{"id":"https://openalex.org/W4365801692","doi":"https://doi.org/10.1109/tvt.2023.3244077","title":"An Efficient Cross-Layer Authentication Scheme for Secure Communication in Vehicular Ad-Hoc Networks","display_name":"An Efficient Cross-Layer Authentication Scheme for Secure Communication in Vehicular Ad-Hoc Networks","publication_year":2023,"publication_date":"2023-04-14","ids":{"openalex":"https://openalex.org/W4365801692","doi":"https://doi.org/10.1109/tvt.2023.3244077"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2023.3244077","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tvt.2023.3244077","pdf_url":"https://ieeexplore.ieee.org/ielx7/25/4356907/10041975.pdf","source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/25/4356907/10041975.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082156702","display_name":"Mahmoud A. Shawky","orcid":"https://orcid.org/0000-0003-3393-8460"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mahmoud A. Shawky","raw_affiliation_strings":["James Watt School of Engineering, University of Glasgow, Glasgow, U.K"],"raw_orcid":"https://orcid.org/0000-0003-3393-8460","affiliations":[{"raw_affiliation_string":"James Watt School of Engineering, University of Glasgow, Glasgow, U.K","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045730630","display_name":"Mirko Bottarelli","orcid":"https://orcid.org/0000-0002-9789-5001"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mirko Bottarelli","raw_affiliation_strings":["Secure Cyber Systems Research Group (SCSRG), Warwick Manufacturing Group(WMG), University of Warwick, Coventry, U.K"],"raw_orcid":"https://orcid.org/0000-0002-9789-5001","affiliations":[{"raw_affiliation_string":"Secure Cyber Systems Research Group (SCSRG), Warwick Manufacturing Group(WMG), University of Warwick, Coventry, U.K","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043277300","display_name":"Gregory Epiphaniou","orcid":"https://orcid.org/0000-0003-1054-6368"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gregory Epiphaniou","raw_affiliation_strings":["Secure Cyber Systems Research Group (SCSRG), Warwick Manufacturing Group(WMG), University of Warwick, Coventry, U.K"],"raw_orcid":"https://orcid.org/0000-0003-1054-6368","affiliations":[{"raw_affiliation_string":"Secure Cyber Systems Research Group (SCSRG), Warwick Manufacturing Group(WMG), University of Warwick, Coventry, U.K","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056130318","display_name":"Petros Karadimas","orcid":"https://orcid.org/0000-0001-9103-0456"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Petros Karadimas","raw_affiliation_strings":["School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, U.K"],"raw_orcid":"https://orcid.org/0000-0001-9103-0456","affiliations":[{"raw_affiliation_string":"School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, U.K","institution_ids":["https://openalex.org/I251738"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082156702"],"corresponding_institution_ids":["https://openalex.org/I7882870"],"apc_list":null,"apc_paid":null,"fwci":4.8111,"has_fulltext":true,"cited_by_count":38,"citation_normalized_percentile":{"value":0.95747396,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"72","issue":"7","first_page":"8738","last_page":"8754"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8016420602798462},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6696370244026184},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.6045573949813843},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5882436633110046},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5275067090988159},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5133163332939148},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.43008118867874146},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.4228043854236603},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.38199150562286377},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3359295129776001},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.30762386322021484},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.22470471262931824},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20075729489326477}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8016420602798462},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6696370244026184},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.6045573949813843},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5882436633110046},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5275067090988159},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5133163332939148},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.43008118867874146},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.4228043854236603},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38199150562286377},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3359295129776001},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30762386322021484},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.22470471262931824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20075729489326477},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tvt.2023.3244077","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tvt.2023.3244077","pdf_url":"https://ieeexplore.ieee.org/ielx7/25/4356907/10041975.pdf","source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},{"id":"pmh:oai:eprints.gla.ac.uk:291710","is_oa":true,"landing_page_url":null,"pdf_url":"https://eprints.gla.ac.uk/291710/2/291710.pdf","source":{"id":"https://openalex.org/S4210235606","display_name":"ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam)","issn_l":"2622-8912","issn":["2622-8912","2622-8920"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Articles"},{"id":"pmh:oai:repository@napier.ac.uk:3038353","is_oa":true,"landing_page_url":"https://doi.org/10.1109/TVT.2023.3244077","pdf_url":"https://napier-repository.worktribe.com/file/3038353/1/An%20Efficient%20Cross-Layer%20Authentication%20Scheme%20For%20Secure%20Communication%20In%20Vehicular%20Ad-hoc%20Networks","source":{"id":"https://openalex.org/S4306402591","display_name":"Edinburgh Napier Research Repository (Edinburgh Napier University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I251738","host_organization_name":"Edinburgh Napier University","host_organization_lineage":["https://openalex.org/I251738"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"}],"best_oa_location":{"id":"doi:10.1109/tvt.2023.3244077","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tvt.2023.3244077","pdf_url":"https://ieeexplore.ieee.org/ielx7/25/4356907/10041975.pdf","source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G2274530859","display_name":"Bandwidth and Energy Efficient Compact Multi-Antenna Systems for Connected Autonomous Vehicles","funder_award_id":"EP/R041660/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G3633808273","display_name":null,"funder_award_id":"EP/R041660/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4365801692.pdf","grobid_xml":"https://content.openalex.org/works/W4365801692.grobid-xml"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W83319941","https://openalex.org/W103111217","https://openalex.org/W1569083856","https://openalex.org/W1667889362","https://openalex.org/W1897507705","https://openalex.org/W1919042217","https://openalex.org/W1995524702","https://openalex.org/W2004573430","https://openalex.org/W2012672797","https://openalex.org/W2018468667","https://openalex.org/W2052267638","https://openalex.org/W2053745611","https://openalex.org/W2071834103","https://openalex.org/W2074886859","https://openalex.org/W2098657835","https://openalex.org/W2114126054","https://openalex.org/W2115735006","https://openalex.org/W2132218667","https://openalex.org/W2154170045","https://openalex.org/W2314565273","https://openalex.org/W2320588269","https://openalex.org/W2333508014","https://openalex.org/W2344686823","https://openalex.org/W2431890594","https://openalex.org/W2594143762","https://openalex.org/W2727951952","https://openalex.org/W2739826707","https://openalex.org/W2790173195","https://openalex.org/W2796227106","https://openalex.org/W2887906137","https://openalex.org/W2918507105","https://openalex.org/W2938652874","https://openalex.org/W2946888790","https://openalex.org/W2948068493","https://openalex.org/W2991063718","https://openalex.org/W3008296531","https://openalex.org/W3016634017","https://openalex.org/W3023377808","https://openalex.org/W3030846223","https://openalex.org/W3034835560","https://openalex.org/W3035049597","https://openalex.org/W3035389810","https://openalex.org/W3035529916","https://openalex.org/W3041059664","https://openalex.org/W3083672913","https://openalex.org/W3127595569","https://openalex.org/W3158791646","https://openalex.org/W4205092462","https://openalex.org/W4210549508","https://openalex.org/W4245166615","https://openalex.org/W6741971761"],"related_works":["https://openalex.org/W2027636740","https://openalex.org/W2062688728","https://openalex.org/W2061231656","https://openalex.org/W2771454953","https://openalex.org/W4231650586","https://openalex.org/W3046762796","https://openalex.org/W3202102306","https://openalex.org/W4327774248","https://openalex.org/W2998294818","https://openalex.org/W3046260513"],"abstract_inverted_index":{"Intelligent":[0],"transportation":[1],"systems":[2],"contribute":[3],"to":[4,23,94],"improved":[5],"traffic":[6],"safety":[7],"by":[8],"facilitating":[9],"real-time":[10],"communication":[11,48,81,144,234],"between":[12,125],"vehicles":[13],"and":[14,47,78,80,133,209,233],"infrastructures.":[15],"In":[16,150,197],"this":[17],"context,":[18],"message":[19,218],"authentication":[20,36,55,91],"is":[21,92,123,145,161,205],"crucial":[22],"safeguard":[24],"vehicular":[25,58],"ad-hoc":[26],"networks":[27],"(VANETs)":[28],"from":[29,178],"malicious":[30],"attacks.":[31],"The":[32,83],"current":[33],"state-of-the-art":[34],"for":[35,57,69,142,147],"in":[37,220,229],"VANETs":[38],"relies":[39],"on":[40,175],"conventional":[41],"cryptographic":[42],"primitives,":[43],"introducing":[44],"significant":[45],"computation":[46,79,232],"overheads.":[49,82],"This":[50],"paper":[51],"presents":[52],"a":[53,112,117,138,226],"cross-layer":[54],"scheme":[56,85,191,204,242],"communication,":[59],"incorporating":[60],"the":[61,66,71,75,96,99,103,109,130,151,156,165,176,179,186,189,199,202,221,237,240],"short-term":[62],"reciprocal":[63],"features":[64],"of":[65,98,120,153,171,188,201,231,239],"wireless":[67],"channel":[68,172],"re-authenticating":[70],"corresponding":[72,100],"terminal,":[73],"reducing":[74],"overall":[76],"complexity":[77],"proposed":[84,146,190,203,241],"comprises":[86],"four":[87],"steps:":[88],"S1.":[89],"Upper-layer":[90],"used":[93],"determine":[95],"legitimacy":[97],"terminal":[101],"at":[102,168,193],"first":[104],"time":[105],"slot;":[106],"S2.":[107],"Upon":[108],"verification":[110],"result,":[111],"location-dependent":[113],"shared":[114],"key":[115,132,157],"with":[116],"minimum":[118],"number":[119],"mismatched":[121],"bits":[122],"extracted":[124,131],"both":[126],"terminals;":[127],"S3.":[128],"Using":[129],"under":[134],"binary":[135],"hypothesis":[136],"testing,":[137],"PHY":[139],"challenge-response":[140],"algorithm":[141],"multicarrier":[143],"re-authentication;":[148],"S4.":[149],"case":[152],"false":[154],"detection,":[155],"extraction":[158],"step":[159,181],"(S2)":[160],"re-executed":[162],"after":[163],"adapting":[164],"quantisation":[166],"levels":[167],"different":[169],"conditions":[170],"non-reciprocity":[173],"based":[174],"feedback":[177],"re-authentication":[180],"(S3).":[182],"Simulation":[183],"results":[184],"show":[185],"effectiveness":[187],"even":[192],"small":[194],"signal-to-noise":[195],"ratios.":[196],"addition,":[198],"immunity":[200],"proved":[206],"against":[207,215],"active":[208],"passive":[210],"attacks,":[211],"including":[212],"signatures'":[213],"unforgeability":[214],"adaptive":[216],"chosen":[217],"attacks":[219],"random":[222],"oracle":[223],"model.":[224],"Finally,":[225],"comprehensive":[227],"comparison":[228],"terms":[230],"overheads":[235],"demonstrates":[236],"superiority":[238],"over":[243],"its":[244],"best":[245],"rivals.":[246]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":5}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
