{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:52:17Z","timestamp":1773773537603,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872001"],"award-info":[{"award-number":["61872001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572001"],"award-info":[{"award-number":["61572001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702005"],"award-info":[{"award-number":["61702005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1494-1","type":"journal-article","created":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T20:22:34Z","timestamp":1561407754000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Secure data sharing scheme for VANETs based on edge computing"],"prefix":"10.1186","volume":"2019","author":[{"given":"Jingwen","family":"Pan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7258-3418","authenticated-orcid":false,"given":"Jie","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"key":"1494_CR1","unstructured":"C.K. Toh, Ad hoc mobile wireless networks: protocols and systems. Pearson Education (2001)"},{"issue":"5","key":"1494_CR2","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1109\/TITS.2015.2423667","volume":"16","author":"JJ Cheng","year":"2015","unstructured":"J.J. Cheng, J.L. Cheng, M.C. Zhou, et al., Routing in internet of vehicles: A review[J]. IEEE Transactions on Intelligent Transportation Systems 16(5), 2339\u20132352 (2015)","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"1494_CR3","unstructured":"J. Cui, L. Wei, J. Zhang, et al., An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 1\u201312 (2018)"},{"key":"1494_CR4","doi-asserted-by":"crossref","unstructured":"J. Cui, H. Zhong, W. Luo, et al., Area-based mobile multicast group key management scheme for secure mobile cooperative sensing[J]. Science China(Information Sciences), 286\u2013292 (2017)","DOI":"10.1007\/s11432-016-9048-8"},{"key":"1494_CR5","doi-asserted-by":"crossref","unstructured":"K. Fan, Q. Pan, J. Wang, et al., Cross-domain based data sharing scheme in cooperative edge computing (2018 IEEE International Conference on Edge Computing, 2018), pp. 87\u201392","DOI":"10.1109\/EDGE.2018.00019"},{"issue":"7","key":"1494_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CC.2018.8424578","volume":"15","author":"G Luo","year":"2018","unstructured":"G. Luo, Q. Yuan, H. Zhou, et al., Cooperative vehicular content distribution in edge computing assisted 5G-VANET. China Communications 15(7), 1\u201317 (2018)","journal-title":"China Communications"},{"issue":"6","key":"1494_CR7","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1007\/s11036-015-0623-2","volume":"20","author":"X Liu","year":"2015","unstructured":"X. Liu, R. Zhu, B. Jalaian, et al., Dynamic spectrum access algorithm based on game theory in cognitive radio networks. Mobile Networks and Applications 20(6), 817\u2013827 (2015)","journal-title":"Mobile Networks and Applications"},{"key":"1494_CR8","unstructured":"Scott M, Multiprecision integer and rational arithmetic C\/C++ library (MIRACL), (2003). \n                    https:\/\/www3.cs.stonybrook.edu\/~algorith\/implement\/shamus\/implement.shtml\n                    \n                  ."},{"key":"1494_CR9","unstructured":"Dai W, Crypto++ library 5.1-a free C++ class library of cryptographic schemes, (2004). \n                    https:\/\/www.cryptopp.com\/\n                    \n                  ."},{"key":"1494_CR10","doi-asserted-by":"crossref","unstructured":"K. Zeng, Pseudonymous PKI for ubiquitous computing. European Public Key Infrastructure Workshop, 207\u2013222 (2006)","DOI":"10.1007\/11774716_17"},{"issue":"6","key":"1494_CR11","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"X. Lin, X. Sun, P.H. Ho, et al., GSIS: a secure and privacypreserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology 56(6), 3442\u20133456 (2007)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1494_CR12","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/INFOCOM.2008.58","volume-title":"IEEE INFOCOM 2008-The 27th Conference on Computer Communications","author":"C Zhang","year":"2008","unstructured":"C. Zhang, R. Lu, X. Lin, et al., in IEEE INFOCOM 2008-The 27th Conference on Computer Communications. An efficient identity-based batch verification scheme for vehicular sensor networks (2008), pp. 246\u2013250"},{"key":"1494_CR13","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ins.2015.04.033","volume":"317","author":"SJ Horng","year":"2015","unstructured":"S.J. Horng, S.F. Tzeng, P.H. Huang, et al., An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Information Sciences 317, 48\u201366 (2015)","journal-title":"Information Sciences"},{"issue":"4","key":"1494_CR14","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TITS.2015.2492981","volume":"17","author":"P Vijayakumar","year":"2016","unstructured":"P. Vijayakumar, M. Azees, A. Kannan, et al., Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems 17(4), 1015\u20131028 (2016)","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"9","key":"1494_CR15","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","volume":"18","author":"M Azees","year":"2017","unstructured":"M. Azees, P. Vijayakumar, L.J. Deboarh, EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems 18(9), 2467\u20132476 (2017)","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"4","key":"1494_CR16","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1109\/JSYST.2015.2490163","volume":"11","author":"JL Tsai","year":"2017","unstructured":"J.L. Tsai, A new efficient certificateless short signature scheme using bilinear pairings. IEEE Systems Journal 11(4), 2395\u20132402 (2017)","journal-title":"IEEE Systems Journal"},{"key":"1494_CR17","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.comnet.2018.01.015","volume":"134","author":"SM Pournaghi","year":"2018","unstructured":"S.M. Pournaghi, B. Zahednejad, M. Bayat, et al., NECPPA: a novel and efficient conditional privacy-preserving authentication scheme for VANET. Computer Networks 134, 78\u201392 (2018)","journal-title":"Computer Networks"},{"issue":"6","key":"1494_CR18","doi-asserted-by":"publisher","first-page":"5409","DOI":"10.1109\/TVT.2018.2822768","volume":"67","author":"MR Asaar","year":"2018","unstructured":"M.R. Asaar, M. Salmasizadeh, W. Susilo, et al., A secure and efficient authentication technique for vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology 67(6), 5409\u20135423 (2018)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"8","key":"1494_CR19","doi-asserted-by":"publisher","first-page":"3697","DOI":"10.1109\/TVT.2014.2358633","volume":"64","author":"Y Liu","year":"2015","unstructured":"Y. Liu, L. Wang, H.H. Chen, Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 64(8), 3697\u20133710 (2015)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1494_CR20","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.future.2017.07.002","volume":"84","author":"SKH Islam","year":"2018","unstructured":"S.K.H. Islam, M.S. Obaidat, P. Vijayakumar, et al., A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Generation Computer Systems 84, 216\u2013227 (2018)","journal-title":"Future Generation Computer Systems"},{"issue":"11","key":"1494_CR21","doi-asserted-by":"publisher","first-page":"10283","DOI":"10.1109\/TVT.2017.2718101","volume":"66","author":"J Cui","year":"2017","unstructured":"J. Cui, J. Zhang, H. Zhong, et al., SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Transactions on Vehicular Technology 66(11), 10283\u201310295 (2017)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"5","key":"1494_CR22","doi-asserted-by":"publisher","first-page":"3491","DOI":"10.1109\/JIOT.2018.2797206","volume":"5","author":"J Cui","year":"2018","unstructured":"J. Cui, J. Wen, S. Han, et al., Efficient privacy-preserving scheme for real-time location data in vehicular ad-hoc network. IEEE Internet of Things Journal 5(5), 3491\u20133498 (2018)","journal-title":"IEEE Internet of Things Journal"},{"key":"1494_CR23","first-page":"1","volume-title":"Efficient conditional privacy-preserving authentication scheme using revocation messages for VANET. 2018 27th International Conference on Computer Communication and Networks","author":"H Zhong","year":"2018","unstructured":"H. Zhong, B. Huang, J. Cui, et al., Efficient conditional privacy-preserving authentication scheme using revocation messages for VANET. 2018 27th International Conference on Computer Communication and Networks (2018), pp. 1\u20138"},{"key":"1494_CR24","doi-asserted-by":"crossref","unstructured":"T. Jing, Y. Pei, B. Zhang, et al., An efficient anonymous batch authentication scheme based on priority and cooperation for VANETs. EURASIP Journal on Wireless Communications and Networking 277 (2018)","DOI":"10.1186\/s13638-018-1294-z"},{"key":"1494_CR25","first-page":"743","volume-title":"21st International Conference on Advanced Information Networking and Applications Workshops","author":"H Sago","year":"2007","unstructured":"H. Sago, M. Shinohara, T. Hara, et al., in 21st International Conference on Advanced Information Networking and Applications Workshops. A data dissemination method for information sharing based on inter-vehicle communication, vol 2 (2007), pp. 743\u2013748"},{"issue":"4","key":"1494_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1740437.1740439","volume":"13","author":"Y Zhang","year":"2010","unstructured":"Y. Zhang, J. Zhao, G. Cao, Roadcast: a popularity aware content sharing scheme in VANETs. ACM SIGMOBILE Mobile Computing and Communications Review 13(4), 1\u201314 (2010)","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"1494_CR27","doi-asserted-by":"crossref","unstructured":"Y. Zhu, Y. Zhang, X. Li, et al., Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud. Concurrency and Computation: Practice and Experience, e4681 (2018)","DOI":"10.1002\/cpe.4681"},{"key":"1494_CR28","unstructured":"X. Li, Y. Zhu, J. Wang, et al., On the soundness and security of privacy-preserving SVM for outsourcing data classification. IEEE Transactions on Dependable and Secure Computing, 1\u20131 (2017)"},{"issue":"1","key":"1494_CR29","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSC.2010.33","volume":"5","author":"J Xu","year":"2012","unstructured":"J. Xu, D. Zhang, L. Liu, et al., Dynamic authentication for cross-realm SOA-based business processes. IEEE Transactions on services computing 5(1), 20\u201332 (2012)","journal-title":"IEEE Transactions on services computing"},{"key":"1494_CR30","doi-asserted-by":"publisher","first-page":"6487","DOI":"10.1109\/ACCESS.2018.2797159","volume":"6","author":"J Wang","year":"2018","unstructured":"J. Wang, R. Zhu, S. Liu, A differentially private unscented Kalman filter for streaming data in IoT. IEEE Access 6, 6487\u20136495 (2018)","journal-title":"IEEE Access"},{"issue":"9","key":"1494_CR31","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1109\/JSAC.2013.SUP.0513047","volume":"31","author":"Y Hao","year":"2013","unstructured":"Y. Hao, J. Tang, Y. Cheng, Secure cooperative data downloading in vehicular ad hoc networks. IEEE Journal on Selected Areas in Communications 31(9), 523\u2013537 (2013)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"6","key":"1494_CR32","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/718639","volume":"10","author":"D Wu","year":"2014","unstructured":"D. Wu, H. Liu, Y. Bi, et al., Evolutionary game theoretic modeling and repetition of media distributed shared in P2P-based VANET. International Journal of Distributed Sensor Networks 10(6), 718639 (2014)","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"1494_CR33","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1007\/978-3-319-72395-2_62","volume-title":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"Y Lai","year":"2017","unstructured":"Y. Lai, L. Zheng, T. Wang, et al., in International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. Cloud-assisted data storage and query processing at vehicular ad-hoc sensor networks (2017), pp. 692\u2013702"},{"issue":"1","key":"1494_CR34","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.future.2011.08.001","volume":"29","author":"J Li","year":"2013","unstructured":"J. Li, Y. Jia, L. Liu, et al., CyberLiveApp: A secure sharing and migration approach for live virtual desktop applications in a cloud environment. Future Generation Computer Systems 29(1), 330\u2013340 (2013)","journal-title":"Future Generation Computer Systems"},{"issue":"10","key":"1494_CR35","doi-asserted-by":"publisher","first-page":"4487","DOI":"10.1109\/TII.2018.2799598","volume":"14","author":"D Miao","year":"2018","unstructured":"D. Miao, L. Liu, R. Xu, et al., An efficient indexing model for the fog layer of industrial internet of things. IEEE Transactions on Industrial Informatics 14(10), 4487\u20134496 (2018)","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"5","key":"1494_CR36","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MC.2016.145","volume":"49","author":"W Shi","year":"2016","unstructured":"W. Shi, S. Dustdar, The promise of edge computing. Computer 49(5), 78\u201381 (2016)","journal-title":"Computer"},{"issue":"5","key":"1494_CR37","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"W. Shi, J. Cao, Q. Zhang, et al., Edge computing: vision and challenges. IEEE Internet of Things Journal 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"1494_CR38","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","volume":"19","author":"Y Mao","year":"2017","unstructured":"Y. Mao, C. You, J. Zhang, et al., A survey on mobile edge computing: the communication perspective. IEEE Communications Surveys & Tutorials 19(4), 2322\u20132358 (2017)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"5","key":"1494_CR39","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MNET.2017.1700030","volume":"31","author":"J Ren","year":"2017","unstructured":"J. Ren, H. Guo, C. Xu, et al., Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Network 31(5), 96\u2013105 (2017)","journal-title":"IEEE Network"},{"key":"1494_CR40","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"R. Roman, J. Lopez, M. Mambo, Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Future Generation Computer Systems 78, 680\u2013698 (2018)","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"1494_CR41","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MNET.2018.1700105","volume":"32","author":"Q Yuan","year":"2018","unstructured":"Q. Yuan, H. Zhou, J. Li, et al., Toward efficient content delivery for automated driving services: an edge computing solution. IEEE Network 32(1), 80\u201386 (2018)","journal-title":"IEEE Network"},{"key":"1494_CR42","doi-asserted-by":"crossref","unstructured":"V.S. Miller, Use of elliptic curves in cryptography. Conference on the theory and application of cryptographic techniques, 417\u2013426 (1985)","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"177","key":"1494_CR43","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"N. Koblitz, Elliptic curve cryptosystems. Mathematics of computation 48(177), 203\u2013209 (1987)","journal-title":"Mathematics of computation"},{"key":"1494_CR44","doi-asserted-by":"crossref","unstructured":"J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy. IEEE Computer Society, 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"issue":"10","key":"1494_CR45","doi-asserted-by":"publisher","first-page":"7868","DOI":"10.1109\/TVT.2016.2541862","volume":"65","author":"MH Eiza","year":"2016","unstructured":"M.H. Eiza, Q. Ni, Q. Shi, Secure and privacy-aware cloud-assisted video reporting service in 5G-enabled vehicular networks. IEEE Transactions on Vehicular Technology 65(10), 7868\u20137881 (2016)","journal-title":"IEEE Transactions on Vehicular Technology"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1494-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1494-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1494-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T23:10:35Z","timestamp":1592867435000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1494-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1494"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1494-1","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"16 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"169"}}