{"id":"https://openalex.org/W4285304176","doi":"https://doi.org/10.1109/tmc.2022.3180809","title":"AC-SDVN: An Access Control Protocol for Video Multicast in Software Defined Vehicular Networks","display_name":"AC-SDVN: An Access Control Protocol for Video Multicast in Software Defined Vehicular Networks","publication_year":2022,"publication_date":"2022-06-09","ids":{"openalex":"https://openalex.org/W4285304176","doi":"https://doi.org/10.1109/tmc.2022.3180809"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2022.3180809","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2022.3180809","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/AC-SDVN_An_Access_Control_Protocol_for_Video_Multicast_in_Software_Defined_Vehicular_Networks/20113184","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100419412","display_name":"Xiaoyu Zhang","orcid":"https://orcid.org/0000-0002-5698-7938"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyu Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Anhui University, Hefei, Anhui, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, Anhui, China","Institute of Physical Science and Information Technology, Anhui University, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Institute of Physical Science and Information Technology, Anhui University, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["School of Computer Science and Technology, Anhui University, Hefei, Anhui, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, Anhui, China","Institute of Physical Science and Information Technology, Anhui University, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Institute of Physical Science and Information Technology, Anhui University, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Cui","raw_affiliation_strings":["School of Computer Science and Technology, Anhui University, Hefei, Anhui, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, Anhui, China","Institute of Physical Science and Information Technology, Anhui University, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Institute of Physical Science and Information Technology, Anhui University, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077232320","display_name":"Chengjie Gu","orcid":"https://orcid.org/0009-0001-6597-168X"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengjie Gu","raw_affiliation_strings":["New H3C Group, Security Research Institute, Anhui University, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"New H3C Group, Security Research Institute, Anhui University, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081831339","display_name":"Irina Bolodurina","orcid":"https://orcid.org/0000-0003-0096-2587"},"institutions":[{"id":"https://openalex.org/I196486018","display_name":"Orenburg State University","ror":"https://ror.org/05b0f8e85","country_code":"RU","type":"education","lineage":["https://openalex.org/I196486018"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Irina Bolodurina","raw_affiliation_strings":["Faculty of Mathematics and Information Technologies, Orenburg State University, Orenburg, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Mathematics and Information Technologies, Orenburg State University, Orenburg, Russia","institution_ids":["https://openalex.org/I196486018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002822427","display_name":"Lu Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I153648349","display_name":"University of Leicester","ror":"https://ror.org/04h699437","country_code":"GB","type":"education","lineage":["https://openalex.org/I153648349"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Lu Liu","raw_affiliation_strings":["School of Informatics, University of Leicester, Leicester, U.K"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Leicester, Leicester, U.K","institution_ids":["https://openalex.org/I153648349"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100419412"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":0.923,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.72919778,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"22","issue":"10","first_page":"5657","last_page":"5674"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8806694746017456},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.80890953540802},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.7974604368209839},{"id":"https://openalex.org/keywords/xcast","display_name":"Xcast","score":0.5482453107833862},{"id":"https://openalex.org/keywords/protocol-independent-multicast","display_name":"Protocol Independent Multicast","score":0.5475760698318481},{"id":"https://openalex.org/keywords/source-specific-multicast","display_name":"Source-specific multicast","score":0.4960344731807709},{"id":"https://openalex.org/keywords/ip-multicast","display_name":"IP multicast","score":0.48418596386909485},{"id":"https://openalex.org/keywords/pragmatic-general-multicast","display_name":"Pragmatic General Multicast","score":0.4833033084869385},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44065847992897034},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4117879867553711},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2025742530822754}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8806694746017456},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.80890953540802},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.7974604368209839},{"id":"https://openalex.org/C192059732","wikidata":"https://www.wikidata.org/wiki/Q3823050","display_name":"Xcast","level":3,"score":0.5482453107833862},{"id":"https://openalex.org/C44892269","wikidata":"https://www.wikidata.org/wiki/Q782752","display_name":"Protocol Independent Multicast","level":3,"score":0.5475760698318481},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.4960344731807709},{"id":"https://openalex.org/C150329594","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"IP multicast","level":3,"score":0.48418596386909485},{"id":"https://openalex.org/C112037812","wikidata":"https://www.wikidata.org/wiki/Q2107523","display_name":"Pragmatic General Multicast","level":4,"score":0.4833033084869385},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44065847992897034},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4117879867553711},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2025742530822754},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tmc.2022.3180809","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2022.3180809","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/20113184","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/AC-SDVN_An_Access_Control_Protocol_for_Video_Multicast_in_Software_Defined_Vehicular_Networks/20113184","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20113184","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/AC-SDVN_An_Access_Control_Protocol_for_Video_Multicast_in_Software_Defined_Vehicular_Networks/20113184","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3514477577","display_name":null,"funder_award_id":"20-57-53019","funder_id":"https://openalex.org/F4320321079","funder_display_name":"Russian Foundation for Basic Research"},{"id":"https://openalex.org/G6687479257","display_name":null,"funder_award_id":"U1936220","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6704400392","display_name":null,"funder_award_id":"62011530046","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8938356812","display_name":null,"funder_award_id":"61872001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321079","display_name":"Russian Foundation for Basic Research","ror":"https://ror.org/02mh1ke95"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W1569083856","https://openalex.org/W1610688607","https://openalex.org/W1667889362","https://openalex.org/W1967449502","https://openalex.org/W2003398168","https://openalex.org/W2029693536","https://openalex.org/W2037184798","https://openalex.org/W2037562012","https://openalex.org/W2097581932","https://openalex.org/W2112914778","https://openalex.org/W2128628587","https://openalex.org/W2138582578","https://openalex.org/W2152924492","https://openalex.org/W2169194339","https://openalex.org/W2491112519","https://openalex.org/W2565708506","https://openalex.org/W2584005145","https://openalex.org/W2601757945","https://openalex.org/W2660887482","https://openalex.org/W2735365211","https://openalex.org/W2736110559","https://openalex.org/W2770114745","https://openalex.org/W2770476457","https://openalex.org/W2774953955","https://openalex.org/W2778414492","https://openalex.org/W2778800374","https://openalex.org/W2789852282","https://openalex.org/W2792887462","https://openalex.org/W2800664508","https://openalex.org/W2809157576","https://openalex.org/W2894946528","https://openalex.org/W2899586161","https://openalex.org/W2902753276","https://openalex.org/W2906042702","https://openalex.org/W2922490798","https://openalex.org/W2946769399","https://openalex.org/W2950191963","https://openalex.org/W2955802053","https://openalex.org/W2964137179","https://openalex.org/W2964167407","https://openalex.org/W2970826199","https://openalex.org/W2979599173","https://openalex.org/W2983694339","https://openalex.org/W2984158375","https://openalex.org/W3003289097","https://openalex.org/W3006463679","https://openalex.org/W3014814080","https://openalex.org/W3015755308","https://openalex.org/W3017170021","https://openalex.org/W3019878669","https://openalex.org/W3029969753","https://openalex.org/W3037856732","https://openalex.org/W3038245700","https://openalex.org/W3045886323","https://openalex.org/W3084544689","https://openalex.org/W3090732383","https://openalex.org/W3108001324","https://openalex.org/W3112083707","https://openalex.org/W3120643467","https://openalex.org/W3143477889","https://openalex.org/W3200796075","https://openalex.org/W3207187032","https://openalex.org/W6634010886","https://openalex.org/W6721411451","https://openalex.org/W6758529199"],"related_works":["https://openalex.org/W2371847117","https://openalex.org/W2161099791","https://openalex.org/W80466176","https://openalex.org/W2136818972","https://openalex.org/W1850815052","https://openalex.org/W2393131931","https://openalex.org/W4321384965","https://openalex.org/W1541871842","https://openalex.org/W1971176687","https://openalex.org/W4243691295"],"abstract_inverted_index":{"The":[0,136],"way":[1],"to":[2,7,39,89,107,168],"use":[3],"limited":[4],"bandwidth":[5],"resources":[6],"achieve":[8],"high-quality":[9],"video":[10,49,72,101,133],"services":[11],"in":[12,74,146,182],"vehicular":[13,77,147],"networks":[14,46,78],"is":[15,53],"an":[16],"important":[17],"research":[18,55],"topic.":[19],"A":[20],"large":[21],"number":[22],"of":[23,31,71,99,161,184],"studies":[24],"have":[25],"shown":[26],"that":[27,117],"the":[28,40,57,68,97,108,111,126,129,143,151,158,171],"fast-growing":[29],"field":[30],"software":[32,75],"defined":[33,76],"networking":[34],"(SDN)":[35],"can":[36,131],"provide":[37],"solutions":[38],"problems":[41],"encountered":[42],"by":[43],"traditional":[44],"IP":[45],"when":[47],"implementing":[48],"multicasting.":[50],"However,":[51],"there":[52],"no":[54],"addressing":[56],"security":[58,92,144],"issues":[59],"for":[60],"this":[61,64],"scenario.":[62],"In":[63,149],"paper,":[65],"we":[66],"explore":[67],"application":[69],"scenarios":[70],"multicast":[73,91,100,115],"(SDVN),":[79],"and":[80,84,104,122,124,141,163,186,192],"propose":[81],"a":[82],"secure":[83],"effective":[85],"access":[86],"control":[87],"protocol":[88,95,137,179],"solve":[90],"issues.":[93],"This":[94],"realizes":[96],"authentication":[98,109,130],"requesting":[102],"vehicles":[103],"RSUs.":[105],"According":[106],"results,":[110],"SDN":[112],"controller":[113],"constructs":[114],"paths":[116],"only":[118,125],"reach":[119],"legitimate":[120],"RSUs":[121],"vehicles,":[123],"vehicle":[127],"passing":[128],"obtain":[132],"decryption":[134],"keys.":[135],"resists":[138],"common":[139],"attacks":[140],"satisfies":[142],"requirements":[145],"networks.":[148],"addition,":[150],"scheme":[152],"supports":[153],"batch":[154],"verification,":[155],"which":[156],"reduces":[157],"time":[159,193],"cost":[160],"authentication,":[162],"adopts":[164],"broadcast":[165],"encryption":[166],"technology":[167],"effectively":[169],"reduce":[170],"communication":[172,187],"load.":[173],"Compared":[174],"with":[175],"related":[176],"schemes,":[177],"our":[178],"performs":[180],"better":[181],"terms":[183],"computation":[185],"cost,":[188],"packet":[189],"loss":[190],"rate,":[191],"delay.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
