{"id":"https://openalex.org/W4415949698","doi":"https://doi.org/10.1109/wimob66857.2025.11257457","title":"Secure Group Key Dissemination Protocol in Cooperative Vehicular Platooning","display_name":"Secure Group Key Dissemination Protocol in Cooperative Vehicular Platooning","publication_year":2025,"publication_date":"2025-10-20","ids":{"openalex":"https://openalex.org/W4415949698","doi":"https://doi.org/10.1109/wimob66857.2025.11257457"},"language":"en","primary_location":{"id":"doi:10.1109/wimob66857.2025.11257457","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106637900","display_name":"Farah-Emma Braiteh","orcid":"https://orcid.org/0009-0004-9025-3614"},"institutions":[{"id":"https://openalex.org/I1301102746","display_name":"Renault (France)","ror":"https://ror.org/04v98kq37","country_code":"FR","type":"company","lineage":["https://openalex.org/I1301102746"]},{"id":"https://openalex.org/I4210145913","display_name":"Laboratoire Amp\u00e8re","ror":"https://ror.org/04xbczw40","country_code":"FR","type":"facility","lineage":["https://openalex.org/I100532134","https://openalex.org/I112936343","https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I4210095849","https://openalex.org/I4210145913","https://openalex.org/I48430043"]},{"id":"https://openalex.org/I3018083178","display_name":"Institut de Recherche Technologique SystemX","ror":"https://ror.org/03crmsn52","country_code":"FR","type":"facility","lineage":["https://openalex.org/I3018083178"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Farah-Emma Braiteh","raw_affiliation_strings":["AST, Renault Group","C2 - Cybers\u00e9curit\u00e9 et Cryptographie (T\u00e9l\u00e9com Paris 19 Place Marguerite Perey 91120 PALAISEAU. \r\nFusion de: CCN, Cybersecurity for Communication and Networking et de MC2, Math\u00e9matiques discr\u00e8tes, Codage et Cryptographie - France)","Ampere Software Technology (1 Av. du Golf, 78280 Guyancourt, France - France)","IRT SystemX (Institut de recherche technologique SystemX - 8 Avenue de la Vauve, 91120 Palaiseau - France)"],"affiliations":[{"raw_affiliation_string":"AST, Renault Group","institution_ids":["https://openalex.org/I1301102746"]},{"raw_affiliation_string":"C2 - Cybers\u00e9curit\u00e9 et Cryptographie (T\u00e9l\u00e9com Paris 19 Place Marguerite Perey 91120 PALAISEAU. \r\nFusion de: CCN, Cybersecurity for Communication and Networking et de MC2, Math\u00e9matiques discr\u00e8tes, Codage et Cryptographie - France)","institution_ids":[]},{"raw_affiliation_string":"Ampere Software Technology (1 Av. du Golf, 78280 Guyancourt, France - France)","institution_ids":["https://openalex.org/I4210145913"]},{"raw_affiliation_string":"IRT SystemX (Institut de recherche technologique SystemX - 8 Avenue de la Vauve, 91120 Palaiseau - France)","institution_ids":["https://openalex.org/I3018083178"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060141181","display_name":"Francesca Bassi","orcid":"https://orcid.org/0000-0002-9630-6893"},"institutions":[{"id":"https://openalex.org/I3018083178","display_name":"Institut de Recherche Technologique SystemX","ror":"https://ror.org/03crmsn52","country_code":"FR","type":"facility","lineage":["https://openalex.org/I3018083178"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Francesca Bassi","raw_affiliation_strings":["IRT SystemX","IRT SystemX (Institut de recherche technologique SystemX - 8 Avenue de la Vauve, 91120 Palaiseau - France)"],"affiliations":[{"raw_affiliation_string":"IRT SystemX","institution_ids":["https://openalex.org/I3018083178"]},{"raw_affiliation_string":"IRT SystemX (Institut de recherche technologique SystemX - 8 Avenue de la Vauve, 91120 Palaiseau - France)","institution_ids":["https://openalex.org/I3018083178"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102979854","display_name":"Rida Khatoun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rida Khatoun","raw_affiliation_strings":["T&#x00E9;l&#x00E9;com Paris","C2 - Cybers\u00e9curit\u00e9 et Cryptographie (T\u00e9l\u00e9com Paris 19 Place Marguerite Perey 91120 PALAISEAU. \r\nFusion de: CCN, Cybersecurity for Communication and Networking et de MC2, Math\u00e9matiques discr\u00e8tes, Codage et Cryptographie - France)"],"affiliations":[{"raw_affiliation_string":"T&#x00E9;l&#x00E9;com Paris","institution_ids":[]},{"raw_affiliation_string":"C2 - Cybers\u00e9curit\u00e9 et Cryptographie (T\u00e9l\u00e9com Paris 19 Place Marguerite Perey 91120 PALAISEAU. \r\nFusion de: CCN, Cybersecurity for Communication and Networking et de MC2, Math\u00e9matiques discr\u00e8tes, Codage et Cryptographie - France)","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5106637900"],"corresponding_institution_ids":["https://openalex.org/I1301102746","https://openalex.org/I3018083178","https://openalex.org/I4210145913"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34787997,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.31049999594688416,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.31049999594688416,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.29580000042915344,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.09399999678134918,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/platoon","display_name":"Platoon","score":0.9693999886512756},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6930000185966492},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6474999785423279},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5115000009536743},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.483599990606308},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4368000030517578},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4334999918937683},{"id":"https://openalex.org/keywords/intelligent-transportation-system","display_name":"Intelligent transportation system","score":0.427700012922287}],"concepts":[{"id":"https://openalex.org/C2777735972","wikidata":"https://www.wikidata.org/wiki/Q1061967","display_name":"Platoon","level":3,"score":0.9693999886512756},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7204999923706055},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6930000185966492},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6474999785423279},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6082000136375427},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5115000009536743},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.483599990606308},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4553000032901764},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4368000030517578},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4334999918937683},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.427700012922287},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3449000120162964},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.3203999996185303},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.31630000472068787},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.290800005197525},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.2791999876499176},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.26589998602867126},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.26440000534057617}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wimob66857.2025.11257457","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-05239247v1","is_oa":false,"landing_page_url":"https://hal.science/hal-05239247","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE 21st International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2025, Marrakesh, Morocco","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Cooperative":[0,24],"vehicular":[1],"platoons":[2],"improve":[3],"road":[4],"safety":[5],"and":[6,42,93,105],"reduce":[7],"congestion":[8],"through":[9],"synchronized":[10],"maneuvers":[11],"enabled":[12],"by":[13,74],"Vehicle-to-Vehicle":[14],"(V2V)":[15],"communication.":[16],"Vehicles":[17],"are":[18],"authenticated":[19],"using":[20,112,119],"certificates":[21],"from":[22,71],"the":[23,55,113,123],"Intelligent":[25],"Transport":[26],"Systems":[27],"(C-ITS)":[28],"Public":[29],"Key":[30],"Infrastructure":[31],"(PKI).":[32],"Short-term":[33],"certificates,":[34],"serving":[35],"as":[36,52,65],"vehicle":[37],"identifiers,":[38],"change":[39],"over":[40],"time":[41],"distance,":[43],"which":[44],"may":[45],"lead":[46],"to":[47],"legitimate":[48],"members":[49],"being":[50],"misidentified":[51],"attackers":[53],"in":[54,58,126],"platoon,":[56],"resulting":[57],"false":[59],"positives.":[60],"Additionally,":[61],"sensitive":[62],"data,":[63],"such":[64],"platoon":[66,108,128],"IDs,":[67],"must":[68],"be":[69],"protected":[70],"impersonation":[72],"attacks":[73],"external":[75],"vehicles.":[76],"To":[77],"address":[78],"these":[79],"challenges,":[80],"we":[81],"propose":[82],"a":[83],"secure":[84],"group":[85],"key-based":[86],"authentication":[87,104],"framework":[88],"that":[89],"uses":[90],"post-quantum":[91],"cryptography":[92],"Shamir's":[94],"Secret":[95],"Sharing":[96],"for":[97],"key":[98],"exchange.":[99],"This":[100],"ensures":[101],"accurate":[102],"member":[103],"protection":[106],"of":[107],"data.":[109],"Security":[110],"analysis":[111],"Scyther":[114],"tool":[115],"along":[116],"with":[117],"simulations":[118],"PLEXE":[120],"simulator":[121],"demonstrate":[122],"protocol's":[124],"effectiveness":[125],"securing":[127],"operations":[129],"against":[130],"cyber":[131],"threats.":[132]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
