{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:58Z","timestamp":1776926338470,"version":"3.51.2"},"reference-count":27,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066836","type":"journal-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T03:12:31Z","timestamp":1750821151000},"page":"4997-5019","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["Light-Weighted Mutual Authentication and Key Agreement in V2N VANET"],"prefix":"10.32604","volume":"84","author":[{"given":"Yanan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Lei","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ge","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Suhao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"4260","DOI":"10.1109\/TITS.2025.3528932","article-title":"Identity-based authentication in VANETs: a review","volume":"26","author":"Manasrah","year":"2025","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1049\/itr2.12015","article-title":"Joint use of DSRC and C-V2X for V2X communications in the 5.9 GHz ITS band","volume":"15","author":"Ansari","year":"2021","journal-title":"IET Intell Transp Syst"},{"key":"ref3","series-title":"Proceedings of the ICC 2024\u2014IEEE International Conference on Communications","article-title":"HARQ retransmissions in C-V2X: a BSM latency analysis","author":"Fouda","year":"2024 Jun 9\u201313"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"5446","DOI":"10.1109\/TMC.2025.3532120","article-title":"Towards resilience 5G-V2N: efficient and privacy-preserving authentication protocol for multi-service access and handover","volume":"24","author":"Bi","year":"2025","journal-title":"IEEE Trans Mob Comput"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"4022","DOI":"10.1049\/iet-com.2020.0473","article-title":"3DEOR: an opportunity routing protocol using evidence theory appropriate for 3d urban environments in VANETs","volume":"14","author":"Bozorgzadeh","year":"2021","journal-title":"IET Commun"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2023.109997","article-title":"A dynamic and multi-level key management method in wireless sensor networks (WSNs)","volume":"236","author":"Khah","year":"2023","journal-title":"Comput Netw"},{"key":"ref7","first-page":"2992","article-title":"Blockchain based efficient anonymous authentication scheme for IOV","volume":"40","author":"Chen","year":"2020","journal-title":"J Comput Appl"},{"key":"ref8","first-page":"100347","article-title":"PLHAS: privacy-preserving localized hybrid authentication scheme for large scale vehicular ad hoc networks","volume":"30","author":"Altaf","year":"2021","journal-title":"Veh Commun"},{"key":"ref9","series-title":"Proceedings of the 2022 4th International Conference on Applied Machine Learning (ICAML)","author":"Mukathe","year":"2022 Jul 23\u201325"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"12140","DOI":"10.1109\/JIOT.2022.3164147","article-title":"BDRA: blockchain and decentralized identifiers assisted secure registration and authentication for VANETs","volume":"10","author":"Li","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref11","first-page":"100763","volume":"47","author":"Guo","year":"2024","journal-title":"Veh Commun"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","article-title":"Kerberos: an authentication service for computer networks","volume":"32","author":"Neuman","year":"1994","journal-title":"IEEE Commun Mag"},{"key":"ref13","series-title":"Proceedings of the 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI)","article-title":"Kerberos protocol: security attacks and solution","author":"Qatinah","year":"2024 Nov 25\u201326"},{"key":"ref14","series-title":"Proceedings of the Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45333-4","article-title":"Public key cryptography for initial authentication in Kerberos","author":"Tung","year":"2001"},{"key":"ref15","series-title":"Proceedings of the 2018 Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR)","article-title":"A new version of Kerberos authentication protocol using ECC and threshold cryptography for cloud security","author":"Sutradhar","year":"2018 Jun 25\u201329"},{"key":"ref16","series-title":"Proceedings of the 2024 International Conference on Telecommunications and Power Electronics (TELEPE)","article-title":"Analysis of hadoop security mechanism based on kerberos security model optimization","author":"Liang","year":"2024 May 29\u201331"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-41395-7","author":"Maes","year":"2013","journal-title":"Physically unclonable functions: constructions, properties and applications"},{"key":"ref18","series-title":"Proceedings of the 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","article-title":"LPA: a lightweight PUF-based authentication protocol for IoT system","author":"Rai","year":"2023 Nov 1\u20133"},{"key":"ref19","series-title":"2021 International Conference on Circuits, Controls and Communications (CCUBE)","article-title":"The MUX-based PUF architecture for hardware security","author":"Hatti","year":"2021 Dec 23\u201324"},{"key":"ref20","first-page":"1","article-title":"A PUF based secure communication protocol for IoT","volume":"16","author":"Chatterjee","year":"2017","journal-title":"ACM Trans Embed Comput Syst"},{"key":"ref21","first-page":"812","article-title":"A PUF-based low cost secure communication scheme for IoT","volume":"47","author":"Li","year":"2019","journal-title":"Acta Electron Sin"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"8054","DOI":"10.1109\/ACCESS.2021.3084903","article-title":"A lightweight PUF-based authentication protocol using secret pattern recognition for constrained IoT devices","volume":"9","author":"Idriss","year":"2021","journal-title":"IEEE Access"},{"key":"ref23","first-page":"34","article-title":"A mutual security authentication method for RFID-PUF circuit based on deep learning","volume":"22","author":"Liang","year":"2021","journal-title":"ACM Trans Internet Technol"},{"key":"ref24","series-title":"Proceedings of the ICC 2023\u2014IEEE International Conference on Communications","article-title":"A PUF-based authentication and key distribution scheme for in-vehicle network","author":"Lai","year":"2023 May 28\u2013Jun 1"},{"key":"ref25","first-page":"38","article-title":"MI-PUF-based secure authentication protocol for V2X communication information network security","volume":"23","author":"Tan","year":"2023","journal-title":"Appl Res Comput\/Jisuanji Yingyong Yanjiu"},{"key":"ref26","first-page":"58675","article-title":"A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things","volume":"8","author":"Shin","year":"2020","journal-title":"IEEE Access"},{"key":"ref27","unstructured":"Zhu QS. Research on security authentication in UAV ad hoc networks [master\u2019s thesis]. Nanjing, China: Nanjing University of Posts and Telecommunications; 2023. (In Chinese). doi:10.27251\/d.cnki.gnjdc.2023.000193."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_66836\/TSP_CMC_66836.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:26Z","timestamp":1776923126000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":27,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066836","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}