{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:40:16Z","timestamp":1770230416895,"version":"3.49.0"},"reference-count":61,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.053854","type":"journal-article","created":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T20:40:12Z","timestamp":1727296812000},"page":"1029-1057","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":8,"title":["Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks"],"prefix":"10.32604","volume":"81","author":[{"given":"Vincent Omollo","family":"Nyangaresi","sequence":"first","affiliation":[]},{"given":"Arkan A.","family":"Ghaib","sequence":"additional","affiliation":[]},{"given":"Hend Muslim","family":"Jasim","sequence":"additional","affiliation":[]},{"given":"Zaid Ameen","family":"Abduljabbar","sequence":"additional","affiliation":[]},{"given":"Junchao","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Mustafa A. Al","family":"Sibahee","sequence":"additional","affiliation":[]},{"given":"Abdulla J. Y.","family":"Aldarwish","sequence":"additional","affiliation":[]},{"given":"Ali Hasan","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Husam A.","family":"Neamah","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"2520","DOI":"10.1109\/TMC.2023.3259394","article-title":"UAV-assisted task offloading in vehicular edge computing networks","volume":"23","author":"Dai","year":"2023","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2409","DOI":"10.1109\/TITS.2019.2918255","article-title":"Intersection fog-based distributed routing for V2V communication in urban vehicular ad hoc networks","volume":"21","author":"Sun","year":"2019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TFUZZ.2024.3519186","article-title":"EMSIN: Enhanced multi-stream interaction network for vehicle trajectory prediction","author":"Ren","year":"2024","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1037","DOI":"10.1109\/TIFS.2021.3066277","article-title":"On the security of a lightweight conditional privacy-preserving authentication in VANETs","volume":"18","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Inform. Forensic. Sec."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1109\/JSAC.2022.3227027","article-title":"Perception task offloading with collaborative computation for autonomous driving","volume":"41","author":"Xiao","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"908","DOI":"10.1109\/TVT.2018.2884525","article-title":"V2V routing in a VANET based on the autoregressive integrated moving average model","volume":"68","author":"Sun","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref7","article-title":"Bilinear pairing-based access control and key agreement scheme for smart transportation","volume":"1","author":"Bagga","year":"2023, Art. no. 100001","journal-title":"Cyber Secur. Appl."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/TVT.2021.3050399","article-title":"An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs","volume":"70","author":"Ali","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"7550","DOI":"10.1109\/TVT.2018.2828651","article-title":"Bus-trajectory-based street-centric routing for message delivery in Urban vehicular ad hoc networks","volume":"67","author":"Sun","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2854","DOI":"10.1109\/TNSM.2023.3238307","article-title":"Blockchain-assisted privacy-preserving traffic route management scheme for fog-based vehicular ad-hoc networks","volume":"20","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"8677","DOI":"10.1109\/TITS.2022.3203791","article-title":"Temporal-spatial quantum graph convolutional neural network based on schr\u00f6dinger approach for traffic congestion prediction","volume":"24","author":"Qu","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref12","series-title":"EAI Int. Conf. Appl. Cryptogr. Comput. Commun.","first-page":"46","article-title":"Symmetric key based scheme for verification token generation in internet of things communication environment","author":"Mutlaq","year":"2022"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1109\/JSAC.2023.3322764","article-title":"EdgeCooper: Network-aware cooperative LiDAR perception for enhanced vehicular awareness","volume":"42","author":"Luo","year":"2023","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TVT.2021.3050614","article-title":"On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system","volume":"70","author":"Bagga","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2228","DOI":"10.1109\/TNET.2021.3084251","article-title":"A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs","volume":"29","author":"Jiang","year":"2021","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2346","DOI":"10.1109\/TCYB.2021.3117705","article-title":"Understanding private car aggregation effect via spatio-temporal analysis of trajectory data","volume":"53","author":"Xiao","year":"2021","journal-title":"IEEE Trans. Cybern."},{"key":"ref17","first-page":"426","article-title":"Safe consensus control of cooperative-competitive multi-agent systems via differential privacy","volume":"58","author":"Ma","year":"2022","journal-title":"Kybernetika"},{"key":"ref18","first-page":"1","article-title":"Secure data integrity check based on verified public key encryption with equality test for multi-cloud storage","author":"Li","year":"2024","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref19","article-title":"Finite-time tracking control of heterogeneous multi-AUV systems with partial measurements and intermittent communication","volume":"67","author":"Chen","year":"2024","journal-title":"Sci. China Inf. Sci."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"8367","DOI":"10.1109\/TVT.2024.3356587","article-title":"Joint trajectory and communication design for UAV-assisted symbiotic radio networks","volume":"73","author":"Zhao","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"8720","DOI":"10.1109\/TVT.2021.3098429","article-title":"Trajectory prediction of preceding target vehicles based on lane crossing and final points generation model considering driving styles","volume":"70","author":"Liu","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref22","doi-asserted-by":"crossref","first-page":"2571","DOI":"10.1109\/TITS.2019.2920738","article-title":"V2V for vehicular safety applications","volume":"21","author":"Thota","year":"2019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref23","first-page":"93","author":"Li","year":"2017","journal-title":"Secure and Efficient V2V Communications for Heterogeneous Vehicle Ad Hoc Networks"},{"key":"ref24","first-page":"103","author":"Nyangaresi","year":"2022","journal-title":"Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"5460","DOI":"10.1002\/sec.1710","article-title":"Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs","volume":"9","author":"Wang","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"144957","DOI":"10.1109\/ACCESS.2020.3014678","article-title":"Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks","volume":"8","author":"Al-Shareeda","year":"2020","journal-title":"IEEE Access"},{"key":"ref27","article-title":"A novel privacy-preserving authentication protocol using bilinear pairings for the VANET environment","volume":"2021","author":"Zhang","year":"2021, Art. no. 6692568","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.comcom.2017.09.005","article-title":"LIAP: A local identity-based anonymous message authentication protocol in VANETs","volume":"112","author":"Wang","year":"2017","journal-title":"Comput. Commun."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.future.2017.07.002","article-title":"A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs","volume":"84","author":"Islam","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.3390\/jsan11030055","article-title":"Session-dependent token-based payload enciphering scheme for integrity enhancements in wireless networks","volume":"11","author":"Abduljabbar","year":"2022","journal-title":"J. Sens. Actuator Netw."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1109\/TVT.2019.2946935","article-title":"Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs","volume":"69","author":"Shen","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1109\/TVT.2016.2583466","article-title":"Privacy-preserving route reporting schemes for traffic management systems","volume":"66","author":"Rabieh","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref33","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s11277-019-06576-8","article-title":"Practical data transmission scheme for wireless sensor networks in heterogeneous IoT environment","volume":"109","author":"Luo","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"10626","DOI":"10.1109\/TVT.2017.2744182","article-title":"Anonymous and lightweight authentication for secure vehicular networks","volume":"66","author":"Ying","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.3390\/s18103191","article-title":"Secure authentication protocol for wireless sensor networks in vehicular communications","volume":"18","author":"Yu","year":"2018, Art. no. 3191","journal-title":"Sensors"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1002\/dac.4511","article-title":"A lightweight anonymous two-factor authentication protocol for wireless sensor networks in Internet of Vehicles","volume":"33","author":"Sadri","year":"2020, Art. no. e4511","journal-title":"Int. J. Commun. Syst."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"12047","DOI":"10.1109\/ACCESS.2019.2891105","article-title":"A secure authentication protocol for internet of vehicles","volume":"7","author":"Chen","year":"2019","journal-title":"IEEE Access"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"55050","DOI":"10.1109\/ACCESS.2019.2911924","article-title":"An efficient privacy-preserving mutual authentication scheme for secure V2V communication in vehicular ad hoc network","volume":"7","author":"Wu","year":"2019","journal-title":"IEEE Access"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"6709","DOI":"10.1109\/TVT.2020.2986585","article-title":"A lightweight mutual authentication protocol for V2V communication in internet of vehicles","volume":"69","author":"Vasudev","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref40","doi-asserted-by":"crossref","first-page":"142858","DOI":"10.1109\/ACCESS.2020.3014038","article-title":"MFSPV: A multi-factor secured and lightweight privacy-preserving authentication scheme for VANETs","volume":"8","author":"Alfadhli","year":"2020","journal-title":"IEEE Access"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1109\/JIOT.2020.3010893","article-title":"A privacy-preserving and scalable authentication protocol for the internet of vehicles","volume":"8","author":"Aman","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref42","doi-asserted-by":"crossref","first-page":"14188","DOI":"10.1109\/TVT.2020.3038834","article-title":"A lightweight authentication and attestation scheme for in-transit vehicles in IoV scenario","volume":"69","author":"Alladi","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref43","first-page":"1","article-title":"Efficient PUF based authentication protocol for internet of drones","author":"Nyangaresi","year":"2021","journal-title":"2021 Int. Telecommun. Conf. (ITC-Egypt)"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"5974","DOI":"10.1109\/TVT.2021.3078806","article-title":"Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications","volume":"70","author":"Ali","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref45","doi-asserted-by":"crossref","first-page":"5535","DOI":"10.1109\/TVT.2020.2981934","article-title":"On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment","volume":"69","author":"Sutrala","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref46","series-title":"ICC, 2019-2019 IEEE Int. Conf. Commun. (ICC)","first-page":"1","article-title":"A novel secure authentication scheme for heterogeneous internet of things","author":"Liu","year":"2019"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"9076","DOI":"10.1109\/JIOT.2019.2927497","article-title":"An efficient and safe road condition monitoring authentication scheme based on fog computing","volume":"6","author":"Cui","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref48","doi-asserted-by":"crossref","first-page":"2792","DOI":"10.1109\/TVLSI.2019.2929420","article-title":"A blockchain-based privacy-preserving authentication scheme for VANETs","volume":"27","author":"Lu","year":"2019","journal-title":"IEEE Trans. Very Large-Scale Integr. (VLSI) Syst."},{"key":"ref49","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2022.100096","article-title":"Cross-domain identity authentication scheme based on blockchain and PKI system","volume":"3","author":"Zhang","year":"2023, Art. no. 100096","journal-title":"High-Confid. Comput."},{"key":"ref50","doi-asserted-by":"crossref","first-page":"7408","DOI":"10.1109\/TITS.2020.3002096","article-title":"BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks","volume":"22","author":"Lin","year":"2020","journal-title":"IEEE Trans. Intell. Trans. Syst."},{"key":"ref51","article-title":"Blockchain-based secret key extraction for efficient and secure authentication in VANETs","volume":"74","author":"Shawky","year":"2023, Art. no. 103476","journal-title":"J. Inf. Secur. Appl."},{"key":"ref52","doi-asserted-by":"crossref","first-page":"8738","DOI":"10.1109\/TVT.2023.3244077","article-title":"An efficient cross-layer authentication scheme for secure communication in vehicular ad-hoc networks","volume":"72","author":"Shawky","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref53","doi-asserted-by":"crossref","first-page":"2482","DOI":"10.1109\/ACCESS.2019.2962387","article-title":"Secure authentication and key management with blockchain in VANETs","volume":"8","author":"Tan","year":"2019","journal-title":"IEEE Access"},{"key":"ref54","series-title":"Future Access Enablers for Ubiquitous and Intelligent Infrastructures","first-page":"16","article-title":"MAC-based symmetric key protocol for secure traffic forwarding in drones","author":"Abduljabbar","year":"2022"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"15527","DOI":"10.1109\/TITS.2022.3183215","article-title":"A machine learning approach for energy-efficient intelligent transportation scheduling problem in a real-world dynamic circumstance","volume":"24","author":"Mou","year":"2022","journal-title":"IEEE Trans. Intell. Trans. Syst."},{"key":"ref56","doi-asserted-by":"crossref","DOI":"10.3390\/drones6080215","article-title":"Task allocation of multiple unmanned aerial vehicles based on deep transfer reinforcement learning","volume":"6","author":"Yin","year":"2022","journal-title":"Drones"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"8078","DOI":"10.1109\/JIOT.2021.3107443","article-title":"A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network","volume":"9","author":"Yang","year":"2021","journal-title":"IEEE Internet of Things J."},{"key":"ref58","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/TNSE.2022.3142287","article-title":"Design of blockchain-based lightweight V2I handover authentication protocol for VANET","volume":"9","author":"Son","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref59","doi-asserted-by":"crossref","DOI":"10.3390\/s22010401","article-title":"QoS aware and fault tolerance based software-defined vehicular networks using cloud-fog computing","volume":"22","author":"Syed","year":"2022","journal-title":"Sensors"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"12550","DOI":"10.1109\/TITS.2024.3384038","article-title":"Anti-jamming technique for IRS aided JRC system in mobile vehicular networks","volume":"25","author":"Yao","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref61","doi-asserted-by":"crossref","first-page":"1506","DOI":"10.1109\/JIOT.2018.2847447","article-title":"E-AUA: An efficient anonymous user authentication protocol for mobile IoT","volume":"6","author":"Zeng","year":"2018","journal-title":"IEEE Internet of Things J."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_53854\/TSP_CMC_53854.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:31:15Z","timestamp":1741314675000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":61,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.053854","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-05-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}