{"id":"https://openalex.org/W2050668170","doi":"https://doi.org/10.4018/jbdcn.2010040101","title":"Distributed Trust Based Authentication Scheme in a Clustered Environment Using Threshold Cryptography for Vehicular Ad Hoc Network","display_name":"Distributed Trust Based Authentication Scheme in a Clustered Environment Using Threshold Cryptography for Vehicular Ad Hoc Network","publication_year":2010,"publication_date":"2010-04-01","ids":{"openalex":"https://openalex.org/W2050668170","doi":"https://doi.org/10.4018/jbdcn.2010040101","mag":"2050668170"},"language":"en","primary_location":{"id":"doi:10.4018/jbdcn.2010040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jbdcn.2010040101","pdf_url":null,"source":{"id":"https://openalex.org/S108454011","display_name":"International Journal of Business Data Communications and Networking","issn_l":"1548-0631","issn":["1548-0631","1548-064X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Business Data Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003753231","display_name":"S. Sivagurunathan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S. Sivagurunathan","raw_affiliation_strings":["Thiagarajar College of Engineering, India","Thiagarajar College of Engineering , India"],"affiliations":[{"raw_affiliation_string":"Thiagarajar College of Engineering, India","institution_ids":[]},{"raw_affiliation_string":"Thiagarajar College of Engineering , India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033521740","display_name":"Vamshi Sunku Mohan","orcid":"https://orcid.org/0000-0003-3083-4738"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"V. Mohan","raw_affiliation_strings":["Thiagarajar College of Engineering, India","Thiagarajar College of Engineering , India"],"affiliations":[{"raw_affiliation_string":"Thiagarajar College of Engineering, India","institution_ids":[]},{"raw_affiliation_string":"Thiagarajar College of Engineering , India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075626021","display_name":"P. Subathra","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"P. Subathra","raw_affiliation_strings":["Thiagarajar College of Engineering, India","Thiagarajar College of Engineering , India"],"affiliations":[{"raw_affiliation_string":"Thiagarajar College of Engineering, India","institution_ids":[]},{"raw_affiliation_string":"Thiagarajar College of Engineering , India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003753231"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.25795944,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.62626368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"6","issue":"2","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8377524614334106},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.8005059957504272},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.7450597882270813},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7362982034683228},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.6716125011444092},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6504659652709961},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5109666585922241},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4761124551296234},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.4710637927055359},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4572853446006775},{"id":"https://openalex.org/keywords/ad-hoc-wireless-distribution-service","display_name":"Ad hoc wireless distribution service","score":0.450596421957016},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.3976953625679016},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35074013471603394},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.3006182312965393},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.17716795206069946},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0984049141407013}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8377524614334106},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.8005059957504272},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.7450597882270813},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7362982034683228},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.6716125011444092},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6504659652709961},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5109666585922241},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4761124551296234},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.4710637927055359},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4572853446006775},{"id":"https://openalex.org/C190526755","wikidata":"https://www.wikidata.org/wiki/Q4678071","display_name":"Ad hoc wireless distribution service","level":5,"score":0.450596421957016},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3976953625679016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35074013471603394},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.3006182312965393},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.17716795206069946},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0984049141407013},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jbdcn.2010040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jbdcn.2010040101","pdf_url":null,"source":{"id":"https://openalex.org/S108454011","display_name":"International Journal of Business Data Communications and Networking","issn_l":"1548-0631","issn":["1548-0631","1548-064X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Business Data Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jbdcn0:v:6:y:2010:i:2:p:1-18","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jbdcn.2010040101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W108080453","https://openalex.org/W1482700972","https://openalex.org/W1635570947","https://openalex.org/W1655990431","https://openalex.org/W1867048327","https://openalex.org/W1981663184","https://openalex.org/W2006921752","https://openalex.org/W2034679925","https://openalex.org/W2104313668","https://openalex.org/W2105081458","https://openalex.org/W2109754121","https://openalex.org/W2113928343","https://openalex.org/W2117752968","https://openalex.org/W2122777668","https://openalex.org/W2124534579","https://openalex.org/W2124957585","https://openalex.org/W2129257011","https://openalex.org/W2130056156","https://openalex.org/W2130194975","https://openalex.org/W2131840671","https://openalex.org/W2137469879","https://openalex.org/W2141420453","https://openalex.org/W2145872061","https://openalex.org/W2153098630","https://openalex.org/W2163533836","https://openalex.org/W2912577494","https://openalex.org/W3112127769","https://openalex.org/W4245079094","https://openalex.org/W4252410764","https://openalex.org/W6604389750","https://openalex.org/W6862240463"],"related_works":["https://openalex.org/W2768875466","https://openalex.org/W2534426475","https://openalex.org/W3135686529","https://openalex.org/W1932298562","https://openalex.org/W2181759599","https://openalex.org/W2060613440","https://openalex.org/W2187251449","https://openalex.org/W2153465785","https://openalex.org/W2348856842","https://openalex.org/W1763174282"],"abstract_inverted_index":{"A":[0,124],"Vehicular":[1,44],"Ad-Hoc":[2,11],"Network,":[3],"or":[4],"VANET,":[5],"is":[6,115,128,154,165],"a":[7,29,50,64,69,83,90,161],"form":[8],"of":[9,43,52,102,113,121,132,172],"Mobile":[10],"Network":[12],"to":[13,55,135],"provide":[14],"communications":[15],"among":[16],"nearby":[17,23],"vehicles":[18,21,104],"and":[19,22,92,139],"between":[20,35],"fixed":[24],"equipments.":[25],"Security":[26],"has":[27],"become":[28],"prime":[30],"concern":[31],"in":[32,146,159],"providing":[33],"communication":[34],"these":[36],"vehicles.":[37],"Unlike":[38],"wired":[39],"networks,":[40],"the":[41,61,99,103,108,133,147,150],"characteristics":[42],"Ad":[45],"Hoc":[46],"Networks":[47,78],"(VANETs)":[48],"pose":[49],"number":[51,171],"non-trivial":[53],"challenges":[54],"security":[56,66],"design.":[57],"In":[58],"this":[59],"paper,":[60],"authors":[62],"present":[63],"threshold":[65,125],"mechanism":[67],"with":[68,107],"mobility":[70,120],"based":[71,117],"Clustering":[72],"for":[73],"Open":[74],"Inter":[75],"Vehicle":[76],"Communication":[77],"(COIN).":[79],"Nodes":[80],"that":[81,163],"have":[82],"similar":[84],"moving":[85,100],"pattern":[86,101],"are":[87],"grouped":[88],"into":[89,105,156],"cluster,":[91],"unlike":[93],"other":[94],"clustering":[95],"algorithms,":[96],"it":[97],"takes":[98],"consideration":[106],"driver\u2019s":[109],"intention.":[110],"The":[111],"stability":[112],"clusters":[114,134],"estimated":[116],"on":[118,130],"relative":[119],"cluster":[122],"members.":[123],"cryptographic":[126],"scheme":[127],"employed":[129],"top":[131],"protect":[136],"routing":[137],"information":[138],"data":[140],"traffic.":[141],"To":[142],"ensure":[143],"distributed":[144],"trust":[145],"clustered":[148],"environment,":[149],"private":[151],"key":[152],"(k)":[153],"divided":[155],"n":[157],"pieces":[158],"such":[160],"way":[162],"k":[164],"easily":[166],"reconstructable":[167],"from":[168],"any":[169],"p":[170],"pieces.":[173]},"counts_by_year":[{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
