{"id":"https://openalex.org/W3046094392","doi":"https://doi.org/10.1109/icc40277.2020.9149021","title":"An Edge Computing-Enabled Decentralized Authentication Scheme for Vehicular Networks","display_name":"An Edge Computing-Enabled Decentralized Authentication Scheme for Vehicular Networks","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3046094392","doi":"https://doi.org/10.1109/icc40277.2020.9149021","mag":"3046094392"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9149021","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9149021","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021104554","display_name":"Qianpeng Wang","orcid":"https://orcid.org/0000-0001-9263-3638"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qianpeng Wang","raw_affiliation_strings":["National Engineering Laboratory for Next Generation Internet Technologies, School of Electronic and Information Engineering Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Next Generation Internet Technologies, School of Electronic and Information Engineering Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055818694","display_name":"Deyun Gao","orcid":"https://orcid.org/0000-0002-8641-4057"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deyun Gao","raw_affiliation_strings":["National Engineering Laboratory for Next Generation Internet Technologies, School of Electronic and Information Engineering Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Next Generation Internet Technologies, School of Electronic and Information Engineering Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073704569","display_name":"Chuan Heng Foh","orcid":"https://orcid.org/0000-0002-5716-1396"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chuan Heng Foh","raw_affiliation_strings":["5GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, Surrey, U.K"],"affiliations":[{"raw_affiliation_string":"5GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, Surrey, U.K","institution_ids":["https://openalex.org/I28290843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035919267","display_name":"Victor C. M. Leung","orcid":"https://orcid.org/0000-0003-3529-2640"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Victor C.M. Leung","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, The University of British Columbia, Vancouver, B.C, Canada"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, The University of British Columbia, Vancouver, B.C, Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021104554"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":0.411,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.61000459,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7630660533905029},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7103769779205322},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5806683301925659},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5636127591133118},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.518124520778656},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.4880760908126831},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.449124813079834},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.4274662733078003},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.42202770709991455},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.41309282183647156},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3483060598373413},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3364703059196472},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.3223751485347748},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.12376481294631958},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11368495225906372},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.08875641226768494},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07683083415031433}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7630660533905029},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7103769779205322},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5806683301925659},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5636127591133118},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.518124520778656},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.4880760908126831},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.449124813079834},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.4274662733078003},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.42202770709991455},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.41309282183647156},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3483060598373413},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3364703059196472},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.3223751485347748},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.12376481294631958},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11368495225906372},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.08875641226768494},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07683083415031433},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9149021","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9149021","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1655377165","https://openalex.org/W1921672120","https://openalex.org/W1985392579","https://openalex.org/W2006921752","https://openalex.org/W2071430611","https://openalex.org/W2098657835","https://openalex.org/W2103056119","https://openalex.org/W2121247918","https://openalex.org/W2137218567","https://openalex.org/W2163614799","https://openalex.org/W2172174332","https://openalex.org/W2320588269","https://openalex.org/W2568772110","https://openalex.org/W2586333888","https://openalex.org/W2615459164","https://openalex.org/W2624989916","https://openalex.org/W2625826519","https://openalex.org/W2765584933","https://openalex.org/W2786072337","https://openalex.org/W2895844749","https://openalex.org/W4205092462","https://openalex.org/W4298051233","https://openalex.org/W6640233077"],"related_works":["https://openalex.org/W2123808758","https://openalex.org/W4235785488","https://openalex.org/W2898075319","https://openalex.org/W1868580136","https://openalex.org/W1535255904","https://openalex.org/W1998865180","https://openalex.org/W2893750591","https://openalex.org/W2792368265","https://openalex.org/W2060456500","https://openalex.org/W2951454549"],"abstract_inverted_index":{"The":[0],"problem":[1,135],"of":[2,23,139,155],"security":[3,21],"and":[4,13,96,100],"privacy":[5,58],"in":[6,30,51,68,121,136],"vehicular":[7,24,31,52,69],"networks":[8,32,70],"is":[9,76,115,129],"a":[10,98,110],"vital":[11],"issue":[12],"it":[14],"attracts":[15],"increasing":[16],"attention":[17],"to":[18,33,78,117,131,151],"address":[19],"the":[20,61,79,107,122,140,153],"vulnerability":[22],"networks.":[25],"Authentication":[26],"solutions":[27],"are":[28],"introduced":[29],"ensure":[34],"that":[35],"network":[36],"access":[37],"only":[38,47],"comes":[39],"from":[40],"authorized":[41],"users.":[42],"Particularly,":[43],"group":[44,63,141],"signature":[45,64,73],"not":[46],"offers":[48],"authentication":[49,67,103,123,134],"services":[50],"networks,":[53],"but":[54],"also":[55,147],"provides":[56],"conditional":[57],"preservation.":[59],"However,":[60],"current":[62],"solution":[65],"for":[66],"exhibits":[71],"time-consuming":[72],"verification,":[74],"which":[75],"attributed":[77],"centralized":[80],"certificate":[81],"revocation":[82],"list":[83],"(CRL)":[84],"management.":[85],"To":[86],"overcome":[87],"this":[88],"shortcoming,":[89],"we":[90],"propose":[91],"utilizing":[92],"edge":[93],"computing":[94],"approach":[95],"design":[97],"flexible":[99],"efficient":[101],"decentralized":[102,111,144],"scheme":[104],"(FEDAS).":[105],"In":[106,125],"proposed":[108,130,157],"architecture,":[109],"CRL":[112],"management":[113],"method":[114],"developed":[116],"reduce":[118],"verification":[119],"delay":[120],"process.":[124],"addition,":[126],"transition":[127],"zone":[128],"solve":[132],"reliable":[133],"border":[137],"area":[138],"caused":[142],"by":[143],"architecture.":[145],"We":[146],"conduct":[148],"extensive":[149],"simulations":[150],"show":[152],"effectiveness":[154],"our":[156],"scheme.":[158]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
