{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:34:36Z","timestamp":1771025676091,"version":"3.50.1"},"reference-count":26,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T00:00:00Z","timestamp":1530576000000},"content-version":"vor","delay-in-days":183,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91420202"],"award-info":[{"award-number":["91420202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Vehicular networks play an important role in the intelligent transportation systems which have gained technical supports from car industry. Due to the mobility and the broadcast nature of wireless communication, security of the vehicular networks is a critical issue for the academia and industry. Many solutions have been proposed to target the security provisioning. However, most of them have various shortcomings. Based on the elliptic curve public key cryptography algorithm, in this paper, we propose a new anonymous roaming authentication protocol for the Long Term Evolution\u2010Advanced (LTE\u2010A) supported vehicular networks. For a vehicular LTE\u2010A network, an authentication protocol should be able to fulfill a variety of security requirements, which can be met by our proposal and proved by using Burrows\u2013Abadi\u2013Needham (BAN) logic. Compared with some existing solutions, our scheme has lower communication costs with stronger security functionality. The analyses on the security functions and the performance of the proposed solution show that our scheme is secure and efficient with ability against various types of malicious attacks.<\/jats:p>","DOI":"10.1155\/2018\/6251219","type":"journal-article","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T23:53:04Z","timestamp":1530661984000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["An Anonymous Handover Authentication Scheme Based on LTE\u2010A for Vehicular Networks"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4913-5371","authenticated-orcid":false,"given":"Cheng","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7275-2274","authenticated-orcid":false,"given":"Xiaohong","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1438-7018","authenticated-orcid":false,"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Bao","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,7,3]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2423667"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.023"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1581-y"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-1"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2013.6515060"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2011.110811.111240"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1750-y"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.08.003"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.242"},{"key":"e_1_2_9_10_2","doi-asserted-by":"crossref","unstructured":"TahaM. ParraL. GarciaL. andLloretJ. An Intelligent handover process algorithm in 5G networks: The use case of mobile cameras for environmental surveillance Proceedings of the 2017 IEEE International Conference on Communications Workshops ICC Workshops 2017 May 2017 Paris France 840\u2013844 2-s2.0-85026268017.","DOI":"10.1109\/ICCW.2017.7962763"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-010-0033-5"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.031"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.01.010"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.04.036"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113232"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.5296\/npa.v9i3-4.12573"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2014.2329880"},{"key":"e_1_2_9_18_2","unstructured":"3GPP Technical Specification Group Services and System Aspects; Service requirements for Home Node B (HNB) and Home eNode B (HeNB) (Rel 11) 3GPP TS 2012 no. 3GPP TS 22.220 V11.6.0 3rd Generation Partnership Project."},{"key":"e_1_2_9_19_2","unstructured":"3GPP Technical Specification Group Core Network and Terminals; Access to the 3GPP Evolved Packet Core (EPC) via non-3GPP access networks (Rel 11) 3GPP TS 2012 no. 3GPP TS 24.302 V11.4.0 3rd Generation Partnership Project."},{"key":"e_1_2_9_20_2","unstructured":"3GPP Technical Specification Group Services and System Aspects; Service requirements for Machine-Type Communications (MTC) (Rel 12) 3GPP TS 2012 no. 3GPP TS 22.368 V12.0.0 3rd Generation Partnership Project."},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706738"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/wcl.2012.022012.120073"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1277-0"},{"key":"e_1_2_9_24_2","unstructured":"CohenM.andDamM. Logical Omniscience in the Semantics of BAN Logic Proceedings of the Foundations of Computer Security Workshop 2003 121\u2013132."},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-015-0406-2"},{"key":"e_1_2_9_26_2","unstructured":"3GPP Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security architecture (Rel 12) 3GPP TS 2013 no. 3GPP TS 33.401 V12.10.0 3rd Generation Partnership Project."}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/6251219.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/6251219.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/6251219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:20:16Z","timestamp":1723011616000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/6251219"}},"subtitle":[],"editor":[{"given":"Jaime","family":"Lloret","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/6251219"],"URL":"https:\/\/doi.org\/10.1155\/2018\/6251219","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2017-10-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-28","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6251219"}}