{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:52:15Z","timestamp":1769748735846,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:00:00Z","timestamp":1672790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,4]]},"DOI":"10.1145\/3571306.3571431","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:17:12Z","timestamp":1672762632000},"page":"330-335","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["SMMAP: Secure MAC-based Mutual Authentication Protocol for IoV"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4754-3806","authenticated-orcid":false,"given":"Himani","family":"Sikarwar","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, Indian Institute of Technology Jodhpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6205-4096","authenticated-orcid":false,"given":"Debasis","family":"Das","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Indian Institute of Technology Jodhpur, India"}]}],"member":"320","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2009.935537"},{"key":"e_1_3_2_1_2_1","first-page":"761","volume-title":"Mahmoud Siadat Mousavi, and Mahmood Fathy. \"Vehicular ad hoc networks (VANETs): challenges and perspectives.\" In 2006 6th International Conference on ITS Telecommunications","author":"Yousefi Saleh","year":"2006","unstructured":"[2] Yousefi , Saleh , Mahmoud Siadat Mousavi, and Mahmood Fathy. \"Vehicular ad hoc networks (VANETs): challenges and perspectives.\" In 2006 6th International Conference on ITS Telecommunications , pp. 761 - 766 . IEEE , 2006 . [2]Yousefi, Saleh, Mahmoud Siadat Mousavi, and Mahmood Fathy. \"Vehicular ad hoc networks (VANETs): challenges and perspectives.\" In 2006 6th International Conference on ITS Telecommunications, pp. 761-766. IEEE, 2006."},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV).\" In 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring)","author":"Sikarwar Himani","year":"2020","unstructured":"[3] Sikarwar , Himani , Ankur Nahar , and Debasis Das . \" LABVS : Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV).\" In 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) , pp. 1 - 6 . IEEE , 2020 . [3]Sikarwar, Himani, Ankur Nahar, and Debasis Das. \"LABVS: Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV).\" In 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp. 1-6. IEEE, 2020."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44041-1_56"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC.2018.8703272"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887076"},{"key":"e_1_3_2_1_7_1","volume-title":"IEEE","author":"Feldman Paul","year":"1987","unstructured":"[7] Feldman , Paul . \" A practical scheme for non-interactive verifiable secret sharing.\" In 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp. 427-438 . IEEE , 1987 . [7]Feldman, Paul. \"A practical scheme for non-interactive verifiable secret sharing.\" In 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp. 427-438. IEEE, 1987."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"[8]Lyu Chen Dawu Gu Yunze Zeng and Prasant Mohapatra. \"PBA: Prediction-based authentication for vehicle-to-vehicle communications.\" IEEE transactions on dependable and secure computing 13 no. 1 (2016):  71-83.  [8]Lyu Chen Dawu Gu Yunze Zeng and Prasant Mohapatra. \"PBA: Prediction-based authentication for vehicle-to-vehicle communications.\" IEEE transactions on dependable and secure computing 13 no. 1 (2016): 71-83.","DOI":"10.1109\/TDSC.2015.2399297"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"2018 IEEE International Conference on Communications (ICC)","author":"Liu Jingwei","year":"2018","unstructured":"[9] Liu , Jingwei , Qingqing Li , Rong Sun , Xiaojiang Du , and Mohsen Guizani . \" An Efficient mutual Authentication Scheme for Internet of Vehicles .\" In 2018 IEEE International Conference on Communications (ICC) , pp. 1 - 6 . IEEE, 2018 . [9]Liu, Jingwei, Qingqing Li, Rong Sun, Xiaojiang Du, and Mohsen Guizani. \"An Efficient mutual Authentication Scheme for Internet of Vehicles.\" In 2018 IEEE International Conference on Communications (ICC), pp. 1-6. IEEE, 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2502322"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106899"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2634623"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2405853"},{"issue":"10","key":"e_1_3_2_1_14_1","article-title":"An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks","volume":"9","author":"Zhao Zhen","year":"2015","unstructured":"[ 14 ] Zhao , Zhen , Jie Chen , Yueyu Zhang , and Lanjun Dang . \" An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks .\" KSII Transactions on Internet & Information Systems 9 , no. 10 ( 2015 ). [14] Zhao, Zhen, Jie Chen, Yueyu Zhang, and Lanjun Dang. \"An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks.\" KSII Transactions on Internet & Information Systems 9, no. 10 (2015).","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE","author":"Xiong Hu","year":"2010","unstructured":"[ 15 ] Xiong , Hu , Konstantin Beznosov , Zhiguang Qin , and Matei Ripeanu . \" Efficient and spontaneous privacy-preserving protocol for secure vehicular communication.\" In 2010 IEEE International Conference on Communications, pp. 1-6 . IEEE , 2010 . [15] Xiong, Hu, Konstantin Beznosov, Zhiguang Qin, and Matei Ripeanu. \"Efficient and spontaneous privacy-preserving protocol for secure vehicular communication.\" In 2010 IEEE International Conference on Communications, pp. 1-6. IEEE, 2010."},{"key":"e_1_3_2_1_16_1","first-page":"41","volume-title":"Annual International Cryptology Conference","author":"Boneh Dan","year":"2004","unstructured":"[16] Boneh , Dan , Xavier Boyen , and Hovav Shacham . \"Short group signatures.\" In Annual International Cryptology Conference , pp. 41 - 55 . Springer, Berlin, Heidelberg , 2004 . [16]Boneh, Dan, Xavier Boyen, and Hovav Shacham. \"Short group signatures.\" In Annual International Cryptology Conference, pp. 41-55. Springer, Berlin, Heidelberg, 2004."},{"key":"e_1_3_2_1_17_1","volume-title":"IEEE","author":"Zhang Chenxi","year":"2008","unstructured":"[17] Zhang , Chenxi , Rongxing Lu , Xiaodong Lin , P-H . Ho , and Xuemin Shen . \" An efficient identity-based batch verification scheme for vehicular sensor networks.\" In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246-250 . IEEE , 2008 . [17]Zhang, Chenxi, Rongxing Lu, Xiaodong Lin, P-H. Ho, and Xuemin Shen. \"An efficient identity-based batch verification scheme for vehicular sensor networks.\" In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246-250. IEEE, 2008."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-013-0543-7"},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"2018 IEEE International Conference on Communications (ICC)","author":"Liu Jingwei","year":"2018","unstructured":"[19] Liu , Jingwei , Qingqing Li , Rong Sun , Xiaojiang Du , and Mohsen Guizani . \" An Efficient mutual Authentication Scheme for Internet of Vehicles .\" In 2018 IEEE International Conference on Communications (ICC) , pp. 1 - 6 . IEEE, 2018 . [19]Liu, Jingwei, Qingqing Li, Rong Sun, Xiaojiang Du, and Mohsen Guizani. \"An Efficient mutual Authentication Scheme for Internet of Vehicles.\" In 2018 IEEE International Conference on Communications (ICC), pp. 1-6. IEEE, 2018."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.015"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0881-0"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891105"},{"key":"e_1_3_2_1_23_1","volume-title":"Springer","author":"Canetti Ran","year":"2001","unstructured":"[23] Canetti , Ran , and Hugo Krawczyk . \" Analysis of key-exchange protocols and their use for building secure channels.\" In International conference on the theory and applications of cryptographic techniques, pp. 453-474 . Springer , Berlin, Heidelberg , 2001 . [23]Canetti, Ran, and Hugo Krawczyk. \"Analysis of key-exchange protocols and their use for building secure channels.\" In International conference on the theory and applications of cryptographic techniques, pp. 453-474. Springer, Berlin, Heidelberg, 2001."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the DIMACS workshop on design and formal verification of security protocols.","author":"Bleeker Annette","year":"1997","unstructured":"[24] Bleeker , Annette , and Lambert Meertens . \"A semantics for BAN logic.\" In Proceedings of the DIMACS workshop on design and formal verification of security protocols. 1997 . [24]Bleeker, Annette, and Lambert Meertens. \"A semantics for BAN logic.\" In Proceedings of the DIMACS workshop on design and formal verification of security protocols. 1997."}],"event":{"name":"ICDCN 2023: 24th International Conference on Distributed Computing and Networking","location":"Kharagpur India","acronym":"ICDCN 2023"},"container-title":["Proceedings of the 24th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571306.3571431","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571306.3571431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:07:53Z","timestamp":1750183673000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571306.3571431"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,4]]},"references-count":24,"alternative-id":["10.1145\/3571306.3571431","10.1145\/3571306"],"URL":"https:\/\/doi.org\/10.1145\/3571306.3571431","relation":{},"subject":[],"published":{"date-parts":[[2023,1,4]]},"assertion":[{"value":"2023-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}