{"id":"https://openalex.org/W4381785687","doi":"https://doi.org/10.1109/tmc.2023.3288930","title":"A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks","display_name":"A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks","publication_year":2023,"publication_date":"2023-06-23","ids":{"openalex":"https://openalex.org/W4381785687","doi":"https://doi.org/10.1109/tmc.2023.3288930"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2023.3288930","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2023.3288930","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017473428","display_name":"Lu Wei","orcid":"https://orcid.org/0000-0003-3386-609X"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lu Wei","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, the School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Institute of Physical Science and Information Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, the School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, the School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Institute of Physical Science and Information Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, the School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, the School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Institute of Physical Science and Information Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, the School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081831339","display_name":"Irina Bolodurina","orcid":"https://orcid.org/0000-0003-0096-2587"},"institutions":[{"id":"https://openalex.org/I196486018","display_name":"Orenburg State University","ror":"https://ror.org/05b0f8e85","country_code":"RU","type":"education","lineage":["https://openalex.org/I196486018"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Irina Bolodurina","raw_affiliation_strings":["Faculty of Mathematics and Information Technologies, Orenburg State University, Orenburg, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Mathematics and Information Technologies, Orenburg State University, Orenburg, Russia","institution_ids":["https://openalex.org/I196486018"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077232320","display_name":"Chengjie Gu","orcid":"https://orcid.org/0009-0001-6597-168X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chengjie Gu","raw_affiliation_strings":["Security Research Institute, New H3C Group, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Security Research Institute, New H3C Group, Hefei, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Key Laboratory of Privacy Preserving Computation, MatrixElements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Privacy Preserving Computation, MatrixElements Technologies, Shanghai, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5017473428"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":4.3011,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.95011235,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"23","issue":"5","first_page":"4318","last_page":"4333"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8253923654556274},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.6049032211303711},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6042728424072266},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6001682281494141},{"id":"https://openalex.org/keywords/aka","display_name":"AKA","score":0.5966922640800476},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5406013131141663},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5373783111572266},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5274096727371216},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.4955042600631714},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.48762694001197815},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.47966650128364563},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46348267793655396},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44080233573913574},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3648020923137665},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18473920226097107},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12395086884498596}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8253923654556274},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.6049032211303711},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6042728424072266},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6001682281494141},{"id":"https://openalex.org/C121158502","wikidata":"https://www.wikidata.org/wiki/Q4652161","display_name":"AKA","level":2,"score":0.5966922640800476},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5406013131141663},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5373783111572266},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5274096727371216},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.4955042600631714},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.48762694001197815},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.47966650128364563},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46348267793655396},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44080233573913574},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3648020923137665},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18473920226097107},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12395086884498596},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2023.3288930","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2023.3288930","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1765855239","display_name":null,"funder_award_id":"62202008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4340248523","display_name":null,"funder_award_id":"ESSCKF 2022-04","funder_id":"https://openalex.org/F4320322449","funder_display_name":"Tongji University"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322449","display_name":"Tongji University","ror":"https://ror.org/03rc6as71"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1561441787","https://openalex.org/W1991878236","https://openalex.org/W2023835067","https://openalex.org/W2043926312","https://openalex.org/W2166177812","https://openalex.org/W2339549509","https://openalex.org/W2537351364","https://openalex.org/W2594535555","https://openalex.org/W2768513834","https://openalex.org/W2772594442","https://openalex.org/W2805908180","https://openalex.org/W2920780305","https://openalex.org/W2921960465","https://openalex.org/W3005378045","https://openalex.org/W3006891966","https://openalex.org/W3017170021","https://openalex.org/W3026248346","https://openalex.org/W3092485457","https://openalex.org/W3104953546","https://openalex.org/W3127167990","https://openalex.org/W3168209556","https://openalex.org/W3173693125","https://openalex.org/W4205705709","https://openalex.org/W4229815470","https://openalex.org/W6683861630"],"related_works":["https://openalex.org/W3014541132","https://openalex.org/W2994737807","https://openalex.org/W2948639032","https://openalex.org/W2365081032","https://openalex.org/W3106916313","https://openalex.org/W2018052023","https://openalex.org/W3127920551","https://openalex.org/W2410215724","https://openalex.org/W3151240493","https://openalex.org/W2953410103"],"abstract_inverted_index":{"Since":[0],"the":[1,44,50,58,81,88,104,110,121,140,163],"communication":[2],"channels":[3],"in":[4,60,93],"vehicular":[5,25],"ad-hoc":[6],"networks":[7],"(VANETs)":[8],"are":[9,96],"wireless":[10],"and":[11,54,139,155,167,170],"open,":[12],"malicious":[13],"adversaries":[14],"can":[15],"monitor":[16],"or":[17,90],"fabricate":[18],"messages":[19],"transmitted":[20],"across":[21],"them.":[22],"To":[23,108],"secure":[24],"communications,":[26],"an":[27],"authenticated":[28],"key":[29,100,146],"agreement":[30],"(AKA)":[31],"scheme":[32,127,161,181],"needs":[33],"to":[34,48,65,79],"be":[35,150],"designed":[36],"for":[37,99,145],"VNAETs.":[38],"Traditional":[39],"VANETs":[40,72,117,185],"AKA":[41,73,118,122,186],"schemes":[42,62,74,85],"require":[43],"trusted":[45],"authority":[46],"(TA)":[47],"authenticate":[49],"legality":[51],"of":[52,124],"message":[53],"corresponding":[55],"sender.":[56],"However,":[57,83],"TA":[59,141],"these":[61,84],"is":[63,106,128,143],"vulnerable":[64],"suffer":[66],"from":[67],"single-point-of-failure":[68],"issues.":[69],"Some":[70],"blockchain-based":[71,184],"have":[75],"been":[76],"proposed":[77,126,160,180],"recently":[78],"address":[80],"deficiency.":[82],"rely":[86],"on":[87,130,134],"consortium":[89],"private":[91],"blockchain":[92,137],"which":[94],"TAs":[95],"still":[97],"required":[98],"generation,":[101],"resulting":[102],"that":[103,142,158,178],"practicality":[105],"limited.":[107],"solve":[109],"issue,":[111],"we":[112],"design":[113],"a":[114,135],"smart":[115,131],"contract-based":[116],"scheme,":[119],"where":[120],"algorithm":[123],"our":[125,159,179],"implemented":[129],"contract":[132],"deployed":[133],"public":[136],"system":[138],"responsible":[144],"generation":[147],"will":[148],"not":[149],"required.":[151],"The":[152,174],"security":[153,166,169],"proof":[154],"analysis":[156,176],"show":[157],"satisfies":[162],"session-key":[164],"semantic":[165],"essential":[168],"privacy":[171],"requirements,":[172],"respectively.":[173],"performance":[175],"demonstrates":[177],"outperforms":[182],"existing":[183],"schemes.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
