Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System
Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for big data collection in the IoT-based intelligent transportation system (ITS). To deal with this important issue, we design a...
Saved in:
| Published in: | IEEE internet of things journal Vol. 8; no. 9; pp. 7727 - 7744 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Piscataway
IEEE
01.05.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 2327-4662, 2327-4662 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for big data collection in the IoT-based intelligent transportation system (ITS). To deal with this important issue, we design a new three-factor user authentication scheme, called UAP-BCIoT, which relies on elliptic-curve cryptography (ECC). The mutual authentication between the user and an IoT device happens via the semitrusted cloud-gateway (CG) node in UAP-BCIoT. UAP-BCIoT supports several functionality features needed for IoT-based ITS environment including IoT smart device credential validation and big data analytics. A detailed security analysis is conducted based on the defined threat model to show that UAP-BCIoT is resilient against many known attacks. A thorough comparative study reveals that UAP-BCIoT supports better security, offers various functionality attributes, and also provides similar costs in communication as well computation as compared to other relevant schemes Finally, the practical demonstration of the proposed UAP-BCIoT is also provided to measure its impact on the network performance parameters. |
|---|---|
| AbstractList | Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for big data collection in the IoT-based intelligent transportation system (ITS). To deal with this important issue, we design a new three-factor user authentication scheme, called UAP-BCIoT, which relies on elliptic-curve cryptography (ECC). The mutual authentication between the user and an IoT device happens via the semitrusted cloud-gateway (CG) node in UAP-BCIoT. UAP-BCIoT supports several functionality features needed for IoT-based ITS environment including IoT smart device credential validation and big data analytics. A detailed security analysis is conducted based on the defined threat model to show that UAP-BCIoT is resilient against many known attacks. A thorough comparative study reveals that UAP-BCIoT supports better security, offers various functionality attributes, and also provides similar costs in communication as well computation as compared to other relevant schemes Finally, the practical demonstration of the proposed UAP-BCIoT is also provided to measure its impact on the network performance parameters. Secure access of the real-time data from the IoT smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for Big Data collection in Internet of Things (IoT)-based Intelligent Transportation System (ITS). To deal with this important issue, we design a new three-factor user authentication scheme, called UAP-BCIoT, which relies on Elliptic Curve Cryptography (ECC). The mutual authentication between the user and an IoT device happens via the semi-trusted Cloud-Gateway (CG) node in UAP-BCIoT. UAP-BCIoT supports several functionality features needed for IoT-based ITS environment including IoT smart device credential validation and Big Data analytics. A detailed security analysis is conducted based on the defined threat model to show that UAP-BCIoT is resilient against many known attacks. A thorough comparative study reveals that UAP-BCIoT supports better security, offers various functionality attributes, and also provides similar costs in communication as well computation as compared to other relevant schemes Finally, the practical demonstration of the proposed UAP-BCIoT is also provided to measure its impact on the network performance parameters. |
| Author | Srinivas, Jangirala Vasilakos, Athanasios V. Das, Ashok Kumar Wazid, Mohammad |
| Author_xml | – sequence: 1 givenname: Jangirala surname: Srinivas fullname: Srinivas, Jangirala email: sjangirala@jgu.edu.in organization: Jindal Global Business School, O. P. Jindal Global University, Haryana, India – sequence: 2 givenname: Ashok Kumar orcidid: 0000-0002-5196-9589 surname: Das fullname: Das, Ashok Kumar email: iitkgp.akdas@gmail.com organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India – sequence: 3 givenname: Mohammad orcidid: 0000-0001-9898-0921 surname: Wazid fullname: Wazid, Mohammad email: wazidkec2005@gmail.com organization: Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India – sequence: 4 givenname: Athanasios V. surname: Vasilakos fullname: Vasilakos, Athanasios V. email: th.vasilakos@gmail.com organization: School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia |
| BackLink | https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-81862$$DView record from Swedish Publication Index |
| BookMark | eNp9kctKxDAUhoMoeH0AcRNwa8dcOkm7HGe8jAgKjm5DJj2tkZqMSYrM29uxIuLCVc7i-_4Tzr-Ptp13gNAxJSNKSXl-O79fjBhhZMRJTkpebKE9xpnMciHY9q95Fx3F-EoI6bUxLcUeSjOItnHWNfgRTBcAP0UIeNKlF3DJGp2sd_gh-OSNb3HtA76wDZ7ppPHUty2YL8A6PPeL7EJHqPDcJWhb2_QBeBG0iysf0hD0uI4J3g7RTq3bCEff7wF6urpcTG-yu_vr-XRylxnOScokG9dCFDCWZa75sioKqEqdE01rkEswpBI1I7XgojKGQ85Kw2pNqa4gr8RS8gN0NuTGD1h1S7UK9k2HtfLaqpl9nigfGtWmThW0EKzHTwd8Ffx7BzGpV98F1_9QsTGVJKeyoD1FB8oEH2OA-ieWErWpQ23qUJs61HcdvSP_OMYOF0lB2_Zf82QwLQD8bCqZZIIK_gkn-5un |
| CODEN | IITJAU |
| CitedBy_id | crossref_primary_10_1109_TCE_2023_3345893 crossref_primary_10_1051_wujns_2023286541 crossref_primary_10_1109_TDSC_2024_3382359 crossref_primary_10_1109_JIOT_2023_3349005 crossref_primary_10_1109_TVT_2023_3306813 crossref_primary_10_1109_JIOT_2021_3084946 crossref_primary_10_1007_s10207_023_00808_6 crossref_primary_10_1016_j_sysarc_2025_103368 crossref_primary_10_1109_JIOT_2023_3234178 crossref_primary_10_1109_TITS_2024_3416060 crossref_primary_10_1109_JIOT_2022_3161935 crossref_primary_10_1016_j_matpr_2022_02_070 crossref_primary_10_1109_TIFS_2023_3272772 crossref_primary_10_1007_s12243_025_01076_2 crossref_primary_10_1016_j_future_2024_03_014 crossref_primary_10_1109_JIOT_2022_3152900 crossref_primary_10_1109_ACCESS_2025_3565375 crossref_primary_10_1109_JIOT_2025_3585437 crossref_primary_10_3390_s21217265 crossref_primary_10_3390_math11163450 crossref_primary_10_1016_j_comnet_2024_110449 crossref_primary_10_1002_cpe_70141 crossref_primary_10_1109_TIFS_2025_3550051 crossref_primary_10_1109_TIFS_2024_3451357 crossref_primary_10_1109_TNSE_2024_3363004 crossref_primary_10_1109_TITS_2023_3266030 crossref_primary_10_1109_TITS_2025_3525505 crossref_primary_10_1016_j_csa_2023_100013 crossref_primary_10_3390_s25072013 crossref_primary_10_1109_JIOT_2025_3576313 crossref_primary_10_1109_ACCESS_2023_3338025 crossref_primary_10_1088_2058_8585_adbb7b crossref_primary_10_1109_TIFS_2021_3081263 crossref_primary_10_1016_j_knosys_2025_113526 crossref_primary_10_1109_TMC_2025_3526076 crossref_primary_10_3390_drones7050302 crossref_primary_10_1155_2021_1224333 crossref_primary_10_1016_j_future_2022_09_010 crossref_primary_10_1109_JIOT_2021_3122007 crossref_primary_10_1002_spy2_468 crossref_primary_10_1109_TVT_2024_3365992 crossref_primary_10_1016_j_iot_2023_100902 crossref_primary_10_1002_cpe_8333 crossref_primary_10_1016_j_jnca_2025_104200 crossref_primary_10_1109_TIFS_2024_3451364 crossref_primary_10_3390_s22197433 crossref_primary_10_1007_s11334_023_00532_3 crossref_primary_10_1155_2021_9939796 crossref_primary_10_1016_j_comnet_2022_109509 crossref_primary_10_3390_electronics11233845 crossref_primary_10_1109_JIOT_2021_3114540 crossref_primary_10_1007_s12083_024_01868_8 crossref_primary_10_1016_j_sysarc_2025_103422 crossref_primary_10_1109_TIFS_2022_3227753 crossref_primary_10_1109_ACCESS_2022_3149376 crossref_primary_10_1109_ACCESS_2023_3234632 crossref_primary_10_1016_j_cose_2024_104052 crossref_primary_10_1002_dac_70187 crossref_primary_10_1007_s10922_024_09879_9 crossref_primary_10_1109_ACCESS_2024_3357090 crossref_primary_10_1109_ACCESS_2022_3205001 crossref_primary_10_1109_TSC_2023_3309860 crossref_primary_10_1145_3529753 crossref_primary_10_1016_j_csi_2024_103870 crossref_primary_10_1007_s10586_025_05518_3 crossref_primary_10_1016_j_future_2024_107498 crossref_primary_10_1007_s12083_024_01806_8 crossref_primary_10_3390_fi16050157 crossref_primary_10_1109_JIOT_2025_3578314 crossref_primary_10_3390_s23198090 crossref_primary_10_1016_j_comcom_2023_02_010 crossref_primary_10_3390_asi8010011 crossref_primary_10_3390_math11122710 crossref_primary_10_1016_j_adhoc_2021_102728 |
| Cites_doi | 10.1016/j.future.2018.06.027 10.1109/ACCESS.2015.2474705 10.1016/j.adhoc.2015.05.014 10.1109/TDSC.2018.2828306 10.1016/j.future.2018.09.017 10.1007/3-540-46035-7_22 10.1109/WCNC.2014.6952860 10.1007/s102070100002 10.1016/j.future.2018.04.019 10.1109/JIOT.2019.2923373 10.1109/TII.2017.2773666 10.1109/TII.2018.2824815 10.1016/j.adhoc.2014.03.009 10.1109/TDSC.2017.2764083 10.1109/TC.2002.1004593 10.1109/ACCESS.2016.2529723 10.1049/iet-net.2018.5187 10.1109/TIFS.2015.2439964 10.1109/MCOM.2009.5307471 10.1007/978-3-540-30580-4_6 10.1016/j.sysarc.2018.12.005 10.1109/TIT.1983.1056650 10.1109/TVT.2017.2780183 10.1007/978-3-540-24676-3_31 10.1109/ACCESS.2017.2676119 10.1016/j.jnca.2019.102496 10.1109/TIFS.2017.2721359 10.1016/j.procs.2015.04.069 10.1016/j.adhoc.2018.01.013 10.1016/j.jisa.2017.04.002 10.1109/TVT.2019.2911672 10.1016/j.future.2018.04.053 10.1109/ACCESS.2017.2689040 10.1109/JIOT.2017.2780232 10.1109/TDSC.2014.2355850 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D ADTPV AOWAS |
| DOI | 10.1109/JIOT.2020.3040938 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional SwePub SwePub Articles |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2327-4662 |
| EndPage | 7744 |
| ExternalDocumentID | oai_DiVA_org_ltu_81862 10_1109_JIOT_2020_3040938 9272616 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Science and Engineering Research Board, India grantid: MTR/2019/000699 funderid: 10.13039/501100001843 – fundername: Mathematical Research Impact Centric Support Project – fundername: Centre for Supply Chain and Logistics Management from O. P. Jindal Global University, India |
| GroupedDBID | 0R~ 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D 4.4 ADTPV AGSQL AOWAS EJD |
| ID | FETCH-LOGICAL-c330t-725f668e5794a3bd88ed9a40a1fe7bec0d6f20f636dcc3e429c2fa11ade4d6b73 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 95 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000642765500050&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2327-4662 |
| IngestDate | Sat Oct 25 06:29:20 EDT 2025 Sun Nov 09 07:55:50 EST 2025 Sat Nov 29 06:16:54 EST 2025 Tue Nov 18 22:25:54 EST 2025 Wed Aug 27 02:30:55 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 9 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c330t-725f668e5794a3bd88ed9a40a1fe7bec0d6f20f636dcc3e429c2fa11ade4d6b73 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-9898-0921 0000-0002-5196-9589 |
| PQID | 2517041781 |
| PQPubID | 2040421 |
| PageCount | 18 |
| ParticipantIDs | crossref_primary_10_1109_JIOT_2020_3040938 crossref_citationtrail_10_1109_JIOT_2020_3040938 ieee_primary_9272616 swepub_primary_oai_DiVA_org_ltu_81862 proquest_journals_2517041781 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-05-01 |
| PublicationDateYYYYMMDD | 2021-05-01 |
| PublicationDate_xml | – month: 05 year: 2021 text: 2021-05-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE internet of things journal |
| PublicationTitleAbbrev | JIoT |
| PublicationYear | 2021 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref35 ref13 ref34 ref12 ref37 ref15 ref36 ref14 ref31 ref30 ref33 ref11 ref32 ref10 ref2 ref1 ref39 ref17 ref16 (ref41) 2020 ref19 ref18 barker (ref40) 2016 ref24 (ref6) 2019 ref23 ref26 ref25 ref20 ref22 ref21 (ref29) 1995 (ref38) 2019 ref28 ref27 ref8 ref7 ref9 ref3 muthuramalingam (ref4) 2019 ref5 |
| References_xml | – ident: ref8 doi: 10.1016/j.future.2018.06.027 – ident: ref12 doi: 10.1109/ACCESS.2015.2474705 – ident: ref13 doi: 10.1016/j.adhoc.2015.05.014 – ident: ref18 doi: 10.1109/TDSC.2018.2828306 – ident: ref24 doi: 10.1016/j.future.2018.09.017 – ident: ref23 doi: 10.1007/3-540-46035-7_22 – ident: ref11 doi: 10.1109/WCNC.2014.6952860 – ident: ref39 doi: 10.1007/s102070100002 – ident: ref27 doi: 10.1016/j.future.2018.04.019 – ident: ref19 doi: 10.1109/JIOT.2019.2923373 – ident: ref17 doi: 10.1109/TII.2017.2773666 – ident: ref35 doi: 10.1109/TII.2018.2824815 – ident: ref10 doi: 10.1016/j.adhoc.2014.03.009 – year: 2019 ident: ref6 publication-title: Automated Validation of Internet Security Protocols and Applications – ident: ref26 doi: 10.1109/TDSC.2017.2764083 – ident: ref22 doi: 10.1109/TC.2002.1004593 – start-page: 279 year: 2019 ident: ref4 publication-title: IoT Based Intelligent Transportation System (IoT-ITS) for Global Perspective A Case Study – ident: ref32 doi: 10.1109/ACCESS.2016.2529723 – year: 2016 ident: ref40 publication-title: Recommendation for key management – year: 2019 ident: ref38 publication-title: AVISPA SPAN the Security Protocol Animator for AVISPA – ident: ref31 doi: 10.1049/iet-net.2018.5187 – ident: ref37 doi: 10.1109/TIFS.2015.2439964 – ident: ref2 doi: 10.1109/MCOM.2009.5307471 – year: 2020 ident: ref41 publication-title: The Network Simulator-ns-2 – year: 1995 ident: ref29 publication-title: Secure Hash Standard – ident: ref7 doi: 10.1007/978-3-540-30580-4_6 – ident: ref9 doi: 10.1016/j.sysarc.2018.12.005 – ident: ref21 doi: 10.1109/TIT.1983.1056650 – ident: ref25 doi: 10.1109/TVT.2017.2780183 – ident: ref30 doi: 10.1007/978-3-540-24676-3_31 – ident: ref14 doi: 10.1109/ACCESS.2017.2676119 – ident: ref28 doi: 10.1016/j.jnca.2019.102496 – ident: ref20 doi: 10.1109/TIFS.2017.2721359 – ident: ref3 doi: 10.1016/j.procs.2015.04.069 – ident: ref1 doi: 10.1016/j.adhoc.2018.01.013 – ident: ref15 doi: 10.1016/j.jisa.2017.04.002 – ident: ref36 doi: 10.1109/TVT.2019.2911672 – ident: ref5 doi: 10.1016/j.future.2018.04.053 – ident: ref33 doi: 10.1109/ACCESS.2017.2689040 – ident: ref16 doi: 10.1109/JIOT.2017.2780232 – ident: ref34 doi: 10.1109/TDSC.2014.2355850 |
| SSID | ssj0001105196 |
| Score | 2.5113428 |
| Snippet | Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party (user) is an important... Secure access of the real-time data from the IoT smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for Big... |
| SourceID | swepub proquest crossref ieee |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 7727 |
| SubjectTerms | Authentication Automated validation of Internet security protocols and applications (AVISPA) AVISPA Big Data Cloud computing Comparative studies Computer networks Cryptography Data collection Distribuerade datorsystem Electronic devices formal security Gateways Intelligent transportation systems Internet of Things Internet of Things (IoT)-based intelligent transportation system (ITS) IoT-based ITS key agreement NS2 simulation study Pervasive Mobile Computing Real-time systems Secure Big Data collection Security Security services Sensors Smart devices user authentication |
| Title | Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System |
| URI | https://ieeexplore.ieee.org/document/9272616 https://www.proquest.com/docview/2517041781 https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-81862 |
| Volume | 8 |
| WOSCitedRecordID | wos000642765500050&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 2327-4662 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001105196 issn: 2327-4662 databaseCode: RIE dateStart: 20140101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB5UPHjxLa4vctCLWE3abtIc1VVcEfWwireQJqksLFtZu_5-M2m3KojgrYckhH4zzCMz3wAcak1pblkWda1xUZrjIPfCsSgvhEYTlzIbKPPvxP199vIiH-fgpO2Fcc6F4jN3ip_hLd-WZoqpsjMZC-_w83mYF4LXvVpf-RSGzghvHi4ZlWe3_YeBDwBjH5d6SZXYgfLN9IRZKj_dyu9UocG8XK_872KrsNy4keS8xn0N5tx4HVZmIxpIo7EbUPVChYa3TyRk1h158jJHMDGGZUJ1vo48Tsqq9BJBvAdLLoavpKcrTUJOIbQ9kOGY9MtBdOFNniX9lsWzIi03en1QzX--CU_XV4PLm6gZtBCZJKFVJOJuwXnmul45dZLbLHNW6pRqVjjhQaaWFzEteMKtMYnzJszEhWZMW5danotkCxbG5dhtA8l5aiWV_m8wnRYSm_xyq71bkejY0q7pAJ1hoEzDQo7DMEYqRCNUKoRNIWyqga0Dx-2Wt5qC46_FGwhPu7BBpgN7M6BVo6TvCtnaaMpExjpwVIPf7kPW7d7w-Vx5nNWomipk_ot3fj99F5ZiLHUJdZB7sFBNpm4fFs1HNXyfHAQ5_QQU1Omv |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT9wwEB1RilQupS2t2BaKD_RSNcV2HCc-AlvE0mXhsFTcLMd2qpXQBi1Zfn89TjZQqarELQfbsvJmNB-eeQNwYAylpWNFkjnrE1HiIPfKs6SscoMmTjAXKfPH-WRS3NyoqzX41vfCeO9j8Zn_jp_xLd_VdompskPF8-DwyxfwMhOC07Zb6zGjwtAdkd3TJaPq8Hx0OQ0hIA-RaZBVhT0oT4xPnKbyt2P5lCw0GpjTredd7Q287hxJctQi_xbW_PwdbK2GNJBOZ7ehGcYajWChSMyte3IdpI5gagwLhdqMHbla1E0dZIIEH5Ycz36ToWkMiVmF2PhAZnMyqqfJcTB6jox6Hs-G9Ozo7UEtA_p7uD79MT05S7pRC4lNU9okOc8qKQufBfU0aemKwjtlBDWs8nmAmTpZcVrJVDprUx-MmOWVYcw4L5ws8_QDrM_rud8BUkrhFFXhbzAjKoVtfqUzwbFIDXc0swOgKwy07XjIcRzGrY7xCFUaYdMIm-5gG8DXfstdS8Lxv8XbCE-_sENmALsroHWnpvca-dqoYHnBBvClBb_fh7zbw9mvIx1w1rfNUiP3H__479P34dXZ9GKsx6PJz0-wybHwJVZF7sJ6s1j6PdiwD83sfvE5yuwfW7Ls9g |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Designing+Secure+User+Authentication+Protocol+for+Big+Data+Collection+in+IoT-Based+Intelligent+Transportation+System&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Jangirala+Srinivas&rft.au=Das%2C+Ashok+Kumar&rft.au=Wazid%2C+Mohammad&rft.au=Vasilakos%2C+Athanasios+V&rft.date=2021-05-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2327-4662&rft.volume=8&rft.issue=9&rft.spage=7727&rft_id=info:doi/10.1109%2FJIOT.2020.3040938&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |