{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:43:49Z","timestamp":1770068629477,"version":"3.49.0"},"reference-count":23,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T00:00:00Z","timestamp":1548288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>A vehicular ad hoc network (VANET) is a special mobile ad hoc network that provides vehicle collaborative security applications using intervehicle communication technology. The method enables vehicles to exchange information (e.g., emergency brake). In VANET, there are many vehicle platoon driving scenes, where vehicles with identical attributes (location, organization, etc.) are organized as a group. However, this organization causes the issue of security threats (message confidentiality, identity privacy, etc.) because of an unsafe wireless communication channel. To protect the security and privacy of group communication, it is necessary to design an effective group key agreement scheme. By negotiating a dynamic session secret key using a fixed roadside unit (RSU), which has stronger computational ability than the on-board unit (OBU) equipped on the vehicle, the designed scheme can help to provide more stable communication performance and speed up the encryption and decryption processes. To effectively implement the anonymous authentication mechanism and authentication efficiency, we use a batch authentication scheme and a shared secret key mechanism among the vehicles, RSUs and trusted authority (TA). We design an efficient group secret key agreement scheme, which satisfies the above communication and security requirements, protects the privacy of vehicles, and traces the real identity of the vehicle at a time when it is necessary. Computational analysis shows that the proposed scheme is secure and more efficient than existing schemes.<\/jats:p>","DOI":"10.3390\/s19030482","type":"journal-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T11:12:48Z","timestamp":1548328368000},"page":"482","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["A Secure and Efficient Group Key Agreement Scheme for VANET"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3479-6989","authenticated-orcid":false,"given":"Lianhai","family":"Liu","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410006, China"},{"name":"School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin 541004, China"}]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin 541004, China"}]},{"given":"Jingwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin 541004, China"}]},{"given":"Qing","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin 541004, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"ref_1","unstructured":"Paridel, K., Balen, J., Berbers, Y., and Martinovic, G. (2012, January 21\u201326). VVID: A delay tolerant data dissemination architecture for VANETs using V2V and V2I communication. Proceedings of the International Conference on Mobile Services, Resources, and Users, Venice, Italy."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Kim, J.Y., Choi, H.K., and Copeland, J.A. (2010, January 6\u20139). An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications. Proceedings of the IEEE 72nd Vehicular Technology Conference\u2014Fall, Ottawa, ON, Canada.","DOI":"10.1109\/VETECF.2010.5594297"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Lu, X., Xu, D., Xiao, L., Wang, L., and Zhuang, W. (2018, January 4\u20138). Anti-Jamming Communication Game for UAV-Aided VANETs. Proceedings of the GLOBECOM 2017\u20142017 IEEE Global Communications Conference, Singapore.","DOI":"10.1109\/GLOCOM.2017.8253987"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Abuelela, M., Olariu, S., and Ibrahim, K. (2009, January 26\u201329). A Secure and Privacy Aware Data Dissemination for the Notification of Traffic Incidents. Proceedings of the VTC Spring 2009\u2014IEEE 69th Vehicular Technology Conference, Barcelona, Spain.","DOI":"10.1109\/VETECS.2009.5073340"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Abbasi, I., Khan, A., and Ali, S. (2018). Dynamic Multiple Junction Selection Based Routing Protocol for VANETs in City Environment. Appl. Sci., 8.","DOI":"10.3390\/app8050687"},{"key":"ref_6","unstructured":"Dorronsoro, B.E., Ruiz, P., Danoy, G., Pigne, Y., and Bouvry, P. (2014). Introduction to Mobile Ad Hoc Networks, John Wiley & Sons, Inc."},{"key":"ref_7","first-page":"85","article-title":"Efficient pairing-based batch anonymous authentication scheme for VANET","volume":"25","author":"Song","year":"2018","journal-title":"J. China Univ. Posts Telecommun."},{"key":"ref_8","first-page":"151","article-title":"An Authenticated Group Key Agreement Scheme for Mobile Communication Based on Bilinear Pairing","volume":"29","author":"Hai","year":"2012","journal-title":"Comput. Appl. Softw."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Maslekar, N., Boussedjra, M., Mouzna, J., and Labiod, H. (2011, January 4\u20138). A stable clustering algorithm for efficiency applications in VANETs. Proceedings of the 2011 7th International Wireless Communications and Mobile Computing Conference, Istanbul, Turkey.","DOI":"10.1109\/IWCMC.2011.5982709"},{"key":"ref_10","first-page":"137","article-title":"Encounter Prediction-based Data Forwarding for High Reliability in Bus Networks","volume":"41","author":"Liu","year":"2018","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Bhakthavathsalam, R., Nayak, S., and Srikumar, M.G. (2009, January 12\u201314). Expediency of penetration ratio and evaluation of mean throughput for safety and commercial applications in VANETs. Proceedings of the International Conference on Ultra Modern Telecommunications & Workshops, St. Petersburg, Russia.","DOI":"10.1109\/ICUMT.2009.5345426"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Wang, Y., Ding, Y., Wu, Q., Wei, Y., Qin, B., and Wang, H. (2018). Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authentication in VANETs. IEEE Trans. Inf. Forensics Secur.","DOI":"10.1109\/TIFS.2018.2885277"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Lee, J.L., Hwang, J., Park, H., and Kim, D. (2018, January 15\u201319). On latency-aware tree topology construction for emergency responding VANET applications. Proceedings of the IEEE INFOCOM 2018\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, USA.","DOI":"10.1109\/INFCOMW.2018.8406819"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wagan, A.A., and Jung, L.T. (2014, January 3\u20135). Security framework for low latency vanet applications. Proceedings of the International Conference on Computer and Information Sciences, Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICCOINS.2014.6868395"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Qian, Y., and Moayeri, N. (2008, January 11\u201314). Design of Secure and Application-Oriented VANETs. Proceedings of the VTC Spring 2008\u2014IEEE Vehicular Technology Conference, Singapore.","DOI":"10.1109\/VETECS.2008.610"},{"key":"ref_16","first-page":"3678","article-title":"A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET","volume":"11","author":"Han","year":"2017","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Chim, T.W., Yiu, S.M., Hui, L.C.K., Jiang, Z.L., and Li, V.O.K. (2010). SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs, Springer.","DOI":"10.5772\/12887"},{"key":"ref_18","first-page":"132","article-title":"Novel Group Authentication Key Agreement Scheme","volume":"38","author":"Lei","year":"2012","journal-title":"Comput. Eng."},{"key":"ref_19","unstructured":"Zheng, J., Yang, C., Xue, J., and Zhang, C. (2015, January 12\u201313). A Dynamic ID-based Authenticated Group Key Agreement Protocol. Proceedings of the 4th National Conference on Electrical, Electronics and Computer Engineering, Xi\u2019an, China."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chuang, M.C., and Lee, J.F. (2011, January 16\u201318). PPAS: A privacy preservation authentication scheme for vehicle-to-infrastructure communication networks. Proceedings of the 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet), XianNing, China.","DOI":"10.1109\/CECNET.2011.5768254"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1109\/TVT.2015.2405853","article-title":"A Threshold Anonymous Authentication Protocol for VANETs","volume":"65","author":"Shao","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_22","unstructured":"Jiang, S., Zhu, X., and Wang, L. (2013, January 7\u201310). A conditional privacy scheme based on anonymized batch authentication in Vehicular Ad Hoc Networks. Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China."},{"key":"ref_23","unstructured":"(2018, March 06). PBC Library. Available online: http:\/\/crypto.stanford.edu\/pbc\/."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/3\/482\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:28:31Z","timestamp":1760185711000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/3\/482"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,24]]},"references-count":23,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2019,2]]}},"alternative-id":["s19030482"],"URL":"https:\/\/doi.org\/10.3390\/s19030482","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,24]]}}}