{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:28:54Z","timestamp":1771705734110,"version":"3.50.1"},"reference-count":45,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065717","type":"journal-article","created":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T05:18:58Z","timestamp":1748236738000},"page":"3175-3192","source":"Crossref","is-referenced-by-count":2,"title":["Unleashing the Potential of Metaverse in Social IoV: An Authentication Protocol Based on Blockchain"],"prefix":"10.32604","volume":"84","author":[{"given":"Tsu-Yang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Haozhi","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Maoxin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s12083-024-01839-z","article-title":"An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT","volume":"18","author":"Wu","year":"2025","journal-title":"Peer Peer Netw Appl"},{"key":"ref2","first-page":"12611","article-title":"Ultrare: enhancing receraser for recommendation unlearning via error decomposition","volume":"36","author":"Li","year":"2023","journal-title":"Adv Neural Inform Process Syst"},{"key":"ref3","first-page":"1","article-title":"Adaptive similarity feature construction for ontology matching via multi-layer hybrid genetic programming","author":"Xue","year":"2025","journal-title":"IEEE Trans Evol Comput"},{"key":"ref4","first-page":"3451","article-title":"The metaverse review: exploring the boundless ream of digital reality","volume":"81","author":"Dong","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref5","first-page":"1","article-title":"Post-training attribute unlearning in recommender systems","volume":"43","author":"Chen","year":"2024","journal-title":"ACM Transact Informat Syst"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1016\/j.future.2023.02.008","article-title":"Blockchain for the metaverse: a review","volume":"143","author":"Huynh-The","year":"2023","journal-title":"Fut Generat Comput Syst"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"4348","DOI":"10.1109\/TMC.2023.3290955","article-title":"Metashard: a novel sharding blockchain platform for metaverse applications","volume":"23","author":"Nguyen","year":"2023","journal-title":"IEEE Transact Mobile Comput"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"100678","DOI":"10.1016\/j.cosrev.2024.100678","article-title":"Internet of everything meets the metaverse: bridging physical and virtual worlds with blockchain","volume":"54","author":"Rafique","year":"2024","journal-title":"Comput Sci Rev"},{"key":"ref9","first-page":"1260","article-title":"Blockchain-based IVPPA scheme for pseudonym privacy protection in internet of vehicles","volume":"9","author":"Wang","year":"2024","journal-title":"J Network Intell"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"17059","DOI":"10.1109\/TVT.2024.3424786","article-title":"A hybrid blockchain-based privacy-preserving authentication scheme for vehicular Ad Hoc networks","volume":"73","author":"Su","year":"2024","journal-title":"IEEE Transact Vehic Technol"},{"key":"ref11","first-page":"527","article-title":"Remote vehicle exhaust detection based on integrated deep learning models for environmental monitoring","volume":"10","author":"Lu","year":"2025","journal-title":"J Netw Intellig"},{"key":"ref12","first-page":"517","article-title":"Ethical implications of social internet of vehicles systems","volume":"6","author":"Silva","year":"2018","journal-title":"IEEE Int Things J"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.comnet.2018.07.010","article-title":"A reference framework for social-enhanced Vehicle-to-Everything communications in 5G scenarios","volume":"143","author":"Campolo","year":"2018","journal-title":"Comput Netw"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"11752","DOI":"10.1109\/TITS.2021.3106783","article-title":"SAVE: efficient privacy-preserving location-based service bundle authentication in self-organizing vehicular social networks","volume":"23","author":"Chen","year":"2021","journal-title":"IEEE Transact Intellig Transport Syst"},{"key":"ref15","first-page":"24095","article-title":"A DAG-Based reputation mechanism for preventing peer disclosure in SIoV","volume":"9","author":"Li","year":"2022","journal-title":"IEEE Int Things J"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"24071","DOI":"10.1109\/TITS.2022.3192566","article-title":"SIoVChain: time-lock contract based privacy-preserving data sharing in SIoV","volume":"23","author":"Mohanty","year":"2022","journal-title":"IEEE Transact Intellig Transport Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"4022","DOI":"10.1109\/TVT.2021.3060002","article-title":"A secure and scalable framework for blockchain based edge computation offloading in social internet of vehicles","volume":"70","author":"Javaid","year":"2021","journal-title":"IEEE Transact Vehic Technol"},{"key":"ref18","first-page":"17938","article-title":"A secure and efficient decentralized access control scheme based on blockchain for vehicular social networks","volume":"9","author":"Zhang","year":"2022","journal-title":"IEEE Int Things J"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1109\/TSUSC.2024.3452228","article-title":"Conditional data-sharing privacy-preserving scheme in blockchain-based social internet of vehicles","volume":"10","author":"Xia","year":"2025","journal-title":"IEEE Transact Sustain Comput"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1109\/JSAC.2023.3345382","article-title":"Reputation management for consensus mechanism in vehicular edge metaverse","volume":"42","author":"Liu","year":"2023","journal-title":"IEEE J Select Areas Communicat"},{"key":"ref21","first-page":"34254","article-title":"Blockchain-based pseudonym management for vehicle twin migrations in vehicular edge metaverse","volume":"11","author":"Kang","year":"2024","journal-title":"IEEE Int Things J"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"3598","DOI":"10.1109\/TNSE.2024.3381599","article-title":"Achieving secure and reliable UAV authentication: a shamir\u2019s secret sharing based approach","volume":"11","author":"Bansal","year":"2024","journal-title":"IEEE Transact Netw Sci Eng"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.vehcom.2017.02.006","article-title":"Design of authentication protocol for wireless sensor network-based smart vehicular system","volume":"9","author":"Mohit","year":"2017","journal-title":"Vehicular Communicat"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"3191","DOI":"10.3390\/s18103191","article-title":"Secure authentication protocol for wireless sensor networks in vehicular communications","volume":"18","author":"Yu","year":"2018","journal-title":"Sensors"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"e4511","DOI":"10.1002\/dac.4511","article-title":"A lightweight anonymous two-factor authentication protocol for wireless sensor networks in Internet of Vehicles","volume":"33","author":"Sadri","year":"2020","journal-title":"Int J Commun Syst"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"114","DOI":"10.3390\/electronics10020114","article-title":"An effective data sharing scheme based on blockchain in vehicular social networks","volume":"10","author":"Jiang","year":"2021","journal-title":"Electronics"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"e4279","DOI":"10.1002\/ett.4279","article-title":"SI-AKAV: secure integrated authentication and key agreement for cellular-connected IoT devices in vehicular social networks","volume":"35","author":"Esfahani","year":"2024","journal-title":"Trans Emerg Telecomm Technol"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11948-014-9621-1","article-title":"The convergence of virtual reality and social networks: threats to privacy and autonomy","volume":"22","author":"O\u2019Brolch\u00e1in","year":"2016","journal-title":"Sci Eng Ethics"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MTS.2018.2826060","article-title":"The social metaverse: battle for privacy","volume":"37","author":"Falchuk","year":"2018","journal-title":"IEEE Technol Soc Magaz"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3359626","article-title":"Security and privacy approaches in mixed reality: a literature survey","volume":"52","author":"De Guzman","year":"2019","journal-title":"ACM Comput Surv"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"98944","DOI":"10.1109\/ACCESS.2022.3206457","article-title":"Design of secure mutual authentication scheme for metaverse environments using blockchain","volume":"10","author":"Ryu","year":"2022","journal-title":"IEEE Access"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.3390\/math10142545","article-title":"LLAKEP: a low-latency authentication and key exchange protocol for energy internet of things in the metaverse era","volume":"10","author":"Zhang","year":"2022","journal-title":"Mathematics"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"3817","DOI":"10.1109\/TIFS.2023.3288689","article-title":"A secure authentication framework to guarantee the traceability of avatars in metaverse","volume":"18","author":"Yang","year":"2023","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.comcom.2023.09.020","article-title":"A robust privacy-preserving ECC-based three-factor authentication scheme for metaverse environment","volume":"211","author":"Thakur","year":"2023","journal-title":"Comput Communicat"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"111973","DOI":"10.1016\/j.asoc.2024.111973","article-title":"Fuzzy logic and biometric-based lightweight cryptographic authentication for metaverse security","volume":"164","author":"Gupta","year":"2024","journal-title":"Appl Soft Comput"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Transact Inform Theory"},{"key":"ref37","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"453","article-title":"Analysis of key-exchange protocols and their use for building secure channels","author":"Canetti","year":"2001"},{"key":"ref38","first-page":"22501","article-title":"Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT","volume":"9","author":"Zhang","year":"2022","journal-title":"IEEE Int Things J"},{"key":"ref39","first-page":"1","article-title":"Protecting virtual economies: a blockchain-based anti-phishing authentication protocol for metaverse applications","author":"Chen","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","article-title":"Zipf\u2019s law in passwords","volume":"12","author":"Wang","year":"2017","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"6588","DOI":"10.1109\/TII.2022.3201971","article-title":"An improved lightweight two-factor authentication protocol for IoT applications","volume":"19","author":"Modarres","year":"2022","journal-title":"IEEE Transact Indus Inform"},{"key":"ref42","first-page":"14253","article-title":"Two-factor privacy preserving protocol for efficient authentication in internet of vehicles networks","volume":"11","author":"Al Sibahee","year":"2023","journal-title":"IEEE Int Things J"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"9075","DOI":"10.1109\/TMC.2024.3357599","article-title":"A chebyshev polynomial-based authentication scheme using blockchain technology for fog-based vehicular network","volume":"23","author":"Tomar","year":"2024","journal-title":"IEEE Transact Mobile Comput"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"110391","DOI":"10.1016\/j.comnet.2024.110391","article-title":"Provably secure fog-based authentication protocol for VANETs","volume":"246","author":"Awais","year":"2024","journal-title":"Comput Netw"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"8039","DOI":"10.1109\/TII.2022.3156629","article-title":"An efficient and provably secure certificateless protocol for industrial Internet of Things","volume":"18","author":"Rafique","year":"2022","journal-title":"IEEE Transact Indus Inform"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_65717\/TSP_CMC_65717.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:52:25Z","timestamp":1763344345000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":45,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065717","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}