{"id":"https://openalex.org/W1995872016","doi":"https://doi.org/10.1109/icc.2012.6364399","title":"Relevance-based verification of VANET safety messages","display_name":"Relevance-based verification of VANET safety messages","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W1995872016","doi":"https://doi.org/10.1109/icc.2012.6364399","mag":"1995872016"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2012.6364399","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2012.6364399","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107170592","display_name":"Subir Biswas","orcid":"https://orcid.org/0000-0003-0828-2500"},"institutions":[{"id":"https://openalex.org/I46247651","display_name":"University of Manitoba","ror":"https://ror.org/02gfys938","country_code":"CA","type":"education","lineage":["https://openalex.org/I46247651"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Subir Biswas","raw_affiliation_strings":["Department of Computer Science, University of Manitoba, Winnipeg, Canada","Department of Computer Science, University of Manitoba, Winnipeg, Canada R3T 2N2"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Manitoba, Winnipeg, Canada","institution_ids":["https://openalex.org/I46247651"]},{"raw_affiliation_string":"Department of Computer Science, University of Manitoba, Winnipeg, Canada R3T 2N2","institution_ids":["https://openalex.org/I46247651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017004453","display_name":"Jelena Mi\u0161i\u0107","orcid":"https://orcid.org/0000-0002-1251-3730"},"institutions":[{"id":"https://openalex.org/I530967","display_name":"Toronto Metropolitan University","ror":"https://ror.org/05g13zd79","country_code":"CA","type":"education","lineage":["https://openalex.org/I530967"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jelena Misic","raw_affiliation_strings":["Department of Computer Science, Ryerson University, Toronto, ONT, Canada","Department of Computer Science Ryerson University Toronto ON Canada, M5B 2K3"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Ryerson University, Toronto, ONT, Canada","institution_ids":["https://openalex.org/I530967"]},{"raw_affiliation_string":"Department of Computer Science Ryerson University Toronto ON Canada, M5B 2K3","institution_ids":["https://openalex.org/I530967"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5107170592"],"corresponding_institution_ids":["https://openalex.org/I46247651"],"apc_list":null,"apc_paid":null,"fwci":0.7469,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.73584961,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"5124","last_page":"5128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8486589193344116},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7486303448677063},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.7429651618003845},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7228270769119263},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.6532033681869507},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.5660712122917175},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48742321133613586},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4815831184387207},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46589767932891846},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4284358620643616},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23386284708976746},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.185244619846344},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.17735111713409424},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.13076376914978027},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09309473633766174},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.06386452913284302}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8486589193344116},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7486303448677063},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.7429651618003845},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7228270769119263},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.6532033681869507},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.5660712122917175},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48742321133613586},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4815831184387207},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46589767932891846},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4284358620643616},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23386284708976746},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.185244619846344},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.17735111713409424},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.13076376914978027},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09309473633766174},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.06386452913284302},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icc.2012.6364399","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2012.6364399","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.727.6410","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.727.6410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.scs.ryerson.ca/%7Ejmisic/papers/icc12biswas.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1990194959","https://openalex.org/W1995783277","https://openalex.org/W2013613544","https://openalex.org/W2020043802","https://openalex.org/W2026892462","https://openalex.org/W2031035035","https://openalex.org/W2055813944","https://openalex.org/W2064803799","https://openalex.org/W2081533422","https://openalex.org/W2096006243","https://openalex.org/W2097067054","https://openalex.org/W2112004167","https://openalex.org/W2123845384","https://openalex.org/W2136385615","https://openalex.org/W6653685673"],"related_works":["https://openalex.org/W2892743407","https://openalex.org/W3025994448","https://openalex.org/W773319083","https://openalex.org/W2888823465","https://openalex.org/W2166668397","https://openalex.org/W191975850","https://openalex.org/W2776010770","https://openalex.org/W2923596684","https://openalex.org/W2116285675","https://openalex.org/W1533309011"],"abstract_inverted_index":{"Authentication":[0],"of":[1,61,67,96,99],"vehicular":[2,32,70,79],"safety":[3,103],"messages":[4,20,104,132],"poses":[5],"a":[6,9,31,74,88,116,125],"challenge":[7],"in":[8,65,69,82],"high":[10],"density":[11],"road-traffic":[12],"scenario":[13],"as":[14],"the":[15,24,45,50,78,94,112,121,129],"verification":[16,51,58,90],"time":[17],"for":[18],"gathered":[19],"gets":[21],"longer":[22],"than":[23],"average":[25],"inter-arrival":[26],"time.":[27],"This":[28],"may":[29],"expose":[30],"network":[33],"entity":[34],"to":[35,77,134],"several":[36],"different":[37,108],"security":[38],"attacks.":[39],"The":[40],"existing":[41],"solutions":[42],"have":[43,63],"addressed":[44],"issue":[46],"either":[47],"by":[48,54,86],"randomizing":[49],"candidates,":[52],"or":[53],"using":[55],"aggregated":[56],"signature":[57],"schemes,":[59],"both":[60],"which":[62],"short-comings":[64],"terms":[66],"applicability":[68],"communications.":[71],"We":[72],"propose":[73],"novel":[75],"solution":[76],"message":[80],"authentication":[81,152],"dense":[83],"traffic":[84,118],"conditions":[85],"introducing":[87],"prioritized":[89],"strategy.":[91],"Based":[92],"on":[93],"relevance":[95],"physical":[97],"parameters":[98],"neighboring":[100],"vehicles,":[101],"received":[102,131],"are":[105,123],"assigned":[106],"with":[107,149],"priority":[109],"scores":[110],"at":[111],"verifying":[113],"entity.":[114],"In":[115],"heavy":[117],"condition":[119],"when":[120],"resources":[122],"scarce,":[124],"verifier":[126],"randomly":[127],"authenticates":[128],"selected":[130],"according":[133],"their":[135],"priorities.":[136],"Performance":[137],"evaluation":[138],"has":[139],"shown":[140],"that":[141],"our":[142],"approach":[143],"is":[144],"scalable,":[145],"resource-efficient,":[146],"and":[147],"compatible":[148],"any":[150],"underlying":[151],"schemes.":[153]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
