{"id":"https://openalex.org/W4414080221","doi":"https://doi.org/10.1109/tits.2025.3589792","title":"EEGAP: ECC-Based Efficient Group Authentication Protocol for Dynamic Vehicular Platoon","display_name":"EEGAP: ECC-Based Efficient Group Authentication Protocol for Dynamic Vehicular Platoon","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W4414080221","doi":"https://doi.org/10.1109/tits.2025.3589792"},"language":"en","primary_location":{"id":"doi:10.1109/tits.2025.3589792","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2025.3589792","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100542724","display_name":"Hongyuan Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I15823474","display_name":"Linyi University","ror":"https://ror.org/01knv0402","country_code":"CN","type":"education","lineage":["https://openalex.org/I15823474"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongyuan Cheng","raw_affiliation_strings":["School of Computer Science and Engineering, Linyi University, Linyi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Linyi University, Linyi, China","institution_ids":["https://openalex.org/I15823474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115694781","display_name":"Zihan Wang","orcid":"https://orcid.org/0009-0007-8384-7678"},"institutions":[{"id":"https://openalex.org/I15823474","display_name":"Linyi University","ror":"https://ror.org/01knv0402","country_code":"CN","type":"education","lineage":["https://openalex.org/I15823474"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihan Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Linyi University, Linyi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Linyi University, Linyi, China","institution_ids":["https://openalex.org/I15823474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029072107","display_name":"Jingcheng Song","orcid":"https://orcid.org/0000-0002-8297-3492"},"institutions":[{"id":"https://openalex.org/I15823474","display_name":"Linyi University","ror":"https://ror.org/01knv0402","country_code":"CN","type":"education","lineage":["https://openalex.org/I15823474"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingcheng Song","raw_affiliation_strings":["School of Computer Science and Engineering, Linyi University, Linyi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Linyi University, Linyi, China","institution_ids":["https://openalex.org/I15823474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007677966","display_name":"Qi Zhong","orcid":"https://orcid.org/0000-0002-3736-7135"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Qi Zhong","raw_affiliation_strings":["Faculty of Data Science, City University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Data Science, City University of Macau, Macau, China","institution_ids":["https://openalex.org/I6469544"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044099416","display_name":"Zahra Pooranian","orcid":"https://orcid.org/0000-0003-3767-0377"},"institutions":[{"id":"https://openalex.org/I71052956","display_name":"University of Reading","ror":"https://ror.org/05v62cm79","country_code":"GB","type":"education","lineage":["https://openalex.org/I71052956"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zahra Pooranian","raw_affiliation_strings":["Department of Computer Science, University of Reading, Reading, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Reading, Reading, U.K","institution_ids":["https://openalex.org/I71052956"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021815654","display_name":"Fabio Martinelli","orcid":"https://orcid.org/0000-0001-6746-4967"},"institutions":[{"id":"https://openalex.org/I4210155236","display_name":"National Research Council","ror":"https://ror.org/04zaypm56","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210155236"]},{"id":"https://openalex.org/I4210107558","display_name":"Consorzio Pisa Ricerche","ror":"https://ror.org/01t0n3b84","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210107558"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Fabio Martinelli","raw_affiliation_strings":["Consiglio Nazionale delle Ricerche (CNR), Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Consiglio Nazionale delle Ricerche (CNR), Pisa, Italy","institution_ids":["https://openalex.org/I4210107558","https://openalex.org/I4210155236"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022893278","display_name":"Mohammad Shojafar","orcid":"https://orcid.org/0000-0003-3284-5086"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammad Shojafar","raw_affiliation_strings":["5G and 6G Innovation Centre (5G/6GIC), University of Surrey, Guildford, U.K","5G and6G Innovation Centre (5G/6GIC), University of Surrey, Guildford, U.K"],"affiliations":[{"raw_affiliation_string":"5G and 6G Innovation Centre (5G/6GIC), University of Surrey, Guildford, U.K","institution_ids":[]},{"raw_affiliation_string":"5G and6G Innovation Centre (5G/6GIC), University of Surrey, Guildford, U.K","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100542724"],"corresponding_institution_ids":["https://openalex.org/I15823474"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24795786,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"26","issue":"11","first_page":"20392","last_page":"20406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9373999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/platoon","display_name":"Platoon","score":0.8514999747276306},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5814999938011169},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5565000176429749},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.54830002784729},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5378999710083008},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49810001254081726},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.49639999866485596},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47450000047683716},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.45649999380111694}],"concepts":[{"id":"https://openalex.org/C2777735972","wikidata":"https://www.wikidata.org/wiki/Q1061967","display_name":"Platoon","level":3,"score":0.8514999747276306},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6729000210762024},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5814999938011169},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5651000142097473},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5565000176429749},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.54830002784729},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5378999710083008},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49810001254081726},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.49639999866485596},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47450000047683716},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.45649999380111694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4523000121116638},{"id":"https://openalex.org/C30095986","wikidata":"https://www.wikidata.org/wiki/Q1035238","display_name":"Vehicular communication systems","level":5,"score":0.39989998936653137},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.3995000123977661},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.39579999446868896},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3776000142097473},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3749000132083893},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.37040001153945923},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.36239999532699585},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.3285999894142151},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.3230000138282776},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.3174000084400177},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3111000061035156},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.2985000014305115},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.26600000262260437},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.2651999890804291},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.2581000030040741},{"id":"https://openalex.org/C79487989","wikidata":"https://www.wikidata.org/wiki/Q934680","display_name":"Vehicle dynamics","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2535000145435333},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.25279998779296875}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tits.2025.3589792","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2025.3589792","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"},{"id":"pmh:oai:centaur.reading.ac.uk:124260","is_oa":false,"landing_page_url":"https://centaur.reading.ac.uk/view/creators/90012439.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4306402273","display_name":"CentAUR (University of Reading)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71052956","host_organization_name":"University of Reading","host_organization_lineage":["https://openalex.org/I71052956"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W2054202867","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2109882692","https://openalex.org/W2547137208","https://openalex.org/W2061637199"],"abstract_inverted_index":{"Vehicular":[0],"platooning":[1],"has":[2],"emerged":[3],"as":[4,15,97],"a":[5,37],"promising":[6],"paradigm":[7],"in":[8],"intelligent":[9],"transportation,":[10],"offering":[11],"significant":[12],"benefits":[13],"such":[14,96],"reduced":[16],"energy":[17],"consumption,":[18],"improved":[19],"road":[20],"throughput":[21],"and":[22,42,60,89,99,107,117,134,147],"mitigated":[23],"traffic":[24],"congestion.":[25],"However,":[26],"the":[27,154],"open":[28],"nature":[29],"of":[30,40,158],"vehicular":[31,70,84,159],"communication":[32,91,135,161],"channels":[33],"exposes":[34],"platoons":[35],"to":[36,140],"wide":[38],"range":[39],"security":[41,52,145,156],"privacy":[43],"threats.":[44],"Although":[45],"existing":[46,141],"group":[47,78,108,126],"key-based":[48],"protocols":[49],"provide":[50],"foundational":[51],"services,":[53],"they":[54],"often":[55],"incur":[56],"substantial":[57],"computation":[58,130],"overhead":[59,131,136],"insufficiently":[61],"address":[62],"vehicle":[63],"privacy,":[64],"making":[65],"them":[66],"unsuitable":[67],"for":[68,82],"dynamic":[69,83],"platoon.":[71],"Therefore,":[72],"this":[73],"paper":[74],"introduces":[75],"an":[76],"efficient":[77],"authentication":[79],"protocol":[80],"(EEGAP)":[81],"platoons,":[85],"which":[86],"ensures":[87],"privacy-preserving":[88],"secure":[90],"during":[92],"platoon":[93,160],"restructuring":[94],"operations,":[95],"merging":[98],"splitting,":[100],"by":[101,132,137],"integrating":[102],"anonymous":[103],"authentication,":[104],"fog":[105],"computing,":[106],"key":[109,127],"agreement":[110],"mechanisms.":[111],"Leveraging":[112],"Elliptic":[113],"Curve":[114],"Cryptography":[115],"(ECC)":[116],"secret":[118],"sharing":[119],"mechanisms,":[120],"EEGAP":[121,152],"enables":[122],"lightweight":[123],"yet":[124],"robust":[125],"negotiation,":[128],"reducing":[129],"7.08%":[133],"6.85%":[138],"compared":[139],"schemes.":[142],"Both":[143],"formal":[144],"proofs":[146],"informal":[148],"analysis":[149],"confirm":[150],"that":[151],"satisfies":[153],"stringent":[155],"requirements":[157],"systems.":[162]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
