{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T05:31:25Z","timestamp":1775799085783,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Major Project of Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91120306\/F03"],"award-info":[{"award-number":["91120306\/F03"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2986338","type":"journal-article","created":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T21:58:25Z","timestamp":1586296705000},"page":"69389-69400","source":"Crossref","is-referenced-by-count":9,"title":["Simulation of Vehicle Network Communication Security Based on Random Geometry and Data Mining"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7545-0044","authenticated-orcid":false,"given":"Chao","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4776-7802","authenticated-orcid":false,"given":"Runze","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3939-6965","authenticated-orcid":false,"given":"Zhaohui","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2416984"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06173-9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtte.2017.07.007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010075"},{"key":"ref31","first-page":"55","article-title":"Velocity forecasts using a combined deep learning model in hybrid electric vehicles with V2V and V2I communication","volume":"63","author":"jiazheng","year":"2019","journal-title":"Sci China Technol Sci"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00546-y"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101936"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0825-8"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s12205-014-0614-z"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2018.8424581"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2369612"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5679-4"},{"key":"ref13","author":"ziyang","year":"2013","journal-title":"Research on Cognitive-Based Cellular and D2D Hybrid Networks"},{"key":"ref14","author":"weijia","year":"2018","journal-title":"Research on Physical Layer Security Technology of Dense Heterogeneous Cellular Networks Under Non-Ideal Conditions"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.532.241"},{"key":"ref16","author":"jie","year":"2016","journal-title":"Application of Random Geometry Theory in Cellular Networks"},{"key":"ref17","author":"wei","year":"2017","journal-title":"Performance Analysis of Heterogeneous Networks Based on Random Geometry"},{"key":"ref18","author":"fangfang","year":"2018","journal-title":"Research on Physical Layer Security Transmission Technology in D2D Communication System"},{"key":"ref19","author":"aiqing","year":"2016","journal-title":"Research on Key Technologies of Data Security Transmission in D2D Communication"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503771"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.1997.631047"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883669"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.06.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1684128"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5746-x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2019.02.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-015-0363-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364717"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807946"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2530723"},{"key":"ref1","first-page":"1273","article-title":"Multihop cellular: A new architecture for wireless communications","author":"lin","year":"2000","journal-title":"Proc INFOCOM 19th Annu Joint Conf IEEE Comput Commun Societies"},{"key":"ref20","author":"sixue","year":"2018","journal-title":"Research on D2D Communication Security Transmission Technology Based on Physical Layer Secure Communication Theory"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06204-5"},{"key":"ref21","first-page":"53","article-title":"Research on energy efficiency of hybrid network based on massive MIMO and D2D technology","volume":"2017","author":"mangang","year":"0","journal-title":"Signal Process"},{"key":"ref24","author":"shengnan","year":"2018","journal-title":"Research on Resource Allocation Scheme in V2V Communication"},{"key":"ref23","author":"pengyu","year":"2014","journal-title":"Vehicle-To-Vehicle Broadband Wireless Channel Modeling in Intelligent Transportation System"},{"key":"ref26","author":"fangming","year":"2017","journal-title":"Research on Security of Unmanned Communication Protocol Based on VANET"},{"key":"ref25","first-page":"30","article-title":"V2V secure communication based on LTE D2D discovery process","volume":"22","author":"yu","year":"2017","journal-title":"Commun World"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09058628.pdf?arnumber=9058628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:56:32Z","timestamp":1642002992000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9058628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2986338","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}