{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:43:02Z","timestamp":1774968182147,"version":"3.50.1"},"reference-count":131,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tits.2025.3528932","type":"journal-article","created":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T18:34:34Z","timestamp":1737743674000},"page":"4260-4282","source":"Crossref","is-referenced-by-count":25,"title":["Identity-Based Authentication in VANETs: A Review"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3452-5409","authenticated-orcid":false,"given":"Ahmed","family":"Manasrah","sequence":"first","affiliation":[{"name":"Higher Colleges of Technology, Computer Information Systems, Sharjah, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0777-1871","authenticated-orcid":false,"given":"Qussai","family":"Yaseen","sequence":"additional","affiliation":[{"name":"Department of Information Technology, AIRC Center, Ajman University, Ajman, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-7418","authenticated-orcid":false,"given":"Hussain","family":"Al-Aqrabi","sequence":"additional","affiliation":[{"name":"Higher Colleges of Technology, Computer Information Systems, Sharjah, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1013-4507","authenticated-orcid":false,"given":"Lu","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Exeter, Exeter, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.14"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ComComAp.2012.6154869"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339271"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2977670"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936575"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2406877"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEOT.2016.7754846"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2013.6758514"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2924856"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3558052"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3109264"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s21237927"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/app12094413"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2021.105530"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e02340"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2021.100051"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970092"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACA52198.2021.9626779"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895114"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00127"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1925-3_13"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4018\/IJSIR.20220401.oa7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.52549\/ijeei.v11i1.4295"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s20071963"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s22041674"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3023797"},{"key":"ref31","volume-title":"Vehicle Safety Communications\u2014Applications (VSC-A)","year":"2011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15497-8_18"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2603"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02744-5_22"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2782672"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIS50930.2021.9395882"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaCom.2013.6694582"},{"issue":"5","key":"ref38","first-page":"813","article-title":"Denial of service (DOS) attack and its possible solutions in VANET","volume":"4","author":"Hasbullah","year":"2010","journal-title":"Int. J. Electron. Commun. Eng."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-021-01001-0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784730"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3290553"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410051"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2495"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3056712"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038042"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100411"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287762"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3117950"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.015"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3125521"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2014.7013305"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3060046"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3952"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3892"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.09.005"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109643"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-013-9706-1"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102387"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2991168"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3253710"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3317"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3059638"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00916-8_47"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00215"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.comcom.2021.06.013","article-title":"An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network","volume":"177","author":"Nandy","year":"2021","journal-title":"Comput. Commun."},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3137877"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3051435"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1002\/sec.285"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/iSES.2018.00057"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2896018"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59016-1_46"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000118"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2971409"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813679"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3068268"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3142287"},{"key":"ref80","first-page":"189","article-title":"Attacks on inter vehicle communication systems-an analysis","volume-title":"Proc. WIT","volume":"20","author":"Aijaz"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3021731"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.001"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.02.002"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2485225"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2502322"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.3390\/s23031164"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103092"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2579162"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2718101"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CICT.2016.64"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3305489"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3179371"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103602"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037252"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3279896"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1080\/15472450.2019.1625042"},{"key":"ref97","article-title":"An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs","volume":"22","author":"Ali","year":"2020","journal-title":"Veh. Commun."},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101692"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100200"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3383967"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3118892"},{"issue":"5","key":"ref102","doi-asserted-by":"crossref","first-page":"8065","DOI":"10.1109\/JIOT.2019.2902840","article-title":"An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks","volume":"6","author":"Ma","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.006"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399297"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-32-9343-4_21"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2651741"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982636"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3104148"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2186992"},{"issue":"3","key":"ref111","first-page":"8353","article-title":"A novel authentication framework with conditional privacy preservation and non-repudiation for fog-VANET","volume":"25","author":"Sharmila","year":"2021","journal-title":"Ann. Romanian Soc. Cell Biol."},{"key":"ref112","article-title":"Identity-based signcryption","volume-title":"Cryptol. ePrint Arch","author":"Malone-Lee","year":"2002"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100247"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.05.092"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.06.012"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960367"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2007.4437825"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410063"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04179-4"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05394-x"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100602"},{"issue":"9","key":"ref123","first-page":"661","article-title":"A survey of VANET technologies","volume":"5","author":"Anwer","year":"2014","journal-title":"J. Emerg. Trends Comput. Inf. Sci."},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2983835"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100182"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101664"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.006"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.016"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4987"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121461"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3378724"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6979\/10945245\/10852542.pdf?arnumber=10852542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:57:16Z","timestamp":1743224236000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10852542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":131,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tits.2025.3528932","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}