{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:40:34Z","timestamp":1766486434428,"version":"3.41.0"},"reference-count":95,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3576926","type":"journal-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T17:37:51Z","timestamp":1749145071000},"page":"100074-100094","source":"Crossref","is-referenced-by-count":2,"title":["Review of Certificateless Authentication Scheme for Vehicular Ad Hoc Networks"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-8559-4809","authenticated-orcid":false,"given":"Abdulaziz Zaid A.","family":"Aljarwan","sequence":"first","affiliation":[{"name":"Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru, Johor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4907-6359","authenticated-orcid":false,"given":"Md Asri","family":"Bin Ngadi","sequence":"additional","affiliation":[{"name":"Information Security Department, College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TDSC.2025.3553868"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.icte.2024.05.008"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ACIT62805.2024.10877115"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.3390\/s23073543"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.3390\/a17030103"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1371\/journal.pone.0292690"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/s11042-023-16950-1"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.iot.2024.101096"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ACCESS.2024.3361829"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ACCESS.2024.3351278"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/s42154-023-00270-z"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.comnet.2024.110873"},{"issue":"9","key":"ref13","doi-asserted-by":"crossref","first-page":"11991","DOI":"10.1007\/s13369-023-08535-9","article-title":"A novel DDoS mitigation strategy in 5G-based vehicular networks using Chebyshev polynomials","volume":"49","author":"Almazroi","year":"2024","journal-title":"Arabian J. for Sci. Eng."},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.comnet.2025.111140"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TWC.2023.3272348"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"33089","DOI":"10.1109\/ACCESS.2024.3372390","article-title":"Efficient blockchain-based pseudonym authentication scheme supporting revocation for 5G-assisted vehicular fog computing","volume":"12","author":"Mohammed","year":"2024","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.3390\/fi17020079"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/JIOT.2024.3515075"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"71232","DOI":"10.1109\/ACCESS.2024.3402336","article-title":"Lattice-based cryptography and fog computing based efficient anonymous authentication scheme for 5G-assisted vehicular communications","volume":"12","author":"Al-Mekhlafi","year":"2024","journal-title":"IEEE Access"},{"issue":"1","key":"ref20","first-page":"37","article-title":"Enhanced security taxonomy for fog-enabled VANETs: A comprehensive survey on attacks, challenges, applications and architectures","volume":"7","author":"Hama","year":"2025","journal-title":"Passer J. Basic Appl. Sci."},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/COMST.2022.3178081"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3656166"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/s12083-024-01692-0"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.3390\/s24030818"},{"issue":"2","key":"ref25","doi-asserted-by":"crossref","first-page":"2422","DOI":"10.1109\/JSEN.2020.3021731","article-title":"Survey of authentication and privacy schemes in vehicular ad hoc networks","volume":"21","author":"Al-Shareeda","year":"2021","journal-title":"IEEE Sensors J."},{"key":"ref26","first-page":"1","article-title":"A comprehensive survey of lightweight authentication mechanisms for vehicle group communication in 5G networks","volume-title":"Proc. IEEE Int. Students\u2019 Conf. Electr., Electron. Comput. Sci. (SCEECS)","author":"Rajbhar"},{"issue":"12","key":"ref27","doi-asserted-by":"crossref","first-page":"13573","DOI":"10.1109\/TITS.2023.3297527","article-title":"A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks","volume":"24","author":"Dong","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/j.vehcom.2020.100310"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.3390\/math11061446"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.2139\/ssrn.3290553"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/s10207-023-00662-6"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.3390\/su14169961"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/978-3-540-40061-5_29"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/ACCESS.2021.3104148"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/MWSCAS57524.2023.10405921"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/JIOT.2023.3285402"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.vehcom.2021.100414"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/JSYST.2017.2668389"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/JIOT.2021.3121552"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/JIOT.2023.3327503"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/JIOT.2021.3073008"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1016\/j.iot.2023.100923"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/TII.2022.3142306"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1371\/journal.pone.0287291"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/TDSC.2024.3445164"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1016\/j.fraope.2024.100206"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.3390\/cryptography8030043"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/JSYST.2022.3213245"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1016\/j.vehcom.2024.100843"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1002\/cpe.8384"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/JIOT.2024.3438257"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/TIFS.2024.3408055"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/TIFS.2022.3140657"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1016\/j.jisa.2025.104001"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1038\/s41598-024-77992-5"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1007\/978-981-96-0808-9_23"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1007\/s12083-024-01636-8"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.56892\/bima.v6i03.61"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1371\/journal.pone.0317047"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1109\/TVT.2024.3469385"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1109\/TVT.2024.3515072"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.32604\/cmc.2024.053854"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1109\/TITS.2022.3220624"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1016\/j.asej.2024.103094"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1007\/s10586-024-04479-3"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1007\/s12083-024-01717-8"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.1007\/s41870-024-02230-0"},{"doi-asserted-by":"publisher","key":"ref68","DOI":"10.5815\/ijmsc.2024.04.05"},{"doi-asserted-by":"publisher","key":"ref69","DOI":"10.1109\/TITS.2024.3474210"},{"doi-asserted-by":"publisher","key":"ref70","DOI":"10.1109\/TITS.2023.3275077"},{"doi-asserted-by":"publisher","key":"ref71","DOI":"10.1109\/jiot.2024.3459033"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1371\/journal.pone.0310267"},{"doi-asserted-by":"publisher","key":"ref73","DOI":"10.1007\/s12083-024-01726-7"},{"doi-asserted-by":"publisher","key":"ref74","DOI":"10.1109\/JIOT.2024.3393000"},{"key":"ref75","article-title":"Quantum-secure certificate-less conditional privacy-preserving authentication for VANET","author":"Verma","year":"2024","journal-title":"arXiv:2403.13743"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.1109\/TVT.2024.3432553"},{"doi-asserted-by":"publisher","key":"ref77","DOI":"10.1109\/ICCCNT61001.2024.10725666"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.1007\/s12083-022-01319-2"},{"doi-asserted-by":"publisher","key":"ref79","DOI":"10.1016\/j.comnet.2023.109969"},{"doi-asserted-by":"publisher","key":"ref80","DOI":"10.1109\/JIOT.2024.3400320"},{"doi-asserted-by":"publisher","key":"ref81","DOI":"10.1109\/ACCESS.2024.3466914"},{"doi-asserted-by":"publisher","key":"ref82","DOI":"10.1109\/TVT.2024.3457749"},{"doi-asserted-by":"publisher","key":"ref83","DOI":"10.1109\/TVT.2022.3230442"},{"doi-asserted-by":"publisher","key":"ref84","DOI":"10.1007\/s12083-024-01778-9"},{"doi-asserted-by":"publisher","key":"ref85","DOI":"10.3390\/electronics13163288"},{"doi-asserted-by":"publisher","key":"ref86","DOI":"10.1155\/2022\/3646960"},{"doi-asserted-by":"publisher","key":"ref87","DOI":"10.1155\/2022\/3214913"},{"doi-asserted-by":"publisher","key":"ref88","DOI":"10.3390\/s24248140"},{"doi-asserted-by":"publisher","key":"ref89","DOI":"10.1109\/ACCESS.2022.3232301"},{"doi-asserted-by":"publisher","key":"ref90","DOI":"10.3390\/s22114019"},{"doi-asserted-by":"publisher","key":"ref91","DOI":"10.1109\/JIOT.2020.3019304"},{"doi-asserted-by":"publisher","key":"ref92","DOI":"10.1016\/j.vehcom.2022.100504"},{"year":"2023","author":"Devi","article-title":"Security concerns at different phases of networks through blockchain technology","key":"ref93"},{"doi-asserted-by":"publisher","key":"ref94","DOI":"10.1155\/2020\/5276813"},{"doi-asserted-by":"publisher","key":"ref95","DOI":"10.1109\/ACCESS.2018.2845464"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11025475.pdf?arnumber=11025475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T17:52:36Z","timestamp":1749837156000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11025475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":95,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3576926","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}