{"id":"https://openalex.org/W4283381757","doi":"https://doi.org/10.1177/15501329221104332","title":"A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles","display_name":"A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles","publication_year":2022,"publication_date":"2022-06-01","ids":{"openalex":"https://openalex.org/W4283381757","doi":"https://doi.org/10.1177/15501329221104332"},"language":"en","primary_location":{"id":"doi:10.1177/15501329221104332","is_oa":true,"landing_page_url":"https://doi.org/10.1177/15501329221104332","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1177/15501329221104332","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102978190","display_name":"Zhen Li","orcid":"https://orcid.org/0000-0002-4329-9212"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Li","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044435125","display_name":"Qingkai Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingkai Miao","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047048551","display_name":"Shehzad Ashraf Chaudhry","orcid":"https://orcid.org/0000-0002-9321-6956"},"institutions":[{"id":"https://openalex.org/I4210091267","display_name":"\u0130stanbul Geli\u015fim \u00dcniversitesi","ror":"https://ror.org/0188hvh39","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210091267"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Shehzad Ashraf Chaudhry","raw_affiliation_strings":["Istanbul Gelisim University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Istanbul Gelisim University, Istanbul, Turkey","institution_ids":["https://openalex.org/I4210091267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068618830","display_name":"Chien\u2010Ming Chen","orcid":"https://orcid.org/0000-0002-6502-472X"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chien-Ming Chen","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068618830"],"corresponding_institution_ids":["https://openalex.org/I80143920"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":3.7864,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.94037928,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"18","issue":"6","first_page":"155013292211043","last_page":"155013292211043"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8325988054275513},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7639241218566895},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5943505167961121},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5843930244445801},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5765533447265625},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5354599952697754},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5019004344940186},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47858214378356934},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.4249371886253357},{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.4215732216835022},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3278530240058899},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2751384973526001},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.24731630086898804},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.18794715404510498},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.17762607336044312},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10834306478500366}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8325988054275513},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7639241218566895},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5943505167961121},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5843930244445801},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5765533447265625},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5354599952697754},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5019004344940186},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47858214378356934},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.4249371886253357},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.4215732216835022},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3278530240058899},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2751384973526001},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.24731630086898804},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.18794715404510498},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.17762607336044312},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10834306478500366},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1177/15501329221104332","is_oa":true,"landing_page_url":"https://doi.org/10.1177/15501329221104332","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:18:y:2022:i:6:p:15501329221104332","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1177/15501329221104332","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:71cf952441d64b4b9acd50871515c6c2","is_oa":true,"landing_page_url":"https://doaj.org/article/71cf952441d64b4b9acd50871515c6c2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 18 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1177/15501329221104332","is_oa":true,"landing_page_url":"https://doi.org/10.1177/15501329221104332","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1969907290","https://openalex.org/W2024338241","https://openalex.org/W2026892459","https://openalex.org/W2029693536","https://openalex.org/W2105114022","https://openalex.org/W2110753472","https://openalex.org/W2157646602","https://openalex.org/W2270252744","https://openalex.org/W2584343393","https://openalex.org/W2605270919","https://openalex.org/W2734150319","https://openalex.org/W2768513834","https://openalex.org/W2805161995","https://openalex.org/W2807218948","https://openalex.org/W2920780305","https://openalex.org/W2953707968","https://openalex.org/W3021638025","https://openalex.org/W3036515778","https://openalex.org/W3104953546","https://openalex.org/W3129844607","https://openalex.org/W3163508094","https://openalex.org/W3206730185","https://openalex.org/W4236524736","https://openalex.org/W4244218861","https://openalex.org/W4248427106"],"related_works":["https://openalex.org/W2363600212","https://openalex.org/W2736044769","https://openalex.org/W2963069143","https://openalex.org/W2364805998","https://openalex.org/W2619897385","https://openalex.org/W106082050","https://openalex.org/W2043851470","https://openalex.org/W2399882206","https://openalex.org/W2482813613","https://openalex.org/W3201780008"],"abstract_inverted_index":{"The":[0,16],"Internet":[1,18,31,78],"of":[2,19,29,32,68,76,79],"vehicles":[3,20,33],"technology":[4],"has":[5,12],"developed":[6],"rapidly":[7],"in":[8,47],"recent":[9],"years":[10],"and":[11,24,34,73,125,144,155,159],"become":[13],"increasingly":[14],"important.":[15],"social":[17,48,89],"provides":[21,35],"better":[22,36],"resources":[23],"services":[25],"for":[26,38],"the":[27,30,53,57,65,77],"development":[28],"experience":[37],"users.":[39],"However,":[40,109],"there":[41],"are":[42,116],"still":[43],"many":[44],"security":[45,62,91,102,143],"problems":[46],"vehicle":[49,54,88],"networking":[50],"environments.":[51],"Once":[52],"is":[55,60],"networked,":[56],"biggest":[58],"problem":[59],"data":[61,69],"according":[63],"to":[64,118,138],"three":[66],"levels":[67],"collection,":[70],"intelligent":[71],"analysis,":[72],"decision":[74],"control":[75],"vehicles.":[80],"Recently,":[81],"Wu":[82],"et":[83],"al.":[84],"proposed":[85],"a":[86,135],"lightweight":[87],"network":[90],"authentication":[92,103,114],"protocol":[93,104,137,150],"based":[94],"on":[95],"fog":[96],"nodes.":[97],"They":[98],"claimed":[99],"that":[100,112,148],"their":[101,113],"could":[105],"resist":[106],"various":[107],"attacks.":[108],"we":[110,133],"found":[111],"protocols":[115],"vulnerable":[117],"internal":[119],"attacks,":[120,124],"smart":[121],"card":[122],"theft":[123],"lack":[126],"perfect":[127],"forward":[128],"security.":[129],"In":[130],"this":[131],"study,":[132],"propose":[134],"new":[136],"overcome":[139],"these":[140,153],"limitations.":[141],"Finally,":[142],"performance":[145,158],"analyses":[146],"show":[147],"our":[149],"perfectly":[151],"overcomes":[152],"limitations":[154],"exhibits":[156],"excellent":[157],"efficiency.":[160]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":5}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
