress Report \u2013 Ireland (Report Year 2020), Dec 2025, PDF report, 2021","author":"European Commission","year":"2021"},{"key":"10.1016\/j.vehcom.2026.101014_bib0101","unstructured":"C-Roads Platform, Ireland- C-Roads Core Member Deployment Page, Web page, 2025. Web page,Accessed: 29 Dec 2025, https:\/\/www.c-roads.eu\/deployments\/core-members\/ireland\/Partner\/project\/show\/ireland.html."},{"key":"10.1016\/j.vehcom.2026.101014_sbref0103","series-title":"ITS Asia-Pacific, 5G AIoT Driven ITS Technologies for Innovative Services (Taiwan \/ MOTC trial overview slides)","author":"ITS Asia\u2013Pacific","year":"2024"},{"key":"10.1016\/j.vehcom.2026.101014_bib0103","series-title":"Project Overview - Connected Vehicle Open Field Test (Danhai New Town)","author":"Danhai","year":"2018"},{"key":"10.1016\/j.vehcom.2026.101014_bib0104","series-title":"Technical Report (PDF)","article-title":"Security Credential Management System (SCMS) Overview","author":"USDOT","year":"2019"},{"key":"10.1016\/j.vehcom.2026.101014_bib0105","series-title":"IEEE Vehicular Networking Conference","article-title":"A security credential management system for V2X communications","author":"Whyte","year":"2013"},{"key":"10.1016\/j.vehcom.2026.101014_bib0106","series-title":"Technical Report","article-title":"Qualcomm Trusted Application Emulation for Fuzzing Testing","author":"Chun-I","year":"2025"},{"key":"10.1016\/j.vehcom.2026.101014_bib0107","series-title":"The American Transcendentalists: Essential Writings, Modern Library","author":"Buell","year":"2003"}],"container-title":["Vehicular Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214209626000161?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214209626000161?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T11:43:03Z","timestamp":1775216583000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214209626000161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":107,"alternative-id":["S2214209626000161"],"URL":"https:\/\/doi.org\/10.1016\/j.vehcom.2026.101014","relation":{},"ISSN":["2214-2096"],"issn-type":[{"value":"2214-2096","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"EAGLE: A provably and verifiably secure blockchain-enabled dual-mode authentication scheme using reconfigurable PUFs for V2I communication","name":"articletitle","label":"Article Title"},{"value":"Vehicular Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.vehcom.2026.101014","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"101014"}}