{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:42:05Z","timestamp":1769748125090,"version":"3.49.0"},"reference-count":26,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065560","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T07:22:23Z","timestamp":1753946543000},"page":"1715-1732","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["CD-AKA-IoV: A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle"],"prefix":"10.32604","volume":"85","author":[{"given":"Tsu-Yang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Haozhi","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Maoxin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.trc.2016.03.008","article-title":"Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network-Performance evaluation","volume":"68","author":"Dey","year":"2016","journal-title":"Transport Res Part C: Emerg Technol"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"167875","DOI":"10.1109\/ACCESS.2020.3022778","article-title":"IoV-SMAP: secure and efficient message authentication protocol for IoV in smart city environment","volume":"8","author":"Yu","year":"2020","journal-title":"IEEE Access"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.vehcom.2014.05.001","article-title":"Survey on VANET security challenges and possible cryptographic solutions","volume":"1","author":"Mejri","year":"2014","journal-title":"Vehic Communicat"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3547","DOI":"10.1109\/JSYST.2020.2991168","article-title":"A lightweight privacy-preserving authentication protocol for VANETs","volume":"14","author":"Li","year":"2020","journal-title":"IEEE Systems J"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"87","DOI":"10.53106\/160792642024012501008","article-title":"RDVFF-reliable data dissemination in vehicular ad hoc networks based on validation of far to farthest zone","volume":"25","author":"Gupta","year":"2024","journal-title":"J Internet Technol"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"5535","DOI":"10.1109\/TVT.2020.2981934","article-title":"On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment","volume":"69","author":"Sutrala","year":"2020","journal-title":"IEEE Transacti Vehic Technol"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"6633","DOI":"10.1109\/TITS.2021.3059638","article-title":"PLVA: privacy-preserving and lightweight V2I authentication protocol","volume":"23","author":"Lv","year":"2021","journal-title":"IEEE Transact Intell Transport Syst"},{"key":"ref8","first-page":"1260","article-title":"Blockchain-based IVPPA scheme for pseudonym privacy protection in internet of vehicles","volume":"9","author":"Wang","year":"2024","journal-title":"J Network Intell"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2740","DOI":"10.1109\/TITS.2017.2657649","article-title":"Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm","volume":"18","author":"Liu","year":"2017","journal-title":"IEEE Transact Intell Transport Syst"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2412","DOI":"10.1109\/TNSE.2021.3093435","article-title":"Secure and efficient honey list-based authentication protocol for vehicular ad hoc networks","volume":"8","author":"Lee","year":"2021","journal-title":"IEEE Transact Netw Sci Eng"},{"key":"ref11","first-page":"100306","article-title":"Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications","volume":"28","author":"Eftekhari","year":"2021","journal-title":"Veh Commun"},{"key":"ref12","first-page":"604","article-title":"A privacy-preserving and cross-domain group authentication scheme for vehicular in LTE-A networks","volume":"12","author":"Xu","year":"2017","journal-title":"J Communicat"},{"key":"ref13","first-page":"8078","article-title":"A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network","volume":"9","author":"Yang","year":"2021","journal-title":"IEEE Int Things J"},{"key":"ref14","series-title":"ICC 2021-IEEE International Conference on Communications","first-page":"1","article-title":"A blockchain-assisted seamless handover authentication for V2I communication in 5G wireless networks","author":"Yu","year":"2021"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.comcom.2021.03.022","article-title":"Three-factor authentication protocol using physical unclonable function for IoV","volume":"173","author":"Jiang","year":"2021","journal-title":"Comput Communicat"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3791","DOI":"10.1109\/TNSE.2022.3186949","article-title":"EV-PUF: lightweight security protocol for dynamic charging system of electric vehicles using physical unclonable functions","volume":"9","author":"Babu","year":"2022","journal-title":"IEEE Transact Netw Sci Eng"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s12083-024-01839-z","article-title":"An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT","volume":"18","author":"Wu","year":"2025","journal-title":"Peer Peer Netw Appl"},{"key":"ref18","series-title":"ICC 2022-IEEE International Conference on Communications","first-page":"1678","article-title":"A certificateless efficient and secure group handover authentication protocol in 5G enabled vehicular networks","author":"Yan","year":"2022"},{"key":"ref19","first-page":"100567","article-title":"A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment","volume":"39","author":"Chen","year":"2023","journal-title":"Veh Commun"},{"key":"ref20","unstructured":"Costan V, Devadas S. Intel SGX Explained, Cryptology ePrint Archive, Report 2016\/086. 2016."},{"key":"ref21","first-page":"3533","article-title":"A secure authentication scheme for wireless sensor networks based on DAC and Intel SGX","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Int Things J"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1145\/3593021","article-title":"Intel software guard extensions applications: a survey","volume":"55","author":"Will","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Transact Inform Theory"},{"key":"ref24","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"453","article-title":"Analysis of key-exchange protocols and their use for building secure channels","author":"Canetti","year":"2001"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"13571","DOI":"10.1109\/TII.2024.3414443","article-title":"High-availability authentication and key agreement for internet of things-based devices in Industry 5.0","volume":"20","author":"Gao","year":"2024","journal-title":"IEEE Transact Indust Inform"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"101626","DOI":"10.1016\/j.iot.2025.101626","article-title":"BSCP-SG: blockchain-enabled secure communication protocols for IoT-driven smart grid systems","volume":"32","author":"Alrashdi","year":"2025","journal-title":"Int Things"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_65560\/TSP_CMC_65560.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:04:21Z","timestamp":1763345061000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63520"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":26,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065560","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-03-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}