{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T03:14:13Z","timestamp":1775013253163,"version":"3.50.1"},"reference-count":44,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T00:00:00Z","timestamp":1652227200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Connection Science"],"published-print":{"date-parts":[[2022,12,31]]},"DOI":"10.1080\/09540091.2022.2032602","type":"journal-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T05:13:31Z","timestamp":1652246011000},"page":"1430-1453","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":22,"title":["A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles"],"prefix":"10.1080","volume":"34","author":[{"given":"Jing","family":"Zheng","sequence":"first","affiliation":[{"name":"Hunan University of Science and Technology","place":["Xiangtan, People's Republic of China"]},{"name":"Hunan Key Laboratory for Service Computing and Novel Software Technology","place":["XiangTan, People's Republic of China"]}]},{"given":"Xiaoliang","family":"Wang","sequence":"additional","affiliation":[{"name":"Hunan University of Science and Technology","place":["Xiangtan, People's Republic of China"]},{"name":"Hunan Key Laboratory for Service Computing and Novel Software Technology","place":["XiangTan, People's Republic of China"]}]},{"given":"Qing","family":"Yang","sequence":"additional","affiliation":[{"name":"Hunan University of Science and Technology","place":["Xiangtan, People's Republic of China"]},{"name":"Guangzhou Maritime University","place":["Guangzhou, People's Republic of China"]}]},{"given":"Wenhui","family":"Xiao","sequence":"additional","affiliation":[{"name":"Central South University","place":["Changsha, People's Republic of China"]}]},{"given":"Yapeng","family":"Sun","sequence":"additional","affiliation":[{"name":"Central South University","place":["Changsha, People's Republic of China"]}]},{"given":"Wei","family":"Liang","sequence":"additional","affiliation":[{"name":"Hunan University of Science and Technology","place":["Xiangtan, People's Republic of China"]},{"name":"Hunan Key Laboratory for Service Computing and Novel Software Technology","place":["XiangTan, People's Republic of China"]}]}],"member":"301","published-online":{"date-parts":[[2022,5,11]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2666783"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3745-3"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2017.1310181"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102802"},{"key":"e_1_3_2_8_1","unstructured":"Fromknecht C. Velicanu D. & Yakoubov S. (2014). Certcoin: A namecoin based decentralized authentication system (Tech. Rep. No. 6) (pp. 46\u201356). Massachusetts Institute of Technology."},{"key":"e_1_3_2_9_1","doi-asserted-by":"crossref","unstructured":"Huang C. M. Tu L. & Chou C. H. (2010). ReWarn: An opportunistic relay scheme for cooperative collision warning in VANET. IEEE International Symposium on Personal.","DOI":"10.1109\/PIMRC.2009.5449794"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3096928"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2517603"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2740569"},{"key":"e_1_3_2_16_1","unstructured":"Lei Z. (2016). Research and implementation of VANETs secure authentication and privacy protection. Anhui University."},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.1956879"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.9424"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.9424"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3053842"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.2993032"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.1901072"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2018.1512557"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2808444"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.07.004"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700511"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"e_1_3_2_28_1","doi-asserted-by":"crossref","unstructured":"Vasudev H. & Das D. (2018). Secure lightweight data transmission scheme for vehicular Ad Hoc networks. In 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1\u20136). IEEE.","DOI":"10.1109\/ANTS.2018.8710161"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106555"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.25"},{"key":"e_1_3_2_31_1","doi-asserted-by":"crossref","unstructured":"Wang B. Chang Z. Zhou Z. & Ristaniemi T. (2018). Reliable and privacy-preserving task recomposition for crowdsensing in vehicular fog computing. In 2018 IEEE 87th vehicular technology conference (VTC Spring) (pp. 1\u20136). IEEE.","DOI":"10.1109\/VTCSpring.2018.8417688"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3068268"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.2978866"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/Access.6287639"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.1993137"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.2017853"},{"key":"e_1_3_2_37_1","doi-asserted-by":"crossref","unstructured":"Xiao Y. & Zhu C. (2017). Vehicular fog computing: Vision and challenges. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (Percom Workshops) (pp. 6\u20139). IEEE.","DOI":"10.1109\/PERCOMW.2017.7917508"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.11.009"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.11.003"},{"key":"e_1_3_2_40_1","doi-asserted-by":"crossref","unstructured":"Yahiatene Y. & Rachedi A. (2018). Towards a blockchain and software-defined vehicular networks approaches to secure vehicular social network. In 2018 IEEE Conference on Standards for Communications and Networking (CSCN) (pp. 1\u20137). IEEE.","DOI":"10.1109\/CSCN.2018.8581756"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.046"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2892009"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3088407"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1782840"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.1936455"}],"container-title":["Connection Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09540091.2022.2032602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T20:20:59Z","timestamp":1772742059000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09540091.2022.2032602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,11]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12,31]]}},"alternative-id":["10.1080\/09540091.2022.2032602"],"URL":"https:\/\/doi.org\/10.1080\/09540091.2022.2032602","relation":{},"ISSN":["0954-0091","1360-0494"],"issn-type":[{"value":"0954-0091","type":"print"},{"value":"1360-0494","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,11]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-09-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}