{"id":"https://openalex.org/W4366378550","doi":"https://doi.org/10.1109/tits.2023.3266030","title":"An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network","display_name":"An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network","publication_year":2023,"publication_date":"2023-04-19","ids":{"openalex":"https://openalex.org/W4366378550","doi":"https://doi.org/10.1109/tits.2023.3266030"},"language":"en","primary_location":{"id":"doi:10.1109/tits.2023.3266030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2023.3266030","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035264127","display_name":"Muhammad Asad Saleem","orcid":"https://orcid.org/0009-0001-0308-601X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Muhammad Asad Saleem","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335132","display_name":"Xiong Li","orcid":"https://orcid.org/0000-0001-6619-554X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, Chengdu, China","Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0001-6619-554X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Shenzhen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041994467","display_name":"Muhammad Faizan Ayub","orcid":"https://orcid.org/0000-0001-7616-0420"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Muhammad Faizan Ayub","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0001-7616-0420","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017367371","display_name":"Salman Shamshad","orcid":"https://orcid.org/0000-0002-8984-3199"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Salman Shamshad","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0002-8984-3199","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041228563","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0001-9023-3569"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Wu","raw_affiliation_strings":["School of Management, Xiamen University Tan Kah Kee College, Zhangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-9023-3569","affiliations":[{"raw_affiliation_string":"School of Management, Xiamen University Tan Kah Kee College, Zhangzhou, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100777102","display_name":"Haider Abbas","orcid":"https://orcid.org/0000-0002-2437-4870"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Haider Abbas","raw_affiliation_strings":["Department of Information Security, National University of Sciences and Technology (NUST), Islamabad, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-2437-4870","affiliations":[{"raw_affiliation_string":"Department of Information Security, National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5035264127"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":8.4603,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.9804027,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"24","issue":"9","first_page":"9940","last_page":"9951"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7559534311294556},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7081989645957947},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.6601359844207764},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.504360556602478},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5002875328063965},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4708642065525055},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4546802341938019},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.45234644412994385},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4507007598876953},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.44086864590644836},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4364885687828064},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.43145552277565},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42035233974456787},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.41869065165519714},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.39655736088752747},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35093867778778076},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.19285061955451965},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13636258244514465},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09390434622764587}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7559534311294556},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7081989645957947},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.6601359844207764},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.504360556602478},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5002875328063965},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4708642065525055},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4546802341938019},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.45234644412994385},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4507007598876953},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.44086864590644836},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4364885687828064},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.43145552277565},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42035233974456787},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.41869065165519714},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.39655736088752747},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35093867778778076},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.19285061955451965},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13636258244514465},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09390434622764587},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tits.2023.3266030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2023.3266030","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11","score":0.5600000023841858}],"awards":[{"id":"https://openalex.org/G1525844701","display_name":null,"funder_award_id":"62072078","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1729593744","display_name":null,"funder_award_id":"2022NSFSC0550","funder_id":"https://openalex.org/F4320329861","funder_display_name":"Natural Science Foundation of Sichuan Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329861","display_name":"Natural Science Foundation of Sichuan Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1561441787","https://openalex.org/W2016358833","https://openalex.org/W2021516337","https://openalex.org/W2029693536","https://openalex.org/W2098657835","https://openalex.org/W2126960670","https://openalex.org/W2154909745","https://openalex.org/W2433458552","https://openalex.org/W2466821819","https://openalex.org/W2570008916","https://openalex.org/W2772594442","https://openalex.org/W2914165169","https://openalex.org/W2920780305","https://openalex.org/W2963154589","https://openalex.org/W2969927404","https://openalex.org/W2978098707","https://openalex.org/W2979779867","https://openalex.org/W2980990088","https://openalex.org/W3005378045","https://openalex.org/W3011989826","https://openalex.org/W3013893037","https://openalex.org/W3017151162","https://openalex.org/W3032780047","https://openalex.org/W3110603219","https://openalex.org/W3112090628","https://openalex.org/W3153617170","https://openalex.org/W3156486237","https://openalex.org/W3156844446","https://openalex.org/W3158791646","https://openalex.org/W3173427681","https://openalex.org/W3174976953","https://openalex.org/W3175088648","https://openalex.org/W3177048600","https://openalex.org/W3200124411","https://openalex.org/W3205204467","https://openalex.org/W3208514333","https://openalex.org/W4205705709","https://openalex.org/W4287981385","https://openalex.org/W6633537282","https://openalex.org/W6681749759"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2964948631","https://openalex.org/W1611423412","https://openalex.org/W1512010809","https://openalex.org/W2347425392","https://openalex.org/W2109952796","https://openalex.org/W2792016146","https://openalex.org/W2160113534","https://openalex.org/W2114867755"],"abstract_inverted_index":{"The":[0,188],"popularity":[1],"of":[2,7,47,71,81,87,163,171,205],"vehicles":[3],"promotes":[4],"the":[5,45,72,96,129,151,161,164,195,199],"evolution":[6],"smart":[8],"cities.":[9],"This":[10],"development":[11],"makes":[12],"vehicular":[13],"ad-hoc":[14],"network":[15,37],"(VANET)":[16],"a":[17,35,53,118,142,173,177,229],"widely":[18],"used":[19,99],"inter-vehicular":[20],"communication":[21,101,144,203],"to":[22,40],"obtain":[23],"information":[24],"about":[25],"road":[26],"conditions,":[27],"speed,":[28],"vehicle":[29],"location":[30],"and":[31,78,91,103,120,136,176,184,202,214,242],"traffic":[32],"congestion.":[33],"Such":[34],"public":[36,143],"is":[38,52,154,240],"vulnerable":[39],"different":[41,82],"security":[42,46,83,147],"threats.":[43],"Overall,":[44],"private":[48],"data":[49,138],"in":[50],"VANET":[51,245],"critical":[54],"task.":[55],"It":[56],"has":[57],"been":[58,65],"observed":[59],"that":[60,150,192,224],"various":[61,157],"authentication":[62],"protocols":[63,74,98],"have":[64],"devised":[66],"for":[67,110,126,244],"VANETs.":[68],"However,":[69],"most":[70],"proposed":[73,152],"are":[75,208],"not":[76],"secure":[77,121,137,155,241],"reliable":[79,243],"because":[80],"threats,":[84],"including":[85],"denial":[86],"service,":[88],"replay,":[89],"forgery":[90],"impersonation":[92],"attacks,":[93],"etc.":[94],"Furthermore,":[95],"existing":[97],"extra":[100],"overhead":[102,204],"computational":[104,200],"cost,":[105],"so":[106],"they":[107],"become":[108],"infeasible":[109],"resource-constrained":[111],"environments.":[112],"In":[113],"this":[114],"article,":[115],"we":[116,166],"design":[117],"lightweight":[119],"privacy-preserving":[122],"key":[123,168],"agreement":[124],"protocol":[125,153,207,226,239],"VANETs":[127],"using":[128],"hashing":[130],"technique,":[131],"which":[132],"provides":[133],"an":[134],"efficient":[135],"transmission":[139],"mechanism":[140],"over":[141],"channel.":[145],"Detailed":[146],"analysis":[148],"shows":[149],"against":[156],"attacks.":[158],"To":[159],"evaluate":[160],"performance":[162],"protocol,":[165],"simulate":[167],"cryptographic":[169],"operations":[170],"vehicles,":[172],"roadside":[174],"unit,":[175],"trusted":[178],"party":[179],"agent":[180],"on":[181,210,221],"Arduino,":[182],"low-end":[183],"high-end":[185],"devices,":[186],"respectively.":[187,217],"experimental":[189],"results":[190,220],"show":[191,223],"compared":[193],"with":[194],"other":[196],"related":[197],"protocols,":[198],"cost":[201],"our":[206,225,238],"reduced":[209],"average":[211],"by":[212],"8.797%":[213],"22.06":[215],"%,":[216],"Additionally,":[218],"simulation":[219],"NS3":[222],"consistently":[227],"achieves":[228],"packet":[230],"delivery":[231],"ratio":[232],"higher":[233],"than":[234],"99.91":[235],"%.":[236],"Therefore,":[237],"environment.":[246]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":22},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
