Secure Message Communication Protocol Among Vehicles in Smart City

Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to compromise the confidentiality, integrity, and authenticity of messages exchanged between different vehicles. To ensure secure message communicat...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on vehicular technology Jg. 67; H. 5; S. 4359 - 4373
Hauptverfasser: Dua, Amit, Kumar, Neeraj, Das, Ashok Kumar, Susilo, Willy
Format: Journal Article
Sprache:Englisch
Veröffentlicht: New York IEEE 01.05.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Schlagworte:
ISSN:0018-9545, 1939-9359
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to compromise the confidentiality, integrity, and authenticity of messages exchanged between different vehicles. To ensure secure message communication among the vehicles in a smart city environment, a novel scheme using elliptic curve cryptographic (ECC) technique has been presented in this paper. For this purpose, a two-level authentication key exchange scheme has been designed. In the first level authentication, <inline-formula><tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s are verified by series of messages exchanged between <inline-formula><tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s and the <inline-formula><tex-math notation="LaTeX">\text{CA}</tex-math></inline-formula>. The verified <inline-formula> <tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s are responsible for authentication of vehicles in the second level authentication, followed by exchange of messages between <inline-formula><tex-math notation="LaTeX"> \text{CH}</tex-math></inline-formula> and vehicle. The security analysis using widely accepted Burrows-Abadi-Needham logic, formal security analysis using random oracle model and verification using the widely known automated validation of Internet security protocols and applications (AVISPA) tool, and also the informal security analysis have been done with respect to various types of attacks. Moreover, a comparative analysis of the proposed scheme with existing related schemes reveals that it generates low overhead and latency, and high reliability during messages exchange between vehicles and the <inline-formula><tex-math notation="LaTeX">\text{CA}</tex-math> </inline-formula>.
AbstractList Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to compromise the confidentiality, integrity, and authenticity of messages exchanged between different vehicles. To ensure secure message communication among the vehicles in a smart city environment, a novel scheme using elliptic curve cryptographic (ECC) technique has been presented in this paper. For this purpose, a two-level authentication key exchange scheme has been designed. In the first level authentication, <inline-formula><tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s are verified by series of messages exchanged between <inline-formula><tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s and the <inline-formula><tex-math notation="LaTeX">\text{CA}</tex-math></inline-formula>. The verified <inline-formula> <tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s are responsible for authentication of vehicles in the second level authentication, followed by exchange of messages between <inline-formula><tex-math notation="LaTeX"> \text{CH}</tex-math></inline-formula> and vehicle. The security analysis using widely accepted Burrows-Abadi-Needham logic, formal security analysis using random oracle model and verification using the widely known automated validation of Internet security protocols and applications (AVISPA) tool, and also the informal security analysis have been done with respect to various types of attacks. Moreover, a comparative analysis of the proposed scheme with existing related schemes reveals that it generates low overhead and latency, and high reliability during messages exchange between vehicles and the <inline-formula><tex-math notation="LaTeX">\text{CA}</tex-math> </inline-formula>.
Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to compromise the confidentiality, integrity, and authenticity of messages exchanged between different vehicles. To ensure secure message communication among the vehicles in a smart city environment, a novel scheme using elliptic curve cryptographic (ECC) technique has been presented in this paper. For this purpose, a two-level authentication key exchange scheme has been designed. In the first level authentication, CH s are verified by series of messages exchanged between CHs and the CA. The verified CHs are responsible for authentication of vehicles in the second level authentication, followed by exchange of messages between CH and vehicle. The security analysis using widely accepted Burrows-Abadi-Needham logic, formal security analysis using random oracle model and verification using the widely known automated validation of Internet security protocols and applications (AVISPA) tool, and also the informal security analysis have been done with respect to various types of attacks. Moreover, a comparative analysis of the proposed scheme with existing related schemes reveals that it generates low overhead and latency, and high reliability during messages exchange between vehicles and the CA.
Author Dua, Amit
Kumar, Neeraj
Susilo, Willy
Das, Ashok Kumar
Author_xml – sequence: 1
  givenname: Amit
  orcidid: 0000-0002-3190-389X
  surname: Dua
  fullname: Dua, Amit
  email: mail.amitdua@gmail.com
  organization: Department of Computer Science and Information Systems, Birla Institute of Technology & Science, Pilani, India
– sequence: 2
  givenname: Neeraj
  orcidid: 0000-0002-3020-3947
  surname: Kumar
  fullname: Kumar, Neeraj
  email: neeraj.kumar@thapar.edu
  organization: Department of Computer Science and Engineering, Thapar University, Patiala, India
– sequence: 3
  givenname: Ashok Kumar
  orcidid: 0000-0002-5196-9589
  surname: Das
  fullname: Das, Ashok Kumar
  email: iitkgp.akdas@gmail.com
  organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India
– sequence: 4
  givenname: Willy
  orcidid: 0000-0002-1562-5105
  surname: Susilo
  fullname: Susilo, Willy
  email: wsusilo@uow.edu.au
  organization: School of Computing and Information Technology, University of Wollongong, Wollongong, Australia
BookMark eNp9UD1PwzAUtFCRaAs7Eksk5hR_xs5YKr6kIpBaulqu4xRXSVxsZ-i_x6UVAwPT0zvdvXd3IzDoXGcAuEZwghAs75ar5QRDxCeYC4gEOQNDVJIyLwkrB2AIE5aXjLILMAphm1ZKSzQE9wuje2-yVxOC2phs5tq276xW0boue_cuOu2abNq6bpOtzKfVjQmZ7bJFq3zMZjbuL8F5rZpgrk5zDD4eH5az53z-9vQym85zjUsUc4UVqYRiBaSYCcN1VVOOa0IrQQtdrHGRLOqqwpxDhivBEsSZwqgu1roSgozB7fHuzruv3oQot673XXopMeKUQQLZgVUcWdq7ELyppbbxJ030yjYSQXnoS6a-5KEveeorCeEf4c7bFHL_n-TmKLHGmF-6QIInO-QboOV2gg
CODEN ITVTAB
CitedBy_id crossref_primary_10_1155_2021_7705843
crossref_primary_10_1016_j_comcom_2021_01_023
crossref_primary_10_1038_s41598_025_04035_y
crossref_primary_10_3390_math11092085
crossref_primary_10_3390_electronics13163136
crossref_primary_10_1109_TVT_2021_3078806
crossref_primary_10_1109_ACCESS_2022_3197672
crossref_primary_10_1109_ACCESS_2019_2960412
crossref_primary_10_1109_JIOT_2021_3050331
crossref_primary_10_1109_ACCESS_2019_2926578
crossref_primary_10_1016_j_iot_2024_101469
crossref_primary_10_3390_s24020368
crossref_primary_10_1016_j_cose_2021_102483
crossref_primary_10_1007_s00607_021_01041_6
crossref_primary_10_1007_s10586_025_05398_7
crossref_primary_10_1109_ACCESS_2020_2975615
crossref_primary_10_1002_cpe_7979
crossref_primary_10_1109_ACCESS_2023_3285630
crossref_primary_10_1109_TVT_2022_3176755
crossref_primary_10_1109_ACCESS_2019_2921399
crossref_primary_10_1109_TDSC_2018_2828306
crossref_primary_10_1109_JSEN_2020_3012294
crossref_primary_10_3390_s21113902
crossref_primary_10_1016_j_csa_2022_100001
crossref_primary_10_1109_JIOT_2023_3332947
crossref_primary_10_1109_TVT_2020_2994144
crossref_primary_10_1109_ACCESS_2020_2981397
crossref_primary_10_1109_TVT_2021_3050614
crossref_primary_10_3390_en16010008
crossref_primary_10_1016_j_pmcj_2019_101041
crossref_primary_10_1109_ACCESS_2018_2844190
crossref_primary_10_1109_JIOT_2021_3050676
crossref_primary_10_3390_healthcare9091114
crossref_primary_10_3390_app122412948
crossref_primary_10_3390_electronics13081418
crossref_primary_10_1109_ACCESS_2019_2903597
crossref_primary_10_3390_drones8090468
crossref_primary_10_1155_2021_6577492
crossref_primary_10_3390_s23073543
crossref_primary_10_1016_j_scs_2024_105717
crossref_primary_10_1109_TVT_2021_3051258
crossref_primary_10_1109_ACCESS_2020_2967777
crossref_primary_10_1109_TII_2023_3257294
crossref_primary_10_1109_ACCESS_2020_3022778
crossref_primary_10_1109_JIOT_2020_3040938
crossref_primary_10_1049_iet_its_2019_0855
crossref_primary_10_3390_s19143165
crossref_primary_10_1007_s10586_025_05293_1
crossref_primary_10_1109_ACCESS_2018_2854798
crossref_primary_10_1109_TVT_2021_3121449
crossref_primary_10_1109_ACCESS_2018_2853985
crossref_primary_10_1109_TNSE_2022_3142287
crossref_primary_10_1002_cpe_5734
crossref_primary_10_1109_JSYST_2019_2921798
crossref_primary_10_1109_ACCESS_2019_2920763
crossref_primary_10_3390_s23073433
crossref_primary_10_1016_j_patrec_2020_08_017
crossref_primary_10_1016_j_comcom_2022_10_016
crossref_primary_10_1007_s12083_022_01297_5
crossref_primary_10_1109_TITS_2023_3306547
crossref_primary_10_1371_journal_pone_0307867
crossref_primary_10_1109_ACCESS_2020_3046999
crossref_primary_10_1088_1742_6596_2176_1_012012
crossref_primary_10_1016_j_cose_2022_102610
crossref_primary_10_1109_ACCESS_2021_3050402
crossref_primary_10_1109_JIOT_2019_2937315
crossref_primary_10_1109_JSAC_2020_2986617
crossref_primary_10_1007_s11277_022_09658_2
crossref_primary_10_3390_network2010010
crossref_primary_10_1109_JIOT_2022_3150842
crossref_primary_10_1109_JSEN_2020_3009382
crossref_primary_10_1109_TMC_2023_3288930
crossref_primary_10_1109_TVT_2021_3138203
crossref_primary_10_3390_electronics13040730
crossref_primary_10_1109_TITS_2023_3266030
crossref_primary_10_1109_TII_2020_3012166
crossref_primary_10_1155_int_2539516
crossref_primary_10_1109_TCE_2024_3391667
crossref_primary_10_1016_j_compeleceng_2021_107669
crossref_primary_10_3390_sym17081350
crossref_primary_10_1016_j_jisa_2021_102769
crossref_primary_10_1109_ACCESS_2020_3002558
crossref_primary_10_1109_JIOT_2020_3049003
crossref_primary_10_1109_TIFS_2020_3044855
crossref_primary_10_1109_TITS_2019_2899321
crossref_primary_10_1109_ACCESS_2021_3099489
crossref_primary_10_1109_TMC_2021_3056712
crossref_primary_10_1109_ACCESS_2018_2827027
crossref_primary_10_32604_cmc_2022_031490
crossref_primary_10_1109_JIOT_2022_3186921
crossref_primary_10_1002_ett_4822
crossref_primary_10_1016_j_sysarc_2020_101877
crossref_primary_10_1109_TITS_2021_3058385
crossref_primary_10_1109_TVT_2021_3106665
crossref_primary_10_1016_j_phycom_2025_102623
crossref_primary_10_1016_j_seta_2021_101130
crossref_primary_10_1109_TNSM_2020_3042526
crossref_primary_10_1155_2021_9991535
crossref_primary_10_1016_j_jpdc_2022_10_002
crossref_primary_10_1155_2023_1044282
crossref_primary_10_1109_TDSC_2019_2909890
crossref_primary_10_1016_j_iot_2020_100355
crossref_primary_10_1109_JIOT_2019_2923611
crossref_primary_10_1109_ACCESS_2024_3450313
crossref_primary_10_1109_TVT_2023_3247180
crossref_primary_10_1109_TMC_2021_3079984
crossref_primary_10_1109_TVT_2023_3341693
crossref_primary_10_1016_j_compeleceng_2021_107409
crossref_primary_10_1109_ACCESS_2018_2890389
crossref_primary_10_1109_ACCESS_2020_3012411
crossref_primary_10_1155_2022_6304927
crossref_primary_10_1002_cpe_6187
crossref_primary_10_3390_app132011323
crossref_primary_10_1109_ACCESS_2019_2931217
crossref_primary_10_1016_j_compeleceng_2023_108778
crossref_primary_10_1109_TVT_2020_3038834
crossref_primary_10_1109_TDSC_2021_3135016
crossref_primary_10_1109_ACCESS_2019_2958356
crossref_primary_10_3390_bdcc8090095
crossref_primary_10_1109_ACCESS_2024_3488570
crossref_primary_10_1007_s11227_020_03160_x
crossref_primary_10_1109_TMC_2024_3412106
crossref_primary_10_1109_TNSE_2021_3093435
crossref_primary_10_1109_TVT_2020_3003806
crossref_primary_10_1007_s11042_022_12946_5
crossref_primary_10_1007_s40747_021_00555_y
crossref_primary_10_1016_j_comcom_2020_12_005
crossref_primary_10_1109_ACCESS_2021_3050038
crossref_primary_10_1109_TVT_2019_2917776
Cites_doi 10.1016/j.jnca.2012.07.002
10.1109/TWC.2015.2473165
10.1109/TITS.2011.2156790
10.1109/TITS.2016.2579162
10.1016/j.inffus.2011.01.001
10.1049/iet-cdt.2012.0073
10.1109/ISWPC.2013.6707447
10.1109/TST.2016.7787005
10.1007/s12083-014-0324-9
10.1016/j.jss.2011.06.061
10.1016/j.pmcj.2015.08.001
10.1109/MCOM.2013.6525605
10.1109/TVT.2009.2038222
10.1007/3-540-44647-8_21
10.1007/978-3-540-30580-4_6
10.1007/s10916-015-0335-y
10.1007/11535218_33
10.1109/TVT.2012.2197031
10.1109/TC.2015.2485225
10.1145/1880022.1880027
10.1109/TC.2002.1004593
10.1109/iMac4s.2013.6526427
10.1109/ComComAp.2012.6154869
10.1109/TSG.2016.2602282
10.1109/TVT.2014.2344633
10.1109/TIFS.2015.2439964
10.1007/s12083-015-0409-0
10.1109/TCE.2016.7448560
10.1007/s10623-005-6344-y
10.1007/3-540-46035-7_22
10.1109/TDSC.2016.2616876
10.1007/3-540-44987-6_28
10.1109/ACCESS.2017.2676119
10.1109/TITS.2016.2634623
10.1109/TIT.1983.1056650
10.1109/TPDS.2014.2308215
10.1007/s11227-015-1601-y
10.1109/IPDPS.2011.42
10.1109/TIFS.2017.2730479
10.1007/3-540-39568-7_5
10.1109/CITS.2016.7546385
10.1145/77648.77649
10.1109/TVT.2013.2238566
10.1109/MWC.2010.5601954
10.1109/TIFS.2015.2473820
10.1109/ACCESS.2016.2596292
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
FR3
KR7
L7M
DOI 10.1109/TVT.2017.2780183
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Engineering Research Database
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Civil Engineering Abstracts
Engineering Research Database
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList
Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-9359
EndPage 4373
ExternalDocumentID 10_1109_TVT_2017_2780183
8187745
Genre orig-research
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAIKC
AAJGR
AAMNW
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
RXW
TAE
TN5
VH1
AAYXX
CITATION
7SP
8FD
FR3
KR7
L7M
RIG
ID FETCH-LOGICAL-c291t-a2a3d8a5604258e7cdf472f34d846c6b26018cdd277052d856b275a21f6bcd883
IEDL.DBID RIE
ISICitedReferencesCount 136
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000432310500053&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0018-9545
IngestDate Mon Jun 30 10:12:54 EDT 2025
Tue Nov 18 22:18:36 EST 2025
Sat Nov 29 02:18:27 EST 2025
Wed Aug 27 02:50:32 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-a2a3d8a5604258e7cdf472f34d846c6b26018cdd277052d856b275a21f6bcd883
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-3020-3947
0000-0002-3190-389X
0000-0002-1562-5105
0000-0002-5196-9589
PQID 2174503058
PQPubID 85454
PageCount 15
ParticipantIDs crossref_citationtrail_10_1109_TVT_2017_2780183
proquest_journals_2174503058
crossref_primary_10_1109_TVT_2017_2780183
ieee_primary_8187745
PublicationCentury 2000
PublicationDate 2018-05-01
PublicationDateYYYYMMDD 2018-05-01
PublicationDate_xml – month: 05
  year: 2018
  text: 2018-05-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on vehicular technology
PublicationTitleAbbrev TVT
PublicationYear 2018
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref56
ref12
behrisch (ref49) 0
ref15
ref53
ref52
ref11
ref10
ref17
ref16
ref19
ref18
rhee (ref14) 2011
ref50
von oheimb (ref42) 2005
ref46
ref45
ref47
ref44
ref43
(ref48) 2017
ref8
(ref31) 1995
ref7
ref9
ref4
ref3
ref6
ref5
bellare (ref29) 1994
ref40
ref34
ref37
ref36
li (ref51) 2015; 26
ref30
ref33
ref32
he (ref54) 2012; 13
ref2
ref1
ref39
ref38
paar (ref41) 2009
ref24
lin (ref13) 2015
ref23
ref26
ref25
ref20
ref22
ref21
(ref35) 2016
ref28
ref27
ray (ref55) 2012; 1
References_xml – year: 2009
  ident: ref41
  publication-title: Understanding Cryptography A Textbook for Students and Practitioners
– ident: ref26
  doi: 10.1016/j.jnca.2012.07.002
– start-page: 1
  year: 2005
  ident: ref42
  article-title: The high-level protocol specification language HLPSL developed in the EU project AVISPA
  publication-title: Proc 3rd APPSEM II Workshop Appl Semantics (APPSEM)
– ident: ref36
  doi: 10.1109/TWC.2015.2473165
– ident: ref18
  doi: 10.1109/TITS.2011.2156790
– ident: ref15
  doi: 10.1109/TITS.2016.2579162
– start-page: 232
  year: 1994
  ident: ref29
  publication-title: Entity Authentication and Key Distribution
– volume: 13
  start-page: 223
  year: 2012
  ident: ref54
  article-title: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
  publication-title: Inf Fusion
  doi: 10.1016/j.inffus.2011.01.001
– ident: ref52
  doi: 10.1049/iet-cdt.2012.0073
– ident: ref25
  doi: 10.1109/ISWPC.2013.6707447
– ident: ref19
  doi: 10.1109/TST.2016.7787005
– ident: ref44
  doi: 10.1007/s12083-014-0324-9
– ident: ref53
  doi: 10.1016/j.jss.2011.06.061
– ident: ref40
  doi: 10.1016/j.pmcj.2015.08.001
– ident: ref22
  doi: 10.1109/MCOM.2013.6525605
– ident: ref6
  doi: 10.1109/TVT.2009.2038222
– ident: ref12
  doi: 10.1007/3-540-44647-8_21
– ident: ref34
  doi: 10.1007/978-3-540-30580-4_6
– ident: ref3
  doi: 10.1007/s10916-015-0335-y
– ident: ref37
  doi: 10.1007/11535218_33
– ident: ref8
  doi: 10.1109/TVT.2012.2197031
– ident: ref16
  doi: 10.1109/TC.2015.2485225
– ident: ref38
  doi: 10.1145/1880022.1880027
– ident: ref32
  doi: 10.1109/TC.2002.1004593
– volume: 1
  start-page: 1
  year: 2012
  ident: ref55
  article-title: Establishment of ECC-based initial secrecy usable for IKE implementation
  publication-title: Proc World Congress Eng
– year: 2017
  ident: ref48
  article-title: SPAN, the security protocol ANimator for AVISPA
– ident: ref1
  doi: 10.1109/iMac4s.2013.6526427
– ident: ref10
  doi: 10.1109/ComComAp.2012.6154869
– ident: ref30
  doi: 10.1109/TSG.2016.2602282
– start-page: 21
  year: 2015
  ident: ref13
  publication-title: GSIS Group Signature and ID-Based Signature-Based Secure and Privacy-Preserving Protocol
– ident: ref9
  doi: 10.1109/TVT.2014.2344633
– ident: ref43
  doi: 10.1109/TIFS.2015.2439964
– ident: ref2
  doi: 10.1007/s12083-015-0409-0
– ident: ref45
  doi: 10.1109/TCE.2016.7448560
– ident: ref39
  doi: 10.1007/s10623-005-6344-y
– ident: ref24
  doi: 10.1007/3-540-46035-7_22
– ident: ref27
  doi: 10.1109/TDSC.2016.2616876
– ident: ref23
  doi: 10.1007/3-540-44987-6_28
– ident: ref47
  doi: 10.1109/ACCESS.2017.2676119
– ident: ref20
  doi: 10.1109/TITS.2016.2634623
– ident: ref28
  doi: 10.1109/TIT.1983.1056650
– start-page: 456
  year: 2011
  ident: ref14
  article-title: A secure and location assurance protocol for location-aware services in vanets
  publication-title: Proc 5th Int Conf Innov Mobile Internet Services Ubiquitous Comput
– volume: 26
  start-page: 938
  year: 2015
  ident: ref51
  article-title: ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2014.2308215
– ident: ref4
  doi: 10.1007/s11227-015-1601-y
– ident: ref56
  doi: 10.1109/IPDPS.2011.42
– ident: ref21
  doi: 10.1109/TIFS.2017.2730479
– ident: ref11
  doi: 10.1007/3-540-39568-7_5
– ident: ref17
  doi: 10.1109/CITS.2016.7546385
– year: 1995
  ident: ref31
  publication-title: Secure Hash Standard National Institute of Standards and Technology (NIST) U S Department of Commerce FIPS PUB 180-1
– ident: ref33
  doi: 10.1145/77648.77649
– ident: ref5
  doi: 10.1109/TVT.2013.2238566
– ident: ref7
  doi: 10.1109/MWC.2010.5601954
– year: 2016
  ident: ref35
  article-title: Automated validation of internet security protocols and applications
– ident: ref50
  doi: 10.1109/TIFS.2015.2473820
– start-page: 55
  year: 0
  ident: ref49
  article-title: Sumo-simulation of urban mobility: An overview
  publication-title: Proc 3rd Int Conf Adv Syst Simul
– ident: ref46
  doi: 10.1109/ACCESS.2016.2596292
SSID ssj0014491
Score 2.5940847
SecondaryResourceType review_article
Snippet Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 4359
SubjectTerms Authentication
automated validation of Internet security protocols and applications (AVISPA)
Burrows–Abadi–Needham (BAN) logic
Cryptography
Curves
Elliptic curve cryptography
Exchange schemes
Exchanging
formal security
key exchange
Messages
Protocol (computers)
Protocols
Roads
Security
Smart cities
smart city
Vehicles
Title Secure Message Communication Protocol Among Vehicles in Smart City
URI https://ieeexplore.ieee.org/document/8187745
https://www.proquest.com/docview/2174503058
Volume 67
WOSCitedRecordID wos000432310500053&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Xplore
  customDbUrl:
  eissn: 1939-9359
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014491
  issn: 0018-9545
  databaseCode: RIE
  dateStart: 19670101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFH9sw4Me_JridEoOXgS7rUnTJMc5FA86Bs6xW-nyoQNtZev8-02ybjgUwVspCYT3_ZL33g_gUgiliIp4kBIjg4gRFqRpigMTU0wNYRMpPacfWL_Px2MxqMD1uhdGa-2Lz3TLffq3fJXLhbsqa1vnYqMVWoUqY2zZq7V-MYiiEh0vtApsw4LVk2RHtIejoavhYi3MrD3mZMMFeUyVH4bYe5e7vf-dax92yygSdZdsP4CKzg5h59tswTrc-Jt0jR4dxsmLRhudIGgwy4vcygDqOrAhNNKvvjwOTTP09G6lCfVsdH4Ez3e3w959UAImBBKLsAhSnBLFUxvEWE3kmkllIoYNiZSNMmQ8cePDuFQKM9ahWHFqfzGa4tDEE6k4J8dQy_JMnwCiWsbCxES6kVjMpjUhNzYziwkRHEspG9Be0TCR5TRxB2rxlvisoiMSS_XEUT0pqd6Aq_WOj-UkjT_W1h2V1-tKAjeguWJTUqraPHE5FXVmi5_-vusMtrGTCl-l2IRaMVvoc9iSn8V0PrvwUvQFyfnDMw
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFH9BNFEPfqERRe3Bi4kD1q5rd0QiwQiERCTcltF2SqLMwPDvty1jkWhMvC1LmzTv-7XvvR_AdRBISaTHnYjEwvEYYU4URdiJfYppTNhYCMvpDuv1-GgU9Atwm_fCKKVs8Zmqmk_7li8TsTBXZTXtXHS0Qjdgk3oedpfdWvmbgedl-HiuVmEdGKweJetBbTAcmCouVsVMW2RO1pyQRVX5YYqtf2nt_-9kB7CXxZGosWT8IRTU9Ah2v00XLMGdvUtXqGtQTl4UWusFQf1ZkiZaClDDwA2hoXq1BXJoMkVP71qeUFPH58fw3LofNNtOBpngCBy4qRPhiEge6TBG6yJXTMjYYzgmntRxhvDHZoAYF1JixuoUS071L0Yj7Mb-WEjOyQkUp8lUnQKiSvhB7BNhhmIxndi4PNa5mU9IwLEQogy1FQ1Dkc0TN7AWb6HNK-pBqKkeGqqHGdXLcJPv-FjO0vhjbclQOV-XEbgMlRWbwkzZ5qHJqqgxXPzs911XsN0edDth56H3eA472EiIrVmsQDGdLdQFbInPdDKfXVqJ-gIfYsZ6
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Message+Communication+Protocol+Among+Vehicles+in+Smart+City&rft.jtitle=IEEE+transactions+on+vehicular+technology&rft.au=Dua%2C+Amit&rft.au=Kumar%2C+Neeraj&rft.au=Das%2C+Ashok+Kumar&rft.au=Susilo%2C+Willy&rft.date=2018-05-01&rft.pub=IEEE&rft.issn=0018-9545&rft.volume=67&rft.issue=5&rft.spage=4359&rft.epage=4373&rft_id=info:doi/10.1109%2FTVT.2017.2780183&rft.externalDocID=8187745
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9545&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9545&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9545&client=summon