{"id":"https://openalex.org/W4400679722","doi":"https://doi.org/10.1109/access.2024.3429179","title":"Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing","display_name":"Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400679722","doi":"https://doi.org/10.1109/access.2024.3429179"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3429179","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3429179","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2024.3429179","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077882166","display_name":"Zeyad Ghaleb Al-Mekhlafi","orcid":"https://orcid.org/0000-0001-6367-0309"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zeyad Ghaleb Al-Mekhlafi","raw_affiliation_strings":["Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-6367-0309","affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060826805","display_name":"Saima Anwar Lashari","orcid":"https://orcid.org/0000-0001-6209-491X"},"institutions":[{"id":"https://openalex.org/I120238654","display_name":"Saudi Electronic University","ror":"https://ror.org/05ndh7v49","country_code":"SA","type":"education","lineage":["https://openalex.org/I120238654"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Saima Anwar Lashari","raw_affiliation_strings":["College of Computing and Informatics, Saudi Electronic University, Riyadh, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computing and Informatics, Saudi Electronic University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I120238654"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104601460","display_name":"Jalal Mohammed Hachim Altmemi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145266","display_name":"Southern Technical University","ror":"https://ror.org/03sax3264","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210145266"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Jalal Mohammed Hachim Altmemi","raw_affiliation_strings":["Information Technology Management Department, Southern Technical University, Basra, Iraq"],"raw_orcid":"https://orcid.org/0009-0001-0126-5866","affiliations":[{"raw_affiliation_string":"Information Technology Management Department, Southern Technical University, Basra, Iraq","institution_ids":["https://openalex.org/I4210145266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079673360","display_name":"\u202aMahmood A. Al-Shareeda\u202c\u200f","orcid":"https://orcid.org/0000-0002-2358-3785"},"institutions":[{"id":"https://openalex.org/I4210123264","display_name":"Iraq University College","ror":"https://ror.org/021817660","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210123264"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Mahmood A. Al-Shareeda","raw_affiliation_strings":["Department of Communication Engineering, Iraq University College, Basrah, Iraq"],"raw_orcid":"https://orcid.org/0000-0002-2358-3785","affiliations":[{"raw_affiliation_string":"Department of Communication Engineering, Iraq University College, Basrah, Iraq","institution_ids":["https://openalex.org/I4210123264"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113290764","display_name":"Badiea Abdulkarem Mohammed","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Badiea Abdulkarem Mohammed","raw_affiliation_strings":["Department of Computer Engineering, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-3539-4161","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035225860","display_name":"Amer A. Sallam","orcid":null},"institutions":[{"id":"https://openalex.org/I36197038","display_name":"Taiz University","ror":"https://ror.org/03jwcxq96","country_code":"YE","type":"education","lineage":["https://openalex.org/I36197038"]}],"countries":["YE"],"is_corresponding":false,"raw_author_name":"Amer A. Sallam","raw_affiliation_strings":["Computer Networks and Distributed Systems Department, Faculty of Engineering and Information Technology, Taiz University, Taiz, Yemen"],"raw_orcid":"https://orcid.org/0000-0001-7145-7137","affiliations":[{"raw_affiliation_string":"Computer Networks and Distributed Systems Department, Faculty of Engineering and Information Technology, Taiz University, Taiz, Yemen","institution_ids":["https://openalex.org/I36197038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005875064","display_name":"Bassam Ali Al-Qatab","orcid":"https://orcid.org/0000-0002-1477-2381"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Bassam Ali Al-Qatab","raw_affiliation_strings":["Department of Software Engineering, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia"],"raw_orcid":"https://orcid.org/0000-0002-1477-2381","affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048027462","display_name":"Mohammad T. Alshammari","orcid":"https://orcid.org/0000-0001-9109-0395"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammad T. Alshammari","raw_affiliation_strings":["Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-9109-0395","affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049203171","display_name":"Abdulaziz M. Alayba","orcid":"https://orcid.org/0000-0003-1075-1214"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdulaziz M. Alayba","raw_affiliation_strings":["Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-1075-1214","affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5077882166"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.5429,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.9328841,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"12","issue":null,"first_page":"100152","last_page":"100166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8740116357803345},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5842797756195068},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5718929171562195},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5323989987373352},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.5305272340774536},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5211105942726135},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4907146692276001},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.4655274748802185},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.46070802211761475},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4498535394668579},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4248407185077667},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4204060137271881},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41039949655532837},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.29583391547203064},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.27559539675712585},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08724063634872437}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8740116357803345},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5842797756195068},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5718929171562195},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5323989987373352},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.5305272340774536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5211105942726135},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4907146692276001},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.4655274748802185},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46070802211761475},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4498535394668579},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4248407185077667},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4204060137271881},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41039949655532837},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.29583391547203064},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.27559539675712585},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08724063634872437},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3429179","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3429179","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c140d739e8614c089255920c1b124acb","is_oa":true,"landing_page_url":"https://doaj.org/article/c140d739e8614c089255920c1b124acb","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 100152-100166 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3429179","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3429179","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W642003551","https://openalex.org/W2041353032","https://openalex.org/W2119422255","https://openalex.org/W2372534467","https://openalex.org/W2567592945","https://openalex.org/W2800815122","https://openalex.org/W2804658645","https://openalex.org/W2897645146","https://openalex.org/W2903608625","https://openalex.org/W2921767676","https://openalex.org/W2921960465","https://openalex.org/W2969565105","https://openalex.org/W2993799773","https://openalex.org/W3000112169","https://openalex.org/W3003693158","https://openalex.org/W3008296531","https://openalex.org/W3013735859","https://openalex.org/W3017170021","https://openalex.org/W3025816900","https://openalex.org/W3034713986","https://openalex.org/W3091569964","https://openalex.org/W3094038710","https://openalex.org/W3098339705","https://openalex.org/W3133176963","https://openalex.org/W3165400837","https://openalex.org/W3173282679","https://openalex.org/W3188674845","https://openalex.org/W3208514333","https://openalex.org/W4205783780","https://openalex.org/W4210805826","https://openalex.org/W4212843718","https://openalex.org/W4232685194","https://openalex.org/W4247126968","https://openalex.org/W4286214549","https://openalex.org/W4289126832","https://openalex.org/W4293168393","https://openalex.org/W4304688205","https://openalex.org/W4309335628","https://openalex.org/W4324350345","https://openalex.org/W4366957204","https://openalex.org/W4380520304","https://openalex.org/W4381785687","https://openalex.org/W4384080261","https://openalex.org/W4387587676","https://openalex.org/W4390659267","https://openalex.org/W4391344503","https://openalex.org/W4392406012","https://openalex.org/W4396610189","https://openalex.org/W4398220480","https://openalex.org/W4399267718","https://openalex.org/W6773291447"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W1819617256","https://openalex.org/W1687167769","https://openalex.org/W2351645295"],"abstract_inverted_index":{"The":[0,198],"fast":[1],"development":[2],"of":[3,9,158,183,205],"vehicle":[4,92],"technology":[5],"and":[6,36,51,99,132,152,165,193,219],"the":[7,25,44,91,138,156,181,203],"appearance":[8],"5G":[10,211],"networks":[11,63,213],"have":[12],"brought":[13],"new":[14,232],"opportunities":[15],"as":[16,18,147,149,173,175,242],"well":[17,148,174],"challenges":[19],"for":[20,195,234],"vehicular":[21,62,83,196,208,240],"fog":[22,84],"computing.":[23,85],"On":[24],"one":[26],"hand,":[27],"these":[28],"advances":[29],"would":[30],"bring":[31],"a":[32,70,114,214],"safer,":[33],"more":[34,109,145,223],"efficient,":[35],"comfortable":[37],"car":[38],"onto":[39],"our":[40,184],"roads;":[41],"but":[42,135],"on":[43,140],"other,":[45],"they":[46],"open":[47],"up":[48],"huge":[49],"security":[50,59,194],"privacy":[52,79,192],"vulnerabilities.":[53],"Current":[54],"solutions":[55],"typically":[56],"offer":[57],"inadequate":[58],"coverage,":[60],"rendering":[61,104],"susceptible":[64],"to":[65,190,202],"diverse":[66],"attacks.":[67],"We":[68],"present":[69],"first":[71],"holistic":[72],"solution":[73],"that":[74,226],"combines":[75],"entity":[76],"authentication":[77],"with":[78,170],"preservation":[80],"in":[81,161,210],"5G-enabled":[82],"A":[86],"novel":[87],"feature":[88],"obfuscation":[89],"involves":[90],"request":[93,128],"messages":[94],"at":[95],"an":[96],"early":[97],"stage":[98],"employs":[100],"advanced":[101],"cryptographic":[102],"methods,":[103],"any":[105,238],"potential":[106],"attacks":[107],"much":[108],"challenging":[110],"while":[111],"preventing":[112],"even":[113],"Trusted":[115],"Authority":[116],"(TA)":[117],"from":[118],"inferring":[119],"their":[120,228],"underlying":[121],"purpose.":[122],"This":[123],"scheme":[124],"not":[125],"only":[126],"maximizes":[127],"communication,":[129],"reduces":[130],"interaction":[131],"computational":[133],"overhead":[134],"also":[136],"lessens":[137],"dependency":[139],"TA":[141],"thus":[142,200],"making":[143],"it":[144],"scalable":[146],"resilient.":[150],"Theoretical":[151],"simulation":[153],"results":[154,179],"show":[155],"merits":[157],"this":[159],"protocol":[160,186],"reducing":[162],"verification":[163],"latency,":[164],"packet":[166],"loss":[167],"rate":[168],"along":[169],"computation":[171],"overheads":[172],"communication":[176,209],"overhead.":[177],"Experimental":[178],"demonstrate":[180],"effectiveness":[182],"proposed":[185],"against":[187],"existing":[188,239],"approaches":[189],"provide":[191],"communications.":[197],"work":[199],"adds":[201],"body":[204],"knowledge":[206],"taking":[207],"capable":[212],"step":[215],"forward":[216],"enhancing":[217],"secured":[218],"efficient":[220],"operation":[221],"ensuring":[222],"secure":[224],"roads":[225],"deliver":[227],"contextual":[229],"alerts":[230],"setting":[231],"standards":[233],"safety":[235],"levels":[236],"within":[237],"network":[241],"well.":[243]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":17}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
