{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:27:43Z","timestamp":1772252863719,"version":"3.50.1"},"reference-count":118,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61376026"],"award-info":[{"award-number":["61376026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61176026"],"award-info":[{"award-number":["61176026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/tits.2018.2818888","type":"journal-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T18:33:15Z","timestamp":1524508395000},"page":"760-776","source":"Crossref","is-referenced-by-count":526,"title":["A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy"],"prefix":"10.1109","volume":"20","author":[{"given":"Zhaojun","family":"Lu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6759-8949","authenticated-orcid":false,"given":"Gang","family":"Qu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1546-3417","authenticated-orcid":false,"given":"Zhenglin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506126"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/11774716_17","article-title":"Pseudonymous PKI for ubiquitous computing","author":"zeng","year":"2006","journal-title":"European Public Key Infrastructure Workshop"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089775"},{"key":"ref32","first-page":"3","article-title":"Security challenges for emerging VANETs","author":"al-hawi","year":"2009","journal-title":"Proc 4th Int Conf Inf Technol (ICIT)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2257188"},{"key":"ref30","first-page":"1285","article-title":"Countermeasures for GPS signal spoofing","author":"wen","year":"2005","journal-title":"Proc ION GNSS"},{"key":"ref37","first-page":"541","article-title":"Strategies for pseudonym changes in vehicular ad hoc networks depending on node mobility","author":"eichler","year":"2007","journal-title":"Proc IEEE Intell Veh Symp"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0848-x"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2492981"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2007.37"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2014.066178"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2162864"},{"key":"ref29","first-page":"301","article-title":"VANET: Security attacks and its possible solutions","volume":"3","author":"rawat","year":"2012","journal-title":"J Info and Oper Management"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-158-9_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"ref21","article-title":"Effects of jamming on IEEE 802.11p systems","author":"minhas","year":"2010"},{"key":"ref24","first-page":"9","article-title":"Design and analysis of secure vanet framework preventing black hole and gray hole attack","volume":"3","author":"jain","year":"2016","journal-title":"Journal of Innovation in Computer Science and Engineering"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"key":"ref101","first-page":"94","article-title":"Information-oriented trustworthiness evaluation in vehicular ad-hoc networks","author":"gurung","year":"2013","journal-title":"Proc IEEE Int Conf Netw"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CICSyN.2011.77"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2360883"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037603"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2579162"},{"key":"ref51","first-page":"452","article-title":"Certificateless public key cryptography","volume":"2894","author":"al-riyami","year":"2003","journal-title":"ASIACRYPT"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2154-4"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2388"},{"key":"ref57","first-page":"514","article-title":"Short signatures from the weil pairing","author":"boneh","year":"2001","journal-title":"Proc Adv Cryptol ASIACRYPT"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2490163"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1049\/iet-ifs.2012.0176","article-title":"New certificateless short signature scheme","volume":"7","author":"he","year":"2013","journal-title":"Iet Inform Secur"},{"key":"ref54","first-page":"969","article-title":"Truly non-repudiation certificateless short signature scheme from bilinear pairings","volume":"27","author":"chun-ifan","year":"2011","journal-title":"J Inf Sci Eng"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.05.013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_23"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683985"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2015.0072"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.01.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2008.458"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2439292"},{"key":"ref49","first-page":"355","article-title":"Improved online\/offline signature schemes","author":"shamir","year":"2001","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.036"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2741580"},{"key":"ref45","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume":"84","author":"shamir","year":"1984","journal-title":"Crypto"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ComComAp.2012.6154869"},{"key":"ref47","first-page":"213","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.024"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2010.5700380"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2005.01.009"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2634623"},{"key":"ref73","article-title":"Beacon-based vehicle tracking in vehicular ad-hoc networks","author":"emara","year":"2013"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2017.080914"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2506579"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.010"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2667239.2667266"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2014.6856595"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399291"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/973620.973668"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.03.002"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.04.033"},{"key":"ref62","first-page":"412","article-title":"Efficient hardware for the tate pairing calculation in characteristic three","volume":"3659","author":"kerins","year":"2005","journal-title":"CHES"},{"key":"ref61","first-page":"317","article-title":"An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks","volume":"17","author":"malhi","year":"2015","journal-title":"Discrete Math Theor Comput Sci"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2009.05.001"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110313"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1002\/sec.302","article-title":"An efficient distributed key management scheme for group-signature based anonymous authentication in VANET","volume":"5","author":"sun","year":"2012","journal-title":"Secur Commun Netw"},{"key":"ref68","first-page":"244","article-title":"Short-term linkable group signatures with categorized batch verification","author":"malina","year":"2012","journal-title":"Proc Int Symp Found Pract Secur"},{"key":"ref2","first-page":"53","article-title":"Survey on VANET security challenges and possible cryptographic solutions","volume":"1","author":"mejri","year":"2014","journal-title":"Veh Commun"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.002"},{"key":"ref1","first-page":"1","article-title":"Introduction to intelligent transportation systems","author":"alam","year":"2016","journal-title":"Intelligent Transportation Systems"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ANSS.2007.44"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27293-1_19"},{"key":"ref108","first-page":"135","article-title":"Metacor: A macroscopic modeling tool for urban corridors","volume":"1","author":"elloumi","year":"1994","journal-title":"Proc Triennal Symp Transp Anal"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.018"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.133"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.12.005"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2494017"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.01.009"},{"key":"ref105","first-page":"65","author":"monir","year":"2013","journal-title":"Advances in Security of Information and Communication Networks"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2013.91"},{"key":"ref104","first-page":"214","article-title":"A hybrid trust management framework for vehicular social networks","author":"hussain","year":"2016","journal-title":"Proc Int Conf Comput Social Netw"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"4095","DOI":"10.1109\/TVT.2012.2209903","article-title":"A reputation-based announcement scheme for VANETs","volume":"61","author":"li","year":"2012","journal-title":"IEEE Trans Veh Technol"},{"key":"ref103","first-page":"283","article-title":"Trust on the security of wireless vehicular ad-hoc networking","volume":"24","author":"rawat","year":"2015","journal-title":"Ad Hoc Sensor Wireless Netw"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0136-8"},{"key":"ref111","article-title":"Microscopic modeling of traffic flow: Investigation of collision free vehicle dynamics","author":"krau\u00df","year":"1998"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/1298126.1298155"},{"key":"ref110","first-page":"23","article-title":"Sumo&#x2014;Simulation of urban mobility: An overview","author":"behrisch","year":"2011","journal-title":"Proc SIMUL 3rd Int Conf Adv Syst Simulat"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2084571"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1016\/j.jnca.2011.03.028","article-title":"TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks","volume":"35","author":"m\u00e1rmol","year":"2012","journal-title":"J Netw Comput Appl"},{"key":"ref96","first-page":"1114","article-title":"Smart trust management for vehicular networks","volume":"10","author":"ltifi","year":"2016","journal-title":"World Acad Sci Eng Technol Int J Elect Comput Energ Electron Commun Eng"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-015-0353-y"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2010.5437115"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/5254141"},{"key":"ref12","article-title":"Review of different approaches for privacy scheme in VANETs","volume":"5","author":"kaushik","year":"2013","journal-title":"Int J"},{"key":"ref13","author":"de fuentes","year":"2010","journal-title":"Overview of Security Issues in Vehicular Ad-hoc Networks"},{"key":"ref14","first-page":"38","article-title":"A review of security threats, solutions and trust management in VANETs","volume":"7","author":"premasudha","year":"2016","journal-title":"Int J Next-Generat Comput"},{"key":"ref15","article-title":"Amendment of the commission rules regarding dedicated short-range communication service in the 5.850-5.925 GHz band","year":"2002","journal-title":"Federal Communications Commission"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5494182"},{"key":"ref16","year":"2014"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0269-z"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/1374512.1374522"},{"key":"ref17","first-page":"88","article-title":"Survey on security challenges in VANET","volume":"2","author":"dhamgaye","year":"2013","journal-title":"Int J Comput Sci"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2266347"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2008.610"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006631"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514286"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.25"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.242"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"ref116","first-page":"128","article-title":"Recent development and applications of SUMO-simulation of urban mobility","volume":"5","author":"krajzewicz","year":"2012","journal-title":"Int J Adv Syst Meas"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.23"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2008.3027"},{"key":"ref89","first-page":"73","article-title":"Central misbehavior evaluation for VANETs based on mobility data plausibility","author":"bi\u00dfmeyer","year":"2012","journal-title":"Proc 9th ACM Int Workshop Veh Inter-Netw Syst Appl ACM"},{"key":"ref85","first-page":"328","article-title":"Efficient self-organized trust management in location privacy enhanced VANETs","author":"wei","year":"2012","journal-title":"Proc Int Workshop Inf Secur Appl"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.4018\/jdst.2012010104"},{"key":"ref87","article-title":"Car-to-car communication","author":"eichler","year":"2006","journal-title":"Proc VDE-Kongr Innov Eur"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2496147"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/8630805\/08345196.pdf?arnumber=8345196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:54:07Z","timestamp":1657745647000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8345196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":118,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tits.2018.2818888","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2]]}}}