{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:48:54Z","timestamp":1761709734395,"version":"3.37.3"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100006595","name":"Ministry of Research and Innovation, CNCS-UEFISCDI, within PNCDI III","doi-asserted-by":"publisher","award":["PN-III-P1-1.1-TE-2016-1317"],"award-info":[{"award-number":["PN-III-P1-1.1-TE-2016-1317"]}],"id":[{"id":"10.13039\/501100006595","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Romanian Ministry of Research and Innovation, PERFORM-TECH-UPT","award":["10PFE\/16.10.2018"],"award-info":[{"award-number":["10PFE\/16.10.2018"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3003574","type":"journal-article","created":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T20:21:56Z","timestamp":1592598116000},"page":"119105-119122","source":"Crossref","is-referenced-by-count":10,"title":["PRESTvO: PRivacy Enabled Smartphone Based Access to Vehicle On-Board Units"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3078-3635","authenticated-orcid":false,"given":"Bogdan","family":"Groza","sequence":"first","affiliation":[]},{"given":"Tudor","family":"Andreica","sequence":"additional","affiliation":[]},{"given":"Adriana","family":"Berdich","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0330-4523","authenticated-orcid":false,"given":"Pal-Stefan","family":"Murvay","sequence":"additional","affiliation":[]},{"given":"Eugen Horatiu","family":"Gurban","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref38","first-page":"31","article-title":"Identity-based signatures","volume":"2","author":"kiltz","year":"2009","journal-title":"Identity-Based Cryptography"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.03.008"},{"key":"ref32","first-page":"51","article-title":"MVSec: Secure and easy-to-use pairing of mobile devices with vehicles","author":"han","year":"2014","journal-title":"Proc 6th ACM Conf Secur Privacy Wirel Mobile Netw (WiSec)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00165-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_16"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41332-2_3"},{"year":"2008","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3191268"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2018.8394578"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2011.16"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2737957"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1002\/9780470065129"},{"key":"ref63","article-title":"Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys","author":"wetzels","year":"2014","journal-title":"arXiv 1405 7424"},{"key":"ref28","first-page":"1","article-title":"Security analysis of near-field communication (NFC) payments","author":"giese","year":"2019","journal-title":"CoRR"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"66","DOI":"10.46586\/tches.v2019.i3.66-85","article-title":"Fast, furious and insecure: Passive keyless entry and start systems in modern supercars","author":"wouters","year":"2019","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2634785"},{"key":"ref65","first-page":"197","article-title":"&#x2018;I&#x2019;ve got nothing to lose&#x2019;: Consumers&#x2019; risk perceptions and protective actions after the Equifax data breach","author":"zou","year":"2018","journal-title":"Proceedings of Symposium on Usable Privacy and Security (SOUPS)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5220\/0006280601730180"},{"key":"ref2","first-page":"1","article-title":"Green move: Towards next generation sustainable smartphone-based vehicle sharing","author":"alli","year":"2012","journal-title":"Sustainable Internet and ICT for Sustainability (SustainIT)"},{"key":"ref1","first-page":"25","article-title":"Bluetooth mitm vulnerabilities: A literature review, novel attack scenarios, novel countermeasures, and lessons learned","volume":"8","author":"albahar","year":"2016","journal-title":"Int J on Inf Tech and Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_13"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0029"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref24","first-page":"1","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","author":"francillon","year":"2011","journal-title":"Proc NDSS"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"ref26","first-page":"929","article-title":"Lock it and still lose it&#x2014;On the (in) security of automotive remote keyless entry systems","author":"garcia","year":"2016","journal-title":"Proc 25th USENIX Secur Symp (USENIX Secur )"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16822-2_4"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2010.11"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2503752"},{"key":"ref59","first-page":"37","article-title":"Gone in 360 seconds: Hijacking with Hitag2","author":"verdult","year":"2012","journal-title":"Proc 21st USENIX Conf Security Symp"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2013.6629603"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_17"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/11805618_21"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517970"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35371-0_8"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_26"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.126"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435382"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1189190"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133067"},{"key":"ref15","first-page":"447","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2017.1700015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1210263.1210265"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029807"},{"journal-title":"Specification of Crypto Abstraction Library 4 2 2 Edition","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"article-title":"Comparing access-control technologies: A study of keys and smartphones","year":"2007","author":"bauer","key":"ref6"},{"journal-title":"Specification Crypto Service Manager 4 2 2 Edition","year":"2015","key":"ref5"},{"key":"ref8","first-page":"145","article-title":"Identity-based multi-signatures from RSA","author":"bellare","year":"2007","journal-title":"Proc The Cryptographer s Track at RSA Conf"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280689"},{"key":"ref49","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref9","first-page":"250","article-title":"Breaking the Bluetooth pairing&#x2014;The fixed coordinate invalid curve attack","volume":"11959","author":"biham","year":"2019","journal-title":"Proc Selected Areas Cryptography"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.01.008"},{"key":"ref45","first-page":"94","article-title":"A survey of remote automotive attack surfaces","author":"miller","year":"2014","journal-title":"Proc Black Hat USA"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3341480"},{"key":"ref42","first-page":"230","article-title":"An open approach for designing secure electronic immobilizers","author":"lemke-rust","year":"2005","journal-title":"Inf Secur Pract Exp"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900220"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2017.0254"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2800123"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09121223.pdf?arnumber=9121223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:24Z","timestamp":1642003044000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9121223\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3003574","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}