Secure Message Communication Protocol Among Vehicles in Smart City
Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to compromise the confidentiality, integrity, and authenticity of messages exchanged between different vehicles. To ensure secure message communicat...
Gespeichert in:
| Veröffentlicht in: | IEEE transactions on vehicular technology Jg. 67; H. 5; S. 4359 - 4373 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
IEEE
01.05.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Schlagworte: | |
| ISSN: | 0018-9545, 1939-9359 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to compromise the confidentiality, integrity, and authenticity of messages exchanged between different vehicles. To ensure secure message communication among the vehicles in a smart city environment, a novel scheme using elliptic curve cryptographic (ECC) technique has been presented in this paper. For this purpose, a two-level authentication key exchange scheme has been designed. In the first level authentication, <inline-formula><tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s are verified by series of messages exchanged between <inline-formula><tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s and the <inline-formula><tex-math notation="LaTeX">\text{CA}</tex-math></inline-formula>. The verified <inline-formula> <tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s are responsible for authentication of vehicles in the second level authentication, followed by exchange of messages between <inline-formula><tex-math notation="LaTeX"> \text{CH}</tex-math></inline-formula> and vehicle. The security analysis using widely accepted Burrows-Abadi-Needham logic, formal security analysis using random oracle model and verification using the widely known automated validation of Internet security protocols and applications (AVISPA) tool, and also the informal security analysis have been done with respect to various types of attacks. Moreover, a comparative analysis of the proposed scheme with existing related schemes reveals that it generates low overhead and latency, and high reliability during messages exchange between vehicles and the <inline-formula><tex-math notation="LaTeX">\text{CA}</tex-math> </inline-formula>. |
|---|---|
| AbstractList | Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to compromise the confidentiality, integrity, and authenticity of messages exchanged between different vehicles. To ensure secure message communication among the vehicles in a smart city environment, a novel scheme using elliptic curve cryptographic (ECC) technique has been presented in this paper. For this purpose, a two-level authentication key exchange scheme has been designed. In the first level authentication, <inline-formula><tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s are verified by series of messages exchanged between <inline-formula><tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s and the <inline-formula><tex-math notation="LaTeX">\text{CA}</tex-math></inline-formula>. The verified <inline-formula> <tex-math notation="LaTeX">\text{CH}</tex-math></inline-formula> s are responsible for authentication of vehicles in the second level authentication, followed by exchange of messages between <inline-formula><tex-math notation="LaTeX"> \text{CH}</tex-math></inline-formula> and vehicle. The security analysis using widely accepted Burrows-Abadi-Needham logic, formal security analysis using random oracle model and verification using the widely known automated validation of Internet security protocols and applications (AVISPA) tool, and also the informal security analysis have been done with respect to various types of attacks. Moreover, a comparative analysis of the proposed scheme with existing related schemes reveals that it generates low overhead and latency, and high reliability during messages exchange between vehicles and the <inline-formula><tex-math notation="LaTeX">\text{CA}</tex-math> </inline-formula>. Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to compromise the confidentiality, integrity, and authenticity of messages exchanged between different vehicles. To ensure secure message communication among the vehicles in a smart city environment, a novel scheme using elliptic curve cryptographic (ECC) technique has been presented in this paper. For this purpose, a two-level authentication key exchange scheme has been designed. In the first level authentication, CH s are verified by series of messages exchanged between CHs and the CA. The verified CHs are responsible for authentication of vehicles in the second level authentication, followed by exchange of messages between CH and vehicle. The security analysis using widely accepted Burrows-Abadi-Needham logic, formal security analysis using random oracle model and verification using the widely known automated validation of Internet security protocols and applications (AVISPA) tool, and also the informal security analysis have been done with respect to various types of attacks. Moreover, a comparative analysis of the proposed scheme with existing related schemes reveals that it generates low overhead and latency, and high reliability during messages exchange between vehicles and the CA. |
| Author | Dua, Amit Kumar, Neeraj Susilo, Willy Das, Ashok Kumar |
| Author_xml | – sequence: 1 givenname: Amit orcidid: 0000-0002-3190-389X surname: Dua fullname: Dua, Amit email: mail.amitdua@gmail.com organization: Department of Computer Science and Information Systems, Birla Institute of Technology & Science, Pilani, India – sequence: 2 givenname: Neeraj orcidid: 0000-0002-3020-3947 surname: Kumar fullname: Kumar, Neeraj email: neeraj.kumar@thapar.edu organization: Department of Computer Science and Engineering, Thapar University, Patiala, India – sequence: 3 givenname: Ashok Kumar orcidid: 0000-0002-5196-9589 surname: Das fullname: Das, Ashok Kumar email: iitkgp.akdas@gmail.com organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India – sequence: 4 givenname: Willy orcidid: 0000-0002-1562-5105 surname: Susilo fullname: Susilo, Willy email: wsusilo@uow.edu.au organization: School of Computing and Information Technology, University of Wollongong, Wollongong, Australia |
| BookMark | eNp9UD1PwzAUtFCRaAs7Eksk5hR_xs5YKr6kIpBaulqu4xRXSVxsZ-i_x6UVAwPT0zvdvXd3IzDoXGcAuEZwghAs75ar5QRDxCeYC4gEOQNDVJIyLwkrB2AIE5aXjLILMAphm1ZKSzQE9wuje2-yVxOC2phs5tq276xW0boue_cuOu2abNq6bpOtzKfVjQmZ7bJFq3zMZjbuL8F5rZpgrk5zDD4eH5az53z-9vQym85zjUsUc4UVqYRiBaSYCcN1VVOOa0IrQQtdrHGRLOqqwpxDhivBEsSZwqgu1roSgozB7fHuzruv3oQot673XXopMeKUQQLZgVUcWdq7ELyppbbxJ030yjYSQXnoS6a-5KEveeorCeEf4c7bFHL_n-TmKLHGmF-6QIInO-QboOV2gg |
| CODEN | ITVTAB |
| CitedBy_id | crossref_primary_10_1155_2021_7705843 crossref_primary_10_1016_j_comcom_2021_01_023 crossref_primary_10_1038_s41598_025_04035_y crossref_primary_10_3390_math11092085 crossref_primary_10_3390_electronics13163136 crossref_primary_10_1109_TVT_2021_3078806 crossref_primary_10_1109_ACCESS_2022_3197672 crossref_primary_10_1109_ACCESS_2019_2960412 crossref_primary_10_1109_JIOT_2021_3050331 crossref_primary_10_1109_ACCESS_2019_2926578 crossref_primary_10_1016_j_iot_2024_101469 crossref_primary_10_3390_s24020368 crossref_primary_10_1016_j_cose_2021_102483 crossref_primary_10_1007_s00607_021_01041_6 crossref_primary_10_1007_s10586_025_05398_7 crossref_primary_10_1109_ACCESS_2020_2975615 crossref_primary_10_1002_cpe_7979 crossref_primary_10_1109_ACCESS_2023_3285630 crossref_primary_10_1109_TVT_2022_3176755 crossref_primary_10_1109_ACCESS_2019_2921399 crossref_primary_10_1109_TDSC_2018_2828306 crossref_primary_10_1109_JSEN_2020_3012294 crossref_primary_10_3390_s21113902 crossref_primary_10_1016_j_csa_2022_100001 crossref_primary_10_1109_JIOT_2023_3332947 crossref_primary_10_1109_TVT_2020_2994144 crossref_primary_10_1109_ACCESS_2020_2981397 crossref_primary_10_1109_TVT_2021_3050614 crossref_primary_10_3390_en16010008 crossref_primary_10_1016_j_pmcj_2019_101041 crossref_primary_10_1109_ACCESS_2018_2844190 crossref_primary_10_1109_JIOT_2021_3050676 crossref_primary_10_3390_healthcare9091114 crossref_primary_10_3390_app122412948 crossref_primary_10_3390_electronics13081418 crossref_primary_10_1109_ACCESS_2019_2903597 crossref_primary_10_3390_drones8090468 crossref_primary_10_1155_2021_6577492 crossref_primary_10_3390_s23073543 crossref_primary_10_1016_j_scs_2024_105717 crossref_primary_10_1109_TVT_2021_3051258 crossref_primary_10_1109_ACCESS_2020_2967777 crossref_primary_10_1109_TII_2023_3257294 crossref_primary_10_1109_ACCESS_2020_3022778 crossref_primary_10_1109_JIOT_2020_3040938 crossref_primary_10_1049_iet_its_2019_0855 crossref_primary_10_3390_s19143165 crossref_primary_10_1007_s10586_025_05293_1 crossref_primary_10_1109_ACCESS_2018_2854798 crossref_primary_10_1109_TVT_2021_3121449 crossref_primary_10_1109_ACCESS_2018_2853985 crossref_primary_10_1109_TNSE_2022_3142287 crossref_primary_10_1002_cpe_5734 crossref_primary_10_1109_JSYST_2019_2921798 crossref_primary_10_1109_ACCESS_2019_2920763 crossref_primary_10_3390_s23073433 crossref_primary_10_1016_j_patrec_2020_08_017 crossref_primary_10_1016_j_comcom_2022_10_016 crossref_primary_10_1007_s12083_022_01297_5 crossref_primary_10_1109_TITS_2023_3306547 crossref_primary_10_1371_journal_pone_0307867 crossref_primary_10_1109_ACCESS_2020_3046999 crossref_primary_10_1088_1742_6596_2176_1_012012 crossref_primary_10_1016_j_cose_2022_102610 crossref_primary_10_1109_ACCESS_2021_3050402 crossref_primary_10_1109_JIOT_2019_2937315 crossref_primary_10_1109_JSAC_2020_2986617 crossref_primary_10_1007_s11277_022_09658_2 crossref_primary_10_3390_network2010010 crossref_primary_10_1109_JIOT_2022_3150842 crossref_primary_10_1109_JSEN_2020_3009382 crossref_primary_10_1109_TMC_2023_3288930 crossref_primary_10_1109_TVT_2021_3138203 crossref_primary_10_3390_electronics13040730 crossref_primary_10_1109_TITS_2023_3266030 crossref_primary_10_1109_TII_2020_3012166 crossref_primary_10_1155_int_2539516 crossref_primary_10_1109_TCE_2024_3391667 crossref_primary_10_1016_j_compeleceng_2021_107669 crossref_primary_10_3390_sym17081350 crossref_primary_10_1016_j_jisa_2021_102769 crossref_primary_10_1109_ACCESS_2020_3002558 crossref_primary_10_1109_JIOT_2020_3049003 crossref_primary_10_1109_TIFS_2020_3044855 crossref_primary_10_1109_TITS_2019_2899321 crossref_primary_10_1109_ACCESS_2021_3099489 crossref_primary_10_1109_TMC_2021_3056712 crossref_primary_10_1109_ACCESS_2018_2827027 crossref_primary_10_32604_cmc_2022_031490 crossref_primary_10_1109_JIOT_2022_3186921 crossref_primary_10_1002_ett_4822 crossref_primary_10_1016_j_sysarc_2020_101877 crossref_primary_10_1109_TITS_2021_3058385 crossref_primary_10_1109_TVT_2021_3106665 crossref_primary_10_1016_j_phycom_2025_102623 crossref_primary_10_1016_j_seta_2021_101130 crossref_primary_10_1109_TNSM_2020_3042526 crossref_primary_10_1155_2021_9991535 crossref_primary_10_1016_j_jpdc_2022_10_002 crossref_primary_10_1155_2023_1044282 crossref_primary_10_1109_TDSC_2019_2909890 crossref_primary_10_1016_j_iot_2020_100355 crossref_primary_10_1109_JIOT_2019_2923611 crossref_primary_10_1109_ACCESS_2024_3450313 crossref_primary_10_1109_TVT_2023_3247180 crossref_primary_10_1109_TMC_2021_3079984 crossref_primary_10_1109_TVT_2023_3341693 crossref_primary_10_1016_j_compeleceng_2021_107409 crossref_primary_10_1109_ACCESS_2018_2890389 crossref_primary_10_1109_ACCESS_2020_3012411 crossref_primary_10_1155_2022_6304927 crossref_primary_10_1002_cpe_6187 crossref_primary_10_3390_app132011323 crossref_primary_10_1109_ACCESS_2019_2931217 crossref_primary_10_1016_j_compeleceng_2023_108778 crossref_primary_10_1109_TVT_2020_3038834 crossref_primary_10_1109_TDSC_2021_3135016 crossref_primary_10_1109_ACCESS_2019_2958356 crossref_primary_10_3390_bdcc8090095 crossref_primary_10_1109_ACCESS_2024_3488570 crossref_primary_10_1007_s11227_020_03160_x crossref_primary_10_1109_TMC_2024_3412106 crossref_primary_10_1109_TNSE_2021_3093435 crossref_primary_10_1109_TVT_2020_3003806 crossref_primary_10_1007_s11042_022_12946_5 crossref_primary_10_1007_s40747_021_00555_y crossref_primary_10_1016_j_comcom_2020_12_005 crossref_primary_10_1109_ACCESS_2021_3050038 crossref_primary_10_1109_TVT_2019_2917776 |
| Cites_doi | 10.1016/j.jnca.2012.07.002 10.1109/TWC.2015.2473165 10.1109/TITS.2011.2156790 10.1109/TITS.2016.2579162 10.1016/j.inffus.2011.01.001 10.1049/iet-cdt.2012.0073 10.1109/ISWPC.2013.6707447 10.1109/TST.2016.7787005 10.1007/s12083-014-0324-9 10.1016/j.jss.2011.06.061 10.1016/j.pmcj.2015.08.001 10.1109/MCOM.2013.6525605 10.1109/TVT.2009.2038222 10.1007/3-540-44647-8_21 10.1007/978-3-540-30580-4_6 10.1007/s10916-015-0335-y 10.1007/11535218_33 10.1109/TVT.2012.2197031 10.1109/TC.2015.2485225 10.1145/1880022.1880027 10.1109/TC.2002.1004593 10.1109/iMac4s.2013.6526427 10.1109/ComComAp.2012.6154869 10.1109/TSG.2016.2602282 10.1109/TVT.2014.2344633 10.1109/TIFS.2015.2439964 10.1007/s12083-015-0409-0 10.1109/TCE.2016.7448560 10.1007/s10623-005-6344-y 10.1007/3-540-46035-7_22 10.1109/TDSC.2016.2616876 10.1007/3-540-44987-6_28 10.1109/ACCESS.2017.2676119 10.1109/TITS.2016.2634623 10.1109/TIT.1983.1056650 10.1109/TPDS.2014.2308215 10.1007/s11227-015-1601-y 10.1109/IPDPS.2011.42 10.1109/TIFS.2017.2730479 10.1007/3-540-39568-7_5 10.1109/CITS.2016.7546385 10.1145/77648.77649 10.1109/TVT.2013.2238566 10.1109/MWC.2010.5601954 10.1109/TIFS.2015.2473820 10.1109/ACCESS.2016.2596292 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
| DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD FR3 KR7 L7M |
| DOI | 10.1109/TVT.2017.2780183 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Electronics & Communications Abstracts Technology Research Database Engineering Research Database Civil Engineering Abstracts Advanced Technologies Database with Aerospace |
| DatabaseTitle | CrossRef Civil Engineering Abstracts Engineering Research Database Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
| DatabaseTitleList | Civil Engineering Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1939-9359 |
| EndPage | 4373 |
| ExternalDocumentID | 10_1109_TVT_2017_2780183 8187745 |
| Genre | orig-research |
| GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAIKC AAJGR AAMNW AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IAAWW IBMZZ ICLAB IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS RXW TAE TN5 VH1 AAYXX CITATION 7SP 8FD FR3 KR7 L7M RIG |
| ID | FETCH-LOGICAL-c291t-a2a3d8a5604258e7cdf472f34d846c6b26018cdd277052d856b275a21f6bcd883 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 136 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000432310500053&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0018-9545 |
| IngestDate | Mon Jun 30 10:12:54 EDT 2025 Tue Nov 18 22:18:36 EST 2025 Sat Nov 29 02:18:27 EST 2025 Wed Aug 27 02:50:32 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c291t-a2a3d8a5604258e7cdf472f34d846c6b26018cdd277052d856b275a21f6bcd883 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-3020-3947 0000-0002-3190-389X 0000-0002-1562-5105 0000-0002-5196-9589 |
| PQID | 2174503058 |
| PQPubID | 85454 |
| PageCount | 15 |
| ParticipantIDs | crossref_citationtrail_10_1109_TVT_2017_2780183 proquest_journals_2174503058 crossref_primary_10_1109_TVT_2017_2780183 ieee_primary_8187745 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-05-01 |
| PublicationDateYYYYMMDD | 2018-05-01 |
| PublicationDate_xml | – month: 05 year: 2018 text: 2018-05-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on vehicular technology |
| PublicationTitleAbbrev | TVT |
| PublicationYear | 2018 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref56 ref12 behrisch (ref49) 0 ref15 ref53 ref52 ref11 ref10 ref17 ref16 ref19 ref18 rhee (ref14) 2011 ref50 von oheimb (ref42) 2005 ref46 ref45 ref47 ref44 ref43 (ref48) 2017 ref8 (ref31) 1995 ref7 ref9 ref4 ref3 ref6 ref5 bellare (ref29) 1994 ref40 ref34 ref37 ref36 li (ref51) 2015; 26 ref30 ref33 ref32 he (ref54) 2012; 13 ref2 ref1 ref39 ref38 paar (ref41) 2009 ref24 lin (ref13) 2015 ref23 ref26 ref25 ref20 ref22 ref21 (ref35) 2016 ref28 ref27 ray (ref55) 2012; 1 |
| References_xml | – year: 2009 ident: ref41 publication-title: Understanding Cryptography A Textbook for Students and Practitioners – ident: ref26 doi: 10.1016/j.jnca.2012.07.002 – start-page: 1 year: 2005 ident: ref42 article-title: The high-level protocol specification language HLPSL developed in the EU project AVISPA publication-title: Proc 3rd APPSEM II Workshop Appl Semantics (APPSEM) – ident: ref36 doi: 10.1109/TWC.2015.2473165 – ident: ref18 doi: 10.1109/TITS.2011.2156790 – ident: ref15 doi: 10.1109/TITS.2016.2579162 – start-page: 232 year: 1994 ident: ref29 publication-title: Entity Authentication and Key Distribution – volume: 13 start-page: 223 year: 2012 ident: ref54 article-title: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security publication-title: Inf Fusion doi: 10.1016/j.inffus.2011.01.001 – ident: ref52 doi: 10.1049/iet-cdt.2012.0073 – ident: ref25 doi: 10.1109/ISWPC.2013.6707447 – ident: ref19 doi: 10.1109/TST.2016.7787005 – ident: ref44 doi: 10.1007/s12083-014-0324-9 – ident: ref53 doi: 10.1016/j.jss.2011.06.061 – ident: ref40 doi: 10.1016/j.pmcj.2015.08.001 – ident: ref22 doi: 10.1109/MCOM.2013.6525605 – ident: ref6 doi: 10.1109/TVT.2009.2038222 – ident: ref12 doi: 10.1007/3-540-44647-8_21 – ident: ref34 doi: 10.1007/978-3-540-30580-4_6 – ident: ref3 doi: 10.1007/s10916-015-0335-y – ident: ref37 doi: 10.1007/11535218_33 – ident: ref8 doi: 10.1109/TVT.2012.2197031 – ident: ref16 doi: 10.1109/TC.2015.2485225 – ident: ref38 doi: 10.1145/1880022.1880027 – ident: ref32 doi: 10.1109/TC.2002.1004593 – volume: 1 start-page: 1 year: 2012 ident: ref55 article-title: Establishment of ECC-based initial secrecy usable for IKE implementation publication-title: Proc World Congress Eng – year: 2017 ident: ref48 article-title: SPAN, the security protocol ANimator for AVISPA – ident: ref1 doi: 10.1109/iMac4s.2013.6526427 – ident: ref10 doi: 10.1109/ComComAp.2012.6154869 – ident: ref30 doi: 10.1109/TSG.2016.2602282 – start-page: 21 year: 2015 ident: ref13 publication-title: GSIS Group Signature and ID-Based Signature-Based Secure and Privacy-Preserving Protocol – ident: ref9 doi: 10.1109/TVT.2014.2344633 – ident: ref43 doi: 10.1109/TIFS.2015.2439964 – ident: ref2 doi: 10.1007/s12083-015-0409-0 – ident: ref45 doi: 10.1109/TCE.2016.7448560 – ident: ref39 doi: 10.1007/s10623-005-6344-y – ident: ref24 doi: 10.1007/3-540-46035-7_22 – ident: ref27 doi: 10.1109/TDSC.2016.2616876 – ident: ref23 doi: 10.1007/3-540-44987-6_28 – ident: ref47 doi: 10.1109/ACCESS.2017.2676119 – ident: ref20 doi: 10.1109/TITS.2016.2634623 – ident: ref28 doi: 10.1109/TIT.1983.1056650 – start-page: 456 year: 2011 ident: ref14 article-title: A secure and location assurance protocol for location-aware services in vanets publication-title: Proc 5th Int Conf Innov Mobile Internet Services Ubiquitous Comput – volume: 26 start-page: 938 year: 2015 ident: ref51 article-title: ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs publication-title: IEEE Trans Parallel Distrib Syst doi: 10.1109/TPDS.2014.2308215 – ident: ref4 doi: 10.1007/s11227-015-1601-y – ident: ref56 doi: 10.1109/IPDPS.2011.42 – ident: ref21 doi: 10.1109/TIFS.2017.2730479 – ident: ref11 doi: 10.1007/3-540-39568-7_5 – ident: ref17 doi: 10.1109/CITS.2016.7546385 – year: 1995 ident: ref31 publication-title: Secure Hash Standard National Institute of Standards and Technology (NIST) U S Department of Commerce FIPS PUB 180-1 – ident: ref33 doi: 10.1145/77648.77649 – ident: ref5 doi: 10.1109/TVT.2013.2238566 – ident: ref7 doi: 10.1109/MWC.2010.5601954 – year: 2016 ident: ref35 article-title: Automated validation of internet security protocols and applications – ident: ref50 doi: 10.1109/TIFS.2015.2473820 – start-page: 55 year: 0 ident: ref49 article-title: Sumo-simulation of urban mobility: An overview publication-title: Proc 3rd Int Conf Adv Syst Simul – ident: ref46 doi: 10.1109/ACCESS.2016.2596292 |
| SSID | ssj0014491 |
| Score | 2.5940847 |
| SecondaryResourceType | review_article |
| Snippet | Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 4359 |
| SubjectTerms | Authentication automated validation of Internet security protocols and applications (AVISPA) Burrows–Abadi–Needham (BAN) logic Cryptography Curves Elliptic curve cryptography Exchange schemes Exchanging formal security key exchange Messages Protocol (computers) Protocols Roads Security Smart cities smart city Vehicles |
| Title | Secure Message Communication Protocol Among Vehicles in Smart City |
| URI | https://ieeexplore.ieee.org/document/8187745 https://www.proquest.com/docview/2174503058 |
| Volume | 67 |
| WOSCitedRecordID | wos000432310500053&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Xplore customDbUrl: eissn: 1939-9359 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014491 issn: 0018-9545 databaseCode: RIE dateStart: 19670101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFH9sw4Me_JridEoOXgS7rUnTJMc5FA86Bs6xW-nyoQNtZev8-02ybjgUwVspCYT3_ZL33g_gUgiliIp4kBIjg4gRFqRpigMTU0wNYRMpPacfWL_Px2MxqMD1uhdGa-2Lz3TLffq3fJXLhbsqa1vnYqMVWoUqY2zZq7V-MYiiEh0vtApsw4LVk2RHtIejoavhYi3MrD3mZMMFeUyVH4bYe5e7vf-dax92yygSdZdsP4CKzg5h59tswTrc-Jt0jR4dxsmLRhudIGgwy4vcygDqOrAhNNKvvjwOTTP09G6lCfVsdH4Ez3e3w959UAImBBKLsAhSnBLFUxvEWE3kmkllIoYNiZSNMmQ8cePDuFQKM9ahWHFqfzGa4tDEE6k4J8dQy_JMnwCiWsbCxES6kVjMpjUhNzYziwkRHEspG9Be0TCR5TRxB2rxlvisoiMSS_XEUT0pqd6Aq_WOj-UkjT_W1h2V1-tKAjeguWJTUqraPHE5FXVmi5_-vusMtrGTCl-l2IRaMVvoc9iSn8V0PrvwUvQFyfnDMw |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFH9BNFEPfqERRe3Bi4kD1q5rd0QiwQiERCTcltF2SqLMwPDvty1jkWhMvC1LmzTv-7XvvR_AdRBISaTHnYjEwvEYYU4URdiJfYppTNhYCMvpDuv1-GgU9Atwm_fCKKVs8Zmqmk_7li8TsTBXZTXtXHS0Qjdgk3oedpfdWvmbgedl-HiuVmEdGKweJetBbTAcmCouVsVMW2RO1pyQRVX5YYqtf2nt_-9kB7CXxZGosWT8IRTU9Ah2v00XLMGdvUtXqGtQTl4UWusFQf1ZkiZaClDDwA2hoXq1BXJoMkVP71qeUFPH58fw3LofNNtOBpngCBy4qRPhiEge6TBG6yJXTMjYYzgmntRxhvDHZoAYF1JixuoUS071L0Yj7Mb-WEjOyQkUp8lUnQKiSvhB7BNhhmIxndi4PNa5mU9IwLEQogy1FQ1Dkc0TN7AWb6HNK-pBqKkeGqqHGdXLcJPv-FjO0vhjbclQOV-XEbgMlRWbwkzZ5qHJqqgxXPzs911XsN0edDth56H3eA472EiIrVmsQDGdLdQFbInPdDKfXVqJ-gIfYsZ6 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Message+Communication+Protocol+Among+Vehicles+in+Smart+City&rft.jtitle=IEEE+transactions+on+vehicular+technology&rft.au=Dua%2C+Amit&rft.au=Kumar%2C+Neeraj&rft.au=Das%2C+Ashok+Kumar&rft.au=Susilo%2C+Willy&rft.date=2018-05-01&rft.pub=IEEE&rft.issn=0018-9545&rft.volume=67&rft.issue=5&rft.spage=4359&rft.epage=4373&rft_id=info:doi/10.1109%2FTVT.2017.2780183&rft.externalDocID=8187745 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9545&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9545&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9545&client=summon |