{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:49:17Z","timestamp":1762004957007,"version":"3.40.5"},"reference-count":38,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402095"],"award-info":[{"award-number":["61402095"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University","doi-asserted-by":"publisher","award":["the Soonchunhyang University Research Fund"],"award-info":[{"award-number":["the Soonchunhyang University Research Fund"]}],"id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,2]]},"abstract":"<jats:p> With the rapid booming of intelligent traffic system, vehicular ad hoc networks have attracted wide attention from both academic and industry. However, security is the main obstacle for the wide deployment of vehicular ad hoc networks. Vehicular ad hoc networks security has two critical issues: access authentication and privacy preservation. How to ensure privacy preservation and improve the efficiency of authentication has become the urgent needs. However, the existing access authentication schemes for vehicular ad hoc networks with different flaws cannot maintain the balance between security and efficiency. Thus, an anonymous access authentication scheme for vehicular ad hoc networks under edge computing based on ID-based short group signature mechanism is proposed in this article to improve the efficiency and anonymity of access authentication. Multiple pseudonyms are presented to preserve the privacy of vehicle node. Besides, a new method is designed to identify and revoke malicious vehicles in the evaluation manner. The core protocols of the proposed scheme are proved to be secure by SVO logic. According to the computation cost and transmission overhead analysis, we indicate that our scheme owns better performance. Moreover, in this article, we combine vehicular ad hoc networks with edge computing together to provide a new clue for the development of mobile edge computing. <\/jats:p>","DOI":"10.1177\/1550147718756581","type":"journal-article","created":{"date-parts":[[2018,2,17]],"date-time":"2018-02-17T06:04:38Z","timestamp":1518847478000},"page":"155014771875658","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":14,"title":["An anonymous access authentication scheme for vehicular ad hoc networks under edge computing"],"prefix":"10.1177","volume":"14","author":[{"given":"Tianhan","family":"Gao","sequence":"first","affiliation":[{"name":"Software College, Northeastern University, Shenyang, China"}]},{"given":"Yanqiang","family":"Li","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University, Shenyang, China"}]},{"given":"Nan","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan-si, South Korea"}]}],"member":"179","published-online":{"date-parts":[[2018,2,16]]},"reference":[{"key":"bibr1-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.859"},{"first-page":"29","volume-title":"ACM international workshop on vehicular ad hoc networks","author":"Golle P","key":"bibr2-1550147718756581"},{"first-page":"13","volume-title":"Proceedings of the first edition of the MCC workshop on mobile cloud computing","author":"Bonomi F","key":"bibr3-1550147718756581"},{"key":"bibr4-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1007\/s00287-016-0957-6"},{"key":"bibr5-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"issue":"1","key":"bibr6-1550147718756581","first-page":"2","volume":"7","author":"Uchida N","year":"2017","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"issue":"1","key":"bibr7-1550147718756581","first-page":"40","volume":"7","author":"Jeong S","year":"2017","journal-title":"J Int Serv Inf Secur"},{"issue":"1","key":"bibr8-1550147718756581","first-page":"1","volume":"6","author":"Skarmeta AF","year":"2015","journal-title":"J Wirel Mob Netw Ubiquitous Comput Appl"},{"issue":"2","key":"bibr9-1550147718756581","first-page":"1","volume":"6","author":"Kotenko I","year":"2015","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (Jowua)"},{"key":"bibr10-1550147718756581","first-page":"65","volume":"12","author":"Zhahe Y","year":"2014","journal-title":"Internet of Things Technology"},{"key":"bibr11-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2158001"},{"first-page":"19","volume-title":"ACM international workshop on vehicular ad hoc networks","author":"Xu Q","key":"bibr12-1550147718756581"},{"first-page":"55","volume-title":"Second international conference on network applications protocols and services","author":"Samara G","key":"bibr13-1550147718756581"},{"first-page":"424","volume-title":"International conference on pervasive computing and applications","author":"Liu X","key":"bibr14-1550147718756581"},{"first-page":"1229","volume-title":"IEEE international conference on computer communications","author":"Lu R","key":"bibr15-1550147718756581"},{"key":"bibr16-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2009.6388414"},{"key":"bibr17-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"bibr18-1550147718756581","first-page":"585","volume-title":"Proceedings of international workshop on information security applications","volume":"3348","author":"Chen X"},{"first-page":"131","volume-title":"International conference on wireless communication and sensor networks","author":"Chaurasia BK","key":"bibr19-1550147718756581"},{"key":"bibr20-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052252"},{"key":"bibr21-1550147718756581","first-page":"5521","volume":"5","author":"Phaneendra HD","year":"2014","journal-title":"Int J Comput Sci Inform Tech"},{"key":"bibr22-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_30"},{"key":"bibr23-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1007\/11496618_17"},{"key":"bibr24-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.020211.00045"},{"key":"bibr25-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"first-page":"345","volume-title":"Computing, communications and applications conference","author":"Lu H","key":"bibr26-1550147718756581"},{"key":"bibr27-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2308215"},{"key":"bibr28-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.14"},{"key":"bibr29-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0881-0"},{"key":"bibr30-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2186992"},{"first-page":"310","volume-title":"International conference on innovative mobile and internet services in ubiquitous computing","author":"Gao T","key":"bibr31-1550147718756581"},{"key":"bibr32-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_2"},{"first-page":"417","volume-title":"Third European conference on universal multiservice networks","author":"Han S","key":"bibr33-1550147718756581"},{"volume-title":"Identity-based encryption from the Weil pairing","year":"2001","author":"Dan B","key":"bibr34-1550147718756581"},{"journal-title":"Analysis and design of security protocol","year":"2010","author":"Wei Jian CZ","key":"bibr35-1550147718756581"},{"issue":"5","key":"bibr36-1550147718756581","first-page":"18","volume":"23","author":"Burrows M","year":"1989","journal-title":"ACM T Comput Syst"},{"key":"bibr37-1550147718756581","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2156790"},{"first-page":"246","volume-title":"27th conference on computer communications","author":"Zhang C","key":"bibr38-1550147718756581"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718756581","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718756581","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718756581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T01:19:57Z","timestamp":1607303997000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718756581"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["10.1177\/1550147718756581"],"URL":"https:\/\/doi.org\/10.1177\/1550147718756581","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2018,2]]}}}