{"id":"https://openalex.org/W4413359298","doi":"https://doi.org/10.1109/access.2025.3601003","title":"BAAIoV: A Blockchain-Based Authentication and Authorization Framework for Secure and Reliable Internet of Vehicles Communication","display_name":"BAAIoV: A Blockchain-Based Authentication and Authorization Framework for Secure and Reliable Internet of Vehicles Communication","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413359298","doi":"https://doi.org/10.1109/access.2025.3601003"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3601003","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3601003","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3601003","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070562407","display_name":"Alaa Alsaeed","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Alaa Alsaeed","raw_affiliation_strings":["Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","Computer Engineering Department, College of Computer and Information Sciences, King Saud University, P.O. Box 145111, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0009-0008-2340-8451","affiliations":[{"raw_affiliation_string":"Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Computer Engineering Department, College of Computer and Information Sciences, King Saud University, P.O. Box 145111, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003264146","display_name":"Saleh Almowuena","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Saleh Almowuena","raw_affiliation_strings":["Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","Computer Engineering Department, College of Computer and Information Sciences, King Saud University, P.O. Box 145111, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0009-0001-1483-6429","affiliations":[{"raw_affiliation_string":"Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Computer Engineering Department, College of Computer and Information Sciences, King Saud University, P.O. Box 145111, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023920251","display_name":"Aasem N. Alyahya","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Aasem N. Alyahya","raw_affiliation_strings":["Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","Computer Engineering Department, College of Computer and Information Sciences, King Saud University, P.O. Box 145111, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0009-0004-2315-1642","affiliations":[{"raw_affiliation_string":"Computer Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Computer Engineering Department, College of Computer and Information Sciences, King Saud University, P.O. Box 145111, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070562407"],"corresponding_institution_ids":["https://openalex.org/I28022161"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.9051,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92354173,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"13","issue":null,"first_page":"150821","last_page":"150837"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.904960036277771},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7125701904296875},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.66811603307724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6647233366966248},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.6430725455284119},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5529971122741699},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5385599732398987},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.518918514251709},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.37668919563293457},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.37224358320236206},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18197506666183472}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.904960036277771},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7125701904296875},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.66811603307724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6647233366966248},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.6430725455284119},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5529971122741699},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5385599732398987},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.518918514251709},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.37668919563293457},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37224358320236206},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18197506666183472}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3601003","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3601003","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2add0f7f60184b9fa1f26496ba06a83b","is_oa":true,"landing_page_url":"https://doaj.org/article/2add0f7f60184b9fa1f26496ba06a83b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 150821-150837 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3601003","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3601003","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2923107724","https://openalex.org/W2934277901","https://openalex.org/W2973521133","https://openalex.org/W2982365671","https://openalex.org/W3083757457","https://openalex.org/W3084999539","https://openalex.org/W3104953546","https://openalex.org/W3139926532","https://openalex.org/W3197395848","https://openalex.org/W3215187144","https://openalex.org/W4206550052","https://openalex.org/W4284895726","https://openalex.org/W4300127641","https://openalex.org/W4316136028","https://openalex.org/W4327661625","https://openalex.org/W4366310754","https://openalex.org/W4366772687","https://openalex.org/W4372311864","https://openalex.org/W4380360945","https://openalex.org/W4382499863","https://openalex.org/W4385833694","https://openalex.org/W4386608804","https://openalex.org/W4387119093","https://openalex.org/W4387506775","https://openalex.org/W4387623685","https://openalex.org/W4388407891","https://openalex.org/W4388709679","https://openalex.org/W4390905877","https://openalex.org/W4393395238","https://openalex.org/W4396707597","https://openalex.org/W4398220480","https://openalex.org/W4399039391","https://openalex.org/W4399731304","https://openalex.org/W4399849582","https://openalex.org/W4412909425"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W1555715488","https://openalex.org/W1991172351","https://openalex.org/W1510656496","https://openalex.org/W2061637199","https://openalex.org/W2997078490"],"abstract_inverted_index":{"The":[0,125],"Internet":[1],"of":[2,53,100,153,162,171,208],"Vehicles":[3],"(IoV)":[4],"is":[5,47,73],"an":[6],"emerging":[7],"area":[8],"within":[9],"intelligent":[10,210],"transportation":[11,202],"systems,":[12],"enabling":[13],"real-time":[14,116],"communication":[15,59,173],"among":[16],"vehicles,":[17],"infrastructure,":[18],"and":[19,27,38,55,68,78,86,107,121,140,145,160,190,204],"pedestrians.":[20],"While":[21],"this":[22],"connectivity":[23],"enhances":[24,136],"traffic":[25,105],"management":[26],"safety,":[28],"it":[29],"also":[30],"introduces":[31],"significant":[32],"security":[33],"challenges\u2014particularly":[34],"in":[35,60,70],"authentication,":[36],"authorization,":[37],"data":[39],"integrity.":[40],"To":[41],"address":[42],"these":[43],"concerns,":[44],"blockchain":[45,111,123,154,183],"technology":[46],"explored":[48],"to":[49,82,90,155,168,198],"eliminate":[50],"centralized":[51],"points":[52],"failure":[54],"support":[56],"secure,":[57],"decentralized":[58],"IoV":[61,71],"environments.":[62],"A":[63,93],"solution":[64],"titled":[65],"Blockchain-based":[66],"Authentication":[67],"Authorization":[69],"(BAAIoV)":[72],"proposed,":[74],"utilizing":[75],"smart":[76,201],"contracts":[77],"a":[79],"distributed":[80],"ledger":[81],"manage":[83],"vehicle":[84,138],"identities":[85],"securely":[87],"control":[88],"access":[89],"network":[91],"resources.":[92],"simulation":[94,120],"environment":[95],"was":[96],"established":[97],"using":[98],"Simulation":[99],"Urban":[101],"Mobility":[102],"(SUMO)":[103],"for":[104,110,175,181],"modeling":[106],"Hyperledger":[108],"Fabric":[109],"implementation.":[112],"Python-based":[113],"middleware":[114],"facilitated":[115],"interaction":[117],"between":[118],"the":[119,122,129,151,157,169,179,206],"system.":[124],"results":[126],"indicate":[127],"that":[128],"BAAIoV":[130],"model":[131],"significantly":[132],"reduces":[133],"authentication":[134],"delays,":[135],"emergency":[137],"recognition,":[139],"mitigates":[141],"threats":[142],"like":[143],"spoofing":[144],"replay":[146],"attacks.":[147],"These":[148],"improvements":[149],"demonstrate":[150],"potential":[152,180],"enhance":[156],"security,":[158],"efficiency,":[159],"reliability":[161],"vehicular":[163],"networks.":[164],"This":[165],"research":[166],"contributes":[167],"development":[170],"secure":[172],"frameworks":[174],"IoV.":[176],"It":[177],"highlights":[178],"future":[182],"integration":[184],"with":[185],"edge":[186],"computing,":[187],"artificial":[188],"intelligence,":[189],"post-quantum":[191],"cryptography":[192],"technologies.":[193],"Such":[194],"integrations":[195],"are":[196],"expected":[197],"further":[199],"strengthen":[200],"infrastructures":[203],"advance":[205],"capabilities":[207],"next-generation":[209],"mobility":[211],"systems.":[212]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
