{"id":"https://openalex.org/W7138918038","doi":"https://doi.org/10.1109/globecom59602.2025.11432286","title":"Distributed Trust Authentication via TPM-Bound Credentials and Byzantine Consensus for Secure Vehicular Digital Twin Ecosystems","display_name":"Distributed Trust Authentication via TPM-Bound Credentials and Byzantine Consensus for Secure Vehicular Digital Twin Ecosystems","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7138918038","doi":"https://doi.org/10.1109/globecom59602.2025.11432286"},"language":null,"primary_location":{"id":"doi:10.1109/globecom59602.2025.11432286","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432286","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054251799","display_name":"Mohammad Hossein Anisi","orcid":"https://orcid.org/0000-0001-8414-2708"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mohammad Hossein Anisi","raw_affiliation_strings":["University of Essex,School of Computer Science and Electronic Engineering,Colchester,UK"],"affiliations":[{"raw_affiliation_string":"University of Essex,School of Computer Science and Electronic Engineering,Colchester,UK","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130106354","display_name":"Mohammad S. Obaidat","orcid":null},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad S. Obaidat","raw_affiliation_strings":["University of Jordan,King Abdullah II School of Information Technology,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"University of Jordan,King Abdullah II School of Information Technology,Amman,Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129934673","display_name":"Khalid Mahmood","orcid":null},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Khalid Mahmood","raw_affiliation_strings":["National Yunlin University of Science and Technology,Graduate School of Intelligent Data Science,Douliu,Taiwan,64002"],"affiliations":[{"raw_affiliation_string":"National Yunlin University of Science and Technology,Graduate School of Intelligent Data Science,Douliu,Taiwan,64002","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079811333","display_name":"Shafiq Ahmed","orcid":"https://orcid.org/0000-0001-9599-1887"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shafiq Ahmed","raw_affiliation_strings":["University of Essex,School of Computer Science and Electronic Engineering,Colchester,UK"],"affiliations":[{"raw_affiliation_string":"University of Essex,School of Computer Science and Electronic Engineering,Colchester,UK","institution_ids":["https://openalex.org/I110002522"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054251799"],"corresponding_institution_ids":["https://openalex.org/I110002522"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67995007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"998","last_page":"1003"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9205999970436096,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9205999970436096,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.01979999989271164,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.008200000040233135,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6743999719619751},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5756000280380249},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5539000034332275},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.504800021648407},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.47510001063346863},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4726000130176544},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4602999985218048},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.43549999594688416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7753999829292297},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6743999719619751},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5758000016212463},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5756000280380249},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5539000034332275},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5167999863624573},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.504800021648407},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.47510001063346863},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4726000130176544},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4602999985218048},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.43549999594688416},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.42260000109672546},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3698999881744385},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3612000048160553},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.33889999985694885},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3382999897003174},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.3312000036239624},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.32269999384880066},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2996000051498413},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29159998893737793},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.27250000834465027},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom59602.2025.11432286","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432286","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6446784138679504,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2056634549","https://openalex.org/W3005206852","https://openalex.org/W4200041379","https://openalex.org/W4206477080","https://openalex.org/W4290711234","https://openalex.org/W4293183138","https://openalex.org/W4296913260","https://openalex.org/W4312766342","https://openalex.org/W4362514681","https://openalex.org/W4386446981","https://openalex.org/W4387757624","https://openalex.org/W4391128451","https://openalex.org/W4396712917","https://openalex.org/W4406257078","https://openalex.org/W4408565496"],"related_works":[],"abstract_inverted_index":{"Autonomous":[0],"vehicles":[1],"(AVs)":[2],"are":[3],"transforming":[4],"transportation":[5,206],"systems,":[6],"necessitating":[7],"secure":[8,59,92,201],"digital":[9],"infrastructures":[10],"for":[11,54,118,199],"reliable":[12],"operation.":[13],"Vehicular":[14],"Digital":[15],"Twin":[16],"(VDT)":[17],"networks":[18],"address":[19],"AV":[20],"limitations":[21],"by":[22],"enabling":[23],"synchronized":[24],"virtual":[25],"replicas.":[26],"However,":[27],"intra-twin":[28],"communications":[29],"over":[30],"public":[31],"channels":[32],"expose":[33],"systems":[34],"to":[35,77,87,166,174,181],"severe":[36],"security":[37,188],"threats,":[38],"including":[39],"impersonation":[40],"and":[41,81,94,105,127,144,151,172],"data":[42,120],"tampering.":[43],"This":[44],"paper":[45],"proposes":[46],"EDTAP-VDT:":[47],"an":[48],"Enhanced":[49],"Distributed":[50],"Trust":[51],"Authentication":[52],"Protocol":[53],"VDT":[55,202],"networks,":[56],"which":[57],"ensures":[58],"identity":[60],"verification":[61],"through":[62],"a":[63,73,95,195],"threshold":[64],"cryptographic":[65],"model":[66],"anchored":[67],"in":[68,169,177,204],"hardware.":[69],"The":[70,134,190],"protocol":[71,135],"employs":[72],"hierarchical":[74],"edge-fog-cloud":[75],"architecture":[76],"balance":[78],"authentication":[79,107,116,197],"loads":[80],"leverages":[82],"Trusted":[83],"Platform":[84],"Modules":[85],"(TPMs)":[86],"cryptographically":[88],"bind":[89],"credentials.":[90],"Post-quantum":[91],"primitives":[93],"permissioned":[96],"blockchain":[97],"with":[98],"Byzantine":[99],"consensus":[100],"ensure":[101],"long-term":[102],"security,":[103],"pseudonymity,":[104],"immutable":[106],"traceability.":[108],"Attribute-based":[109],"access":[110],"control":[111],"is":[112,136,147],"integrated":[113],"into":[114],"the":[115,140],"process":[117],"fine-grained":[119],"sharing.":[121],"EDTAP-VDT":[122,163,193],"guarantees":[123],"confidentiality,":[124],"forward":[125],"secrecy,":[126],"desynchronization":[128],"resilience":[129],"while":[130,184],"maintaining":[131],"decentralized":[132],"control.":[133],"formally":[137],"validated":[138],"using":[139],"Random":[141],"Oracle":[142],"Model,":[143],"additional":[145],"resistance":[146],"demonstrated":[148],"against":[149],"active":[150],"passive":[152],"attack":[153],"vectors.":[154],"Performance":[155],"evaluation":[156],"across":[157],"realistic":[158],"vehicular":[159],"settings":[160],"shows":[161],"that":[162],"achieves":[164],"up":[165,173],"24%":[167],"improvement":[168],"computational":[170],"efficiency":[171],"22%":[175],"reduction":[176],"communication":[178],"overhead":[179],"compared":[180],"state-of-the-art":[182],"alternatives":[183],"fulfilling":[185],"all":[186],"standard":[187],"attributes.":[189],"results":[191],"establish":[192],"as":[194],"future-ready":[196],"framework":[198],"real-time,":[200],"applications":[203],"intelligent":[205],"environments.":[207]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
