{"id":"https://openalex.org/W2184866600","doi":"https://doi.org/10.1109/wimob.2015.7348023","title":"A two level privacy preserving pseudonymous authentication protocol for VANET","display_name":"A two level privacy preserving pseudonymous authentication protocol for VANET","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2184866600","doi":"https://doi.org/10.1109/wimob.2015.7348023","mag":"2184866600"},"language":"en","primary_location":{"id":"doi:10.1109/wimob.2015.7348023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2015.7348023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017839273","display_name":"Ubaidullah Rajput","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Ubaidullah Rajput","raw_affiliation_strings":["Deptt.of Computer Science and Engineering, Hanyang Univ, South Korea"],"affiliations":[{"raw_affiliation_string":"Deptt.of Computer Science and Engineering, Hanyang Univ, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045719969","display_name":"Fizza Abbas","orcid":"https://orcid.org/0000-0002-4398-3460"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Fizza Abbas","raw_affiliation_strings":["Deptt.of Computer Science and Engineering, Hanyang Univ, South Korea"],"affiliations":[{"raw_affiliation_string":"Deptt.of Computer Science and Engineering, Hanyang Univ, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077013640","display_name":"Hasoo Eun","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hasoo Eun","raw_affiliation_strings":["Deptt.of Computer Science and Engineering, Hanyang Univ, South Korea"],"affiliations":[{"raw_affiliation_string":"Deptt.of Computer Science and Engineering, Hanyang Univ, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090705977","display_name":"Rasheed Hussain","orcid":"https://orcid.org/0000-0002-3771-7537"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Rasheed Hussain","raw_affiliation_strings":["Deptt.of Computer Science and Engineering, Hanyang Univ, South Korea"],"affiliations":[{"raw_affiliation_string":"Deptt.of Computer Science and Engineering, Hanyang Univ, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102887306","display_name":"Heekuck Oh","orcid":"https://orcid.org/0000-0002-2989-8737"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Heekuck Oh","raw_affiliation_strings":["Deptt.of Computer Science and Engineering, Hanyang Univ, South Korea"],"affiliations":[{"raw_affiliation_string":"Deptt.of Computer Science and Engineering, Hanyang Univ, South Korea","institution_ids":["https://openalex.org/I4575257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017839273"],"corresponding_institution_ids":["https://openalex.org/I4575257"],"apc_list":null,"apc_paid":null,"fwci":2.1999,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.89015359,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"643","last_page":"650"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7898819446563721},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.7263463735580444},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6729058027267456},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.67112797498703},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.6622966527938843},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6391146779060364},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5408196449279785},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.5113279223442078},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.48467567563056946},{"id":"https://openalex.org/keywords/pseudonym","display_name":"Pseudonym","score":0.4696083962917328},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.4511331021785736},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.44912222027778625},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4464871883392334},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.4320544898509979},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.4144819676876068},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.372088223695755},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.36913007497787476},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.3599112629890442},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.145656019449234},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.1225733757019043}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7898819446563721},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.7263463735580444},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6729058027267456},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.67112797498703},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.6622966527938843},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6391146779060364},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5408196449279785},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.5113279223442078},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.48467567563056946},{"id":"https://openalex.org/C2776021475","wikidata":"https://www.wikidata.org/wiki/Q61002","display_name":"Pseudonym","level":2,"score":0.4696083962917328},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.4511331021785736},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.44912222027778625},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4464871883392334},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.4320544898509979},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.4144819676876068},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.372088223695755},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.36913007497787476},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.3599112629890442},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.145656019449234},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.1225733757019043},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/wimob.2015.7348023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2015.7348023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/1c279688-0560-4bc7-9ecd-e1ad57755208","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/1c279688-0560-4bc7-9ecd-e1ad57755208","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Rajput, U, Abbas, F, Eun, H, Hussain, R & Oh, H 2015, A two level privacy preserving pseudonymous authentication protocol for VANET. in 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015., 7348023, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015, Institute of Electrical and Electronics Engineers (IEEE), pp. 643-650. https://doi.org/10.1109/WiMOB.2015.7348023","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/1c279688-0560-4bc7-9ecd-e1ad57755208","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=84964297975&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Rajput, U, Abbas, F, Eun, H, Hussain, R & Oh, H 2015, A two level privacy preserving pseudonymous authentication protocol for VANET. in 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015., 7348023, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015, Institute of Electrical and Electronics Engineers (IEEE), pp. 643-650. https://doi.org/10.1109/WiMOB.2015.7348023","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W108080453","https://openalex.org/W1490653284","https://openalex.org/W1569083856","https://openalex.org/W1880212920","https://openalex.org/W1964524454","https://openalex.org/W1965064232","https://openalex.org/W1966132871","https://openalex.org/W1969035815","https://openalex.org/W1996058270","https://openalex.org/W2018468667","https://openalex.org/W2059528890","https://openalex.org/W2098657835","https://openalex.org/W2103056119","https://openalex.org/W2112004167","https://openalex.org/W2112348059","https://openalex.org/W2121247918","https://openalex.org/W2122991569","https://openalex.org/W2128628587","https://openalex.org/W2153098630","https://openalex.org/W2157589764","https://openalex.org/W2170183027","https://openalex.org/W2911424200","https://openalex.org/W4285719527","https://openalex.org/W6604389750","https://openalex.org/W6634010886","https://openalex.org/W6639053789"],"related_works":["https://openalex.org/W2113386121","https://openalex.org/W1804429336","https://openalex.org/W1486200819","https://openalex.org/W1871251705","https://openalex.org/W269269555","https://openalex.org/W2294573228","https://openalex.org/W2514337931","https://openalex.org/W2300877280","https://openalex.org/W2010574095","https://openalex.org/W2555010610"],"abstract_inverted_index":{"Vehicular":[0],"ad":[1],"hoc":[2],"network":[3,70],"(VANET)":[4],"is":[5,162,221,272],"gaining":[6],"significant":[7,145],"popularity":[8],"due":[9],"to":[10,24,58,86,122,163,211,224,267],"their":[11],"role":[12],"in":[13,21,33,78,216],"improving":[14],"traffic":[15,39],"efficiency":[16],"and":[17,71,100,147,207,274],"safety.":[18],"However,":[19,215],"communication":[20,259],"VANET":[22,35],"needs":[23,85],"be":[25,87,104],"secure":[26],"as":[27,29,42,51,98,170,204,261,263],"well":[28,262],"authenticated.":[30],"The":[31,231],"vehicles":[32,66],"the":[34,59,62,69,91,124,130,226,235,238,241,244,247,250,258],"not":[36],"only":[37,183],"broadcast":[38,46,72],"messages":[40,49,74],"known":[41],"beacons":[43],"but":[44],"also":[45],"safety":[47],"critical":[48],"such":[50,97],"electronic":[52],"emergency":[53],"brake":[54],"light":[55],"(EEBL).":[56],"Due":[57],"openness":[60],"of":[61,126,129,201,218,229,237,243,249],"network,":[63],"a":[64,83,179,192,196],"malicious":[65],"can":[67],"join":[68],"bogus":[73],"that":[75,143,155,182,269],"could":[76],"result":[77],"accident.":[79],"On":[80],"one":[81],"hand,":[82,93],"vehicle":[84],"authenticated":[88],"while":[89],"on":[90,167],"other":[92],"its":[94],"private":[95],"data":[96],"location":[99],"identity":[101],"information":[102],"must":[103],"prevented":[105],"from":[106,187],"misuse.":[107],"In":[108,246],"this":[109],"paper,":[110,251],"we":[111,252],"propose":[112],"an":[113],"efficient":[114,273],"pseudonymous":[115],"authentication":[116],"protocol":[117,181,255],"with":[118,138,198],"conditional":[119,213],"privacy":[120],"preservation":[121],"enhance":[123],"security":[125],"VANET.":[127],"Most":[128],"current":[131],"protocols":[132],"either":[133],"utilize":[134,191],"pseudonym":[135,206],"based":[136,153],"approaches":[137,154],"certificate":[139],"revocation":[140,227],"list":[141,228],"(CRL)":[142],"causes":[144],"communicational":[146],"storage":[148],"overhead":[149],"or":[150],"group":[151],"signature":[152],"are":[156],"computationally":[157],"expensive.":[158],"Another":[159],"inherent":[160,232],"disadvantage":[161],"have":[164,173],"full":[165],"trust":[166],"certification":[168,188],"authorities,":[169],"these":[171],"entities":[172],"complete":[174],"user":[175,197],"profiles.":[176],"We":[177,190],"present":[178],"new":[180],"requires":[184],"honest-but-curious":[185],"behavior":[186],"authority.":[189],"mechanism":[193,233],"for":[194],"providing":[195],"two":[199],"levels":[200],"pseudonyms":[202,210],"named":[203],"base":[205],"short":[208],"time":[209],"achieve":[212],"privacy.":[214],"case":[217],"revocation,":[219],"there":[220],"no":[222],"need":[223],"maintain":[225],"pseudonyms.":[230],"assures":[234],"receiver":[236],"message":[239],"about":[240],"authenticity":[242],"pseudonym.":[245],"end":[248],"analyze":[253],"our":[254,270],"by":[256],"giving":[257],"cost":[260],"various":[264],"attack":[265],"scenarios":[266],"show":[268],"approach":[271],"robust.":[275]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":5}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
