{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:53Z","timestamp":1750220153392,"version":"3.41.0"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T00:00:00Z","timestamp":1668384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["52177067, 62072078, and 61902040"],"award-info":[{"award-number":["52177067, 62072078, and 61902040"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,11,30]]},"abstract":"<jats:p>Internet of vehicles (IoVs) is a variant of vehicular ad hoc network, which provides an efficient communication method for vehicles. However, some traffic messages usually include sensitive identity information, which is easy to bring about the leakage of vehicular identities during data communications. Further, if vehicular identities are fully protected, then it can lead to trusted authority cannot reveal the real identities of malicious vehicles, which incurs more security issues in IoVs. Therefore, in this article, we propose an efficient conditional identity privacy-preserving authentication scheme based on cooperation of multiple fog servers under fog computing-based IoVs, where fog servers are used to verify (authenticate) the legitimacy of vehicles without revealing their real identities. Further, an associated vehicular identity updating mechanism is constructed to solve the problem that some compromised fog servers may leak their stored verification information to pool real vehicular identities. Additionally, a malicious vehicular identity tracing mechanism is proposed to support related fog servers that receive signed false messages can trace the real identities of malicious vehicles. Compared with other related schemes, our scheme further improves its security. Experimental results show our scheme is efficient under fog computing-based IoVs.<\/jats:p>","DOI":"10.1145\/3538381","type":"journal-article","created":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T12:49:18Z","timestamp":1652878158000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8827-3884","authenticated-orcid":false,"given":"Zhuoqun","family":"Xia","sequence":"first","affiliation":[{"name":"Changsha University of Science &amp; Technology, Changsha, Hunan Province, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1329-9086","authenticated-orcid":false,"given":"Lingxuan","family":"Zeng","sequence":"additional","affiliation":[{"name":"Changsha University of Science &amp; Technology, Changsha, Hunan Province, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0793-5218","authenticated-orcid":false,"given":"Ke","family":"Gu","sequence":"additional","affiliation":[{"name":"Changsha University of Science &amp; Technology, Changsha, Hunan Province, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6619-554X","authenticated-orcid":false,"given":"Xiong","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Sichuan Province, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0231-3196","authenticated-orcid":false,"given":"Weijia","family":"Jia","sequence":"additional","affiliation":[{"name":"Beijing Normal University-Hong Kong Baptist University United International College, Zhuhai, Guangdong Province, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11,14]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCT.2018.8473110"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3021731"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2480699"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2634623"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6679882"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02039-x"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2028145"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2970553"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3023797"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986617"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508222.2512839"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2565001"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.947"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2633809"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2596286"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2428620"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2277471"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6_6"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100213"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPCA.2007.4365481"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2948302"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.031"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_19"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2975207"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100182"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2667499"},{"key":"e_1_3_2_36_2","unstructured":"TUG. 2022. OpenJUMP . Retrieved from http:\/\/www.openjump.org\/."},{"key":"e_1_3_2_37_2","unstructured":"TUG. 2022. OpenStreetMap . Retrieved from https:\/\/wiki.openstreetmap.org\/wiki\/Main-Page."},{"key":"e_1_3_2_38_2","unstructured":"TUG. 2022. The Pairing-Based Cryptography Library . Retrieved from http:\/\/crypto.stanford.edu\/pbc\/."},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2406877"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3099488"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923611"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2017.12.026"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1108\/EC-08-2015-0255"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.6633\/IJNS.201409.16(5).04"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538381","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:13Z","timestamp":1750186813000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538381"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,14]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1145\/3538381"],"URL":"https:\/\/doi.org\/10.1145\/3538381","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2022,11,14]]},"assertion":[{"value":"2022-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}