{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:09:49Z","timestamp":1776971389735,"version":"3.51.4"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tits.2022.3207593","type":"journal-article","created":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T19:55:28Z","timestamp":1664394928000},"page":"24698-24713","source":"Crossref","is-referenced-by-count":68,"title":["Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8801-4292","authenticated-orcid":false,"given":"Sriramulu","family":"Bojjagani","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, School of Engineering and Applied Sciences (SEAS), SRM University AP, Amaravati, Andhra Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9697-7072","authenticated-orcid":false,"given":"Y. C. A. Padmanabha","family":"Reddy","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, B V Raju Institute of Technology, Narsapur, Telangana, India"}]},{"given":"Thati","family":"Anuradha","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India"}]},{"given":"P. V. Venkateswara","family":"Rao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Madanapalle Institute of Technology and Science, Madanapalle, Andhra Pradesh, India"}]},{"given":"B. Ramachandra","family":"Reddy","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology Jamshedpur, Jamshedpur, Jharkhand, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6636-0533","authenticated-orcid":false,"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3139065"},{"key":"ref38","year":"2021","journal-title":"Scyther Results"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00963-w"},{"key":"ref32","year":"2021","journal-title":"Automotive Cybersecurity & Data Management Platform for Connected Vehicles"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718815054"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC.2018.8703272"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_16"},{"key":"ref36","first-page":"89","article-title":"Formal support to security protocol development: A survey","volume":"12","author":"pimentel","year":"2008","journal-title":"Computaci&#x00F3;n y Sistemas"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355850"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"ref11","year":"2021","journal-title":"AKAP-IoV-Scyther Code"},{"key":"ref40","year":"2021","journal-title":"Tamarin Results"},{"key":"ref12","year":"2021","journal-title":"AKAP-IoV-Tamarin Code"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2405853"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2712772"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422447"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2019.8855828"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCT.2018.8473110"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2896018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911924"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923611"},{"key":"ref4","author":"toh","year":"2001","journal-title":"Ad Hoc Mobile Wireless Networks Protocols and Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145650"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/s19143165"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2017.00022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4103"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3144785"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"ref7","author":"cremers","year":"2006","journal-title":"Semantics and Verification of Security Protocols"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2657649"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3157831.3157835"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937182"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3050614"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2986585"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/jsan5010003"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0094-2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887076"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909004"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt.2012.0073"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.11.003"},{"key":"ref43","first-page":"183","article-title":"Secure hash standard (SHS)","volume":"180","author":"gallagher","year":"1995","journal-title":"FIPS PUB"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/9972869\/09905232.pdf?arnumber=9905232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:22:54Z","timestamp":1672082574000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9905232\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":45,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tits.2022.3207593","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}