iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1155/2022/8406649
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:19:56Z","timestamp":1721866796906},"reference-count":29,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2022,6,3]],"date-time":"2022-06-03T00:00:00Z","timestamp":1654214400000},"content-version":"vor","delay-in-days":153,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2022,1]]},"abstract":"Internet of vehicles (IoV) is an emerging area of advanced transportation systems, in which the functionality of traditional vehicular ad hoc networks (VANET) combined with the Internet of things (IoT). This technology allows vehicle users and drivers to interact in real time from anywhere and anytime. However, until recently, the major two problems that authentication and key management methods may solve are security and privacy. In this study, we offer a privacy\u2010preserving authentication and key management scheme for the IoV environment that is computationally and communication cost\u2010effective. We conducted a thorough security analysis, demonstrating that the proposed scheme is resistant to a variety of cryptographic attacks. We have included a cost analysis that indicates the proposed scheme is more efficient than IoV\u2019s current privacy\u2010preserving authentication and key management schemes.<\/jats:p>","DOI":"10.1155\/2022\/8406649","type":"journal-article","created":{"date-parts":[[2022,6,3]],"date-time":"2022-06-03T19:35:08Z","timestamp":1654284908000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cost\u2010Efficient Privacy\u2010Preserving Authentication and Key Management Scheme for Internet of Vehicle Ecosystem"],"prefix":"10.1155","volume":"2022","author":[{"given":"Tahir Ali","family":"Shah","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3895-2309","authenticated-orcid":false,"given":"Fahad","family":"Algarni","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0380-283X","authenticated-orcid":false,"given":"Insaf","family":"Ullah","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4576-5715","authenticated-orcid":false,"given":"Ako Muhammad","family":"Abdullah","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0096-3435","authenticated-orcid":false,"given":"Fazal","family":"Noor","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1351-898X","authenticated-orcid":false,"given":"Muhammad","family":"Asghar Khan","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2022,6,3]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2021.3118892"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.002"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.2996574"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101955"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3093068"},{"key":"e_1_2_11_6_2","first-page":"25","article-title":"Vehicular ad hoc networks: history and future development arenas","volume":"2","author":"Majeed M. N.","year":"2013","journal-title":"Int. J. Inf. Techno. Elect. Eng."},{"key":"e_1_2_11_7_2","doi-asserted-by":"crossref","unstructured":"KombateD. December the Internet of vehicles based on 5G communications Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) December 2016 Chengdu China IEEE 445\u2013448.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.105"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"e_1_2_11_9_2","doi-asserted-by":"crossref","unstructured":"SharmaN. ChauhanN. andChandN. Security challenges in internet of vehicles (IoV) environment Proceedings of the 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC) December 2018 Jalandhar India IEEE 203\u2013207 https:\/\/doi.org\/10.1109\/icsccc.2018.8703272 2-s2.0-85065654475.","DOI":"10.1109\/ICSCCC.2018.8703272"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2017.2657649"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2021.3050614"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102161"},{"key":"e_1_2_11_13_2","doi-asserted-by":"crossref","unstructured":"LuR. LinX. ZhuH. HoP. H. andShenX. ECPP: efficient conditional privacy preservation protocol for secure vehicular communications Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications April 2008 Phoenix AZ USA IEEE 1229\u20131237.","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"e_1_2_11_14_2","doi-asserted-by":"crossref","unstructured":"ZhangC. LuR. LinX. HoP. H. andShenX. An efficient identity-based batch verification scheme for vehicular sensor networks Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications April 2008 Phoenix AZ USA IEEE 246\u2013250.","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2016.2517603"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2015.2402166"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2016.2579162"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2782672"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2826518"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.3012166"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2016.2541862"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106557"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6698099"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.3008781"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.021"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100200"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9718580"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3089009"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103477"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2022\/8406649.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2022\/8406649.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/8406649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T06:28:27Z","timestamp":1721802507000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2022\/8406649"}},"subtitle":[],"editor":[{"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1155\/2022\/8406649"],"URL":"https:\/\/doi.org\/10.1155\/2022\/8406649","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"2022-03-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}