Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System

Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for big data collection in the IoT-based intelligent transportation system (ITS). To deal with this important issue, we design a...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet of things journal Vol. 8; no. 9; pp. 7727 - 7744
Main Authors: Srinivas, Jangirala, Das, Ashok Kumar, Wazid, Mohammad, Vasilakos, Athanasios V.
Format: Journal Article
Language:English
Published: Piscataway IEEE 01.05.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:2327-4662, 2327-4662
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for big data collection in the IoT-based intelligent transportation system (ITS). To deal with this important issue, we design a new three-factor user authentication scheme, called UAP-BCIoT, which relies on elliptic-curve cryptography (ECC). The mutual authentication between the user and an IoT device happens via the semitrusted cloud-gateway (CG) node in UAP-BCIoT. UAP-BCIoT supports several functionality features needed for IoT-based ITS environment including IoT smart device credential validation and big data analytics. A detailed security analysis is conducted based on the defined threat model to show that UAP-BCIoT is resilient against many known attacks. A thorough comparative study reveals that UAP-BCIoT supports better security, offers various functionality attributes, and also provides similar costs in communication as well computation as compared to other relevant schemes Finally, the practical demonstration of the proposed UAP-BCIoT is also provided to measure its impact on the network performance parameters.
AbstractList Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for big data collection in the IoT-based intelligent transportation system (ITS). To deal with this important issue, we design a new three-factor user authentication scheme, called UAP-BCIoT, which relies on elliptic-curve cryptography (ECC). The mutual authentication between the user and an IoT device happens via the semitrusted cloud-gateway (CG) node in UAP-BCIoT. UAP-BCIoT supports several functionality features needed for IoT-based ITS environment including IoT smart device credential validation and big data analytics. A detailed security analysis is conducted based on the defined threat model to show that UAP-BCIoT is resilient against many known attacks. A thorough comparative study reveals that UAP-BCIoT supports better security, offers various functionality attributes, and also provides similar costs in communication as well computation as compared to other relevant schemes Finally, the practical demonstration of the proposed UAP-BCIoT is also provided to measure its impact on the network performance parameters.
Secure access of the real-time data from the IoT smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for Big Data collection in Internet of Things (IoT)-based Intelligent Transportation System (ITS). To deal with this important issue, we design a new three-factor user authentication scheme, called UAP-BCIoT, which relies on Elliptic Curve Cryptography (ECC). The mutual authentication between the user and an IoT device happens via the semi-trusted Cloud-Gateway (CG) node in UAP-BCIoT. UAP-BCIoT supports several functionality features needed for IoT-based ITS environment including IoT smart device credential validation and Big Data analytics. A detailed security analysis is conducted based on the defined threat model to show that UAP-BCIoT is resilient against many known attacks. A thorough comparative study reveals that UAP-BCIoT supports better security, offers various functionality attributes, and also provides similar costs in communication as well computation as compared to other relevant schemes Finally, the practical demonstration of the proposed UAP-BCIoT is also provided to measure its impact on the network performance parameters.
Author Srinivas, Jangirala
Vasilakos, Athanasios V.
Das, Ashok Kumar
Wazid, Mohammad
Author_xml – sequence: 1
  givenname: Jangirala
  surname: Srinivas
  fullname: Srinivas, Jangirala
  email: sjangirala@jgu.edu.in
  organization: Jindal Global Business School, O. P. Jindal Global University, Haryana, India
– sequence: 2
  givenname: Ashok Kumar
  orcidid: 0000-0002-5196-9589
  surname: Das
  fullname: Das, Ashok Kumar
  email: iitkgp.akdas@gmail.com
  organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India
– sequence: 3
  givenname: Mohammad
  orcidid: 0000-0001-9898-0921
  surname: Wazid
  fullname: Wazid, Mohammad
  email: wazidkec2005@gmail.com
  organization: Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India
– sequence: 4
  givenname: Athanasios V.
  surname: Vasilakos
  fullname: Vasilakos, Athanasios V.
  email: th.vasilakos@gmail.com
  organization: School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia
BackLink https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-81862$$DView record from Swedish Publication Index
BookMark eNp9kctKxDAUhoMoeH0AcRNwa8dcOkm7HGe8jAgKjm5DJj2tkZqMSYrM29uxIuLCVc7i-_4Tzr-Ptp13gNAxJSNKSXl-O79fjBhhZMRJTkpebKE9xpnMciHY9q95Fx3F-EoI6bUxLcUeSjOItnHWNfgRTBcAP0UIeNKlF3DJGp2sd_gh-OSNb3HtA76wDZ7ppPHUty2YL8A6PPeL7EJHqPDcJWhb2_QBeBG0iysf0hD0uI4J3g7RTq3bCEff7wF6urpcTG-yu_vr-XRylxnOScokG9dCFDCWZa75sioKqEqdE01rkEswpBI1I7XgojKGQ85Kw2pNqa4gr8RS8gN0NuTGD1h1S7UK9k2HtfLaqpl9nigfGtWmThW0EKzHTwd8Ffx7BzGpV98F1_9QsTGVJKeyoD1FB8oEH2OA-ieWErWpQ23qUJs61HcdvSP_OMYOF0lB2_Zf82QwLQD8bCqZZIIK_gkn-5un
CODEN IITJAU
CitedBy_id crossref_primary_10_1109_TCE_2023_3345893
crossref_primary_10_1051_wujns_2023286541
crossref_primary_10_1109_TDSC_2024_3382359
crossref_primary_10_1109_JIOT_2023_3349005
crossref_primary_10_1109_TVT_2023_3306813
crossref_primary_10_1109_JIOT_2021_3084946
crossref_primary_10_1007_s10207_023_00808_6
crossref_primary_10_1016_j_sysarc_2025_103368
crossref_primary_10_1109_JIOT_2023_3234178
crossref_primary_10_1109_TITS_2024_3416060
crossref_primary_10_1109_JIOT_2022_3161935
crossref_primary_10_1016_j_matpr_2022_02_070
crossref_primary_10_1109_TIFS_2023_3272772
crossref_primary_10_1007_s12243_025_01076_2
crossref_primary_10_1016_j_future_2024_03_014
crossref_primary_10_1109_JIOT_2022_3152900
crossref_primary_10_1109_ACCESS_2025_3565375
crossref_primary_10_1109_JIOT_2025_3585437
crossref_primary_10_3390_s21217265
crossref_primary_10_3390_math11163450
crossref_primary_10_1016_j_comnet_2024_110449
crossref_primary_10_1002_cpe_70141
crossref_primary_10_1109_TIFS_2025_3550051
crossref_primary_10_1109_TIFS_2024_3451357
crossref_primary_10_1109_TNSE_2024_3363004
crossref_primary_10_1109_TITS_2023_3266030
crossref_primary_10_1109_TITS_2025_3525505
crossref_primary_10_1016_j_csa_2023_100013
crossref_primary_10_3390_s25072013
crossref_primary_10_1109_JIOT_2025_3576313
crossref_primary_10_1109_ACCESS_2023_3338025
crossref_primary_10_1088_2058_8585_adbb7b
crossref_primary_10_1109_TIFS_2021_3081263
crossref_primary_10_1016_j_knosys_2025_113526
crossref_primary_10_1109_TMC_2025_3526076
crossref_primary_10_3390_drones7050302
crossref_primary_10_1155_2021_1224333
crossref_primary_10_1016_j_future_2022_09_010
crossref_primary_10_1109_JIOT_2021_3122007
crossref_primary_10_1002_spy2_468
crossref_primary_10_1109_TVT_2024_3365992
crossref_primary_10_1016_j_iot_2023_100902
crossref_primary_10_1002_cpe_8333
crossref_primary_10_1016_j_jnca_2025_104200
crossref_primary_10_1109_TIFS_2024_3451364
crossref_primary_10_3390_s22197433
crossref_primary_10_1007_s11334_023_00532_3
crossref_primary_10_1155_2021_9939796
crossref_primary_10_1016_j_comnet_2022_109509
crossref_primary_10_3390_electronics11233845
crossref_primary_10_1109_JIOT_2021_3114540
crossref_primary_10_1007_s12083_024_01868_8
crossref_primary_10_1016_j_sysarc_2025_103422
crossref_primary_10_1109_TIFS_2022_3227753
crossref_primary_10_1109_ACCESS_2022_3149376
crossref_primary_10_1109_ACCESS_2023_3234632
crossref_primary_10_1016_j_cose_2024_104052
crossref_primary_10_1002_dac_70187
crossref_primary_10_1007_s10922_024_09879_9
crossref_primary_10_1109_ACCESS_2024_3357090
crossref_primary_10_1109_ACCESS_2022_3205001
crossref_primary_10_1109_TSC_2023_3309860
crossref_primary_10_1145_3529753
crossref_primary_10_1016_j_csi_2024_103870
crossref_primary_10_1007_s10586_025_05518_3
crossref_primary_10_1016_j_future_2024_107498
crossref_primary_10_1007_s12083_024_01806_8
crossref_primary_10_3390_fi16050157
crossref_primary_10_1109_JIOT_2025_3578314
crossref_primary_10_3390_s23198090
crossref_primary_10_1016_j_comcom_2023_02_010
crossref_primary_10_3390_asi8010011
crossref_primary_10_3390_math11122710
crossref_primary_10_1016_j_adhoc_2021_102728
Cites_doi 10.1016/j.future.2018.06.027
10.1109/ACCESS.2015.2474705
10.1016/j.adhoc.2015.05.014
10.1109/TDSC.2018.2828306
10.1016/j.future.2018.09.017
10.1007/3-540-46035-7_22
10.1109/WCNC.2014.6952860
10.1007/s102070100002
10.1016/j.future.2018.04.019
10.1109/JIOT.2019.2923373
10.1109/TII.2017.2773666
10.1109/TII.2018.2824815
10.1016/j.adhoc.2014.03.009
10.1109/TDSC.2017.2764083
10.1109/TC.2002.1004593
10.1109/ACCESS.2016.2529723
10.1049/iet-net.2018.5187
10.1109/TIFS.2015.2439964
10.1109/MCOM.2009.5307471
10.1007/978-3-540-30580-4_6
10.1016/j.sysarc.2018.12.005
10.1109/TIT.1983.1056650
10.1109/TVT.2017.2780183
10.1007/978-3-540-24676-3_31
10.1109/ACCESS.2017.2676119
10.1016/j.jnca.2019.102496
10.1109/TIFS.2017.2721359
10.1016/j.procs.2015.04.069
10.1016/j.adhoc.2018.01.013
10.1016/j.jisa.2017.04.002
10.1109/TVT.2019.2911672
10.1016/j.future.2018.04.053
10.1109/ACCESS.2017.2689040
10.1109/JIOT.2017.2780232
10.1109/TDSC.2014.2355850
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ADTPV
AOWAS
DOI 10.1109/JIOT.2020.3040938
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
SwePub
SwePub Articles
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts


Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2327-4662
EndPage 7744
ExternalDocumentID oai_DiVA_org_ltu_81862
10_1109_JIOT_2020_3040938
9272616
Genre orig-research
GrantInformation_xml – fundername: Science and Engineering Research Board, India
  grantid: MTR/2019/000699
  funderid: 10.13039/501100001843
– fundername: Mathematical Research Impact Centric Support Project
– fundername: Centre for Supply Chain and Logistics Management from O. P. Jindal Global University, India
GroupedDBID 0R~
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
4.4
ADTPV
AGSQL
AOWAS
EJD
ID FETCH-LOGICAL-c330t-725f668e5794a3bd88ed9a40a1fe7bec0d6f20f636dcc3e429c2fa11ade4d6b73
IEDL.DBID RIE
ISICitedReferencesCount 95
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000642765500050&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2327-4662
IngestDate Sat Oct 25 06:29:20 EDT 2025
Sun Nov 09 07:55:50 EST 2025
Sat Nov 29 06:16:54 EST 2025
Tue Nov 18 22:25:54 EST 2025
Wed Aug 27 02:30:55 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 9
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c330t-725f668e5794a3bd88ed9a40a1fe7bec0d6f20f636dcc3e429c2fa11ade4d6b73
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-9898-0921
0000-0002-5196-9589
PQID 2517041781
PQPubID 2040421
PageCount 18
ParticipantIDs crossref_primary_10_1109_JIOT_2020_3040938
crossref_citationtrail_10_1109_JIOT_2020_3040938
ieee_primary_9272616
swepub_primary_oai_DiVA_org_ltu_81862
proquest_journals_2517041781
PublicationCentury 2000
PublicationDate 2021-05-01
PublicationDateYYYYMMDD 2021-05-01
PublicationDate_xml – month: 05
  year: 2021
  text: 2021-05-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE internet of things journal
PublicationTitleAbbrev JIoT
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref12
ref37
ref15
ref36
ref14
ref31
ref30
ref33
ref11
ref32
ref10
ref2
ref1
ref39
ref17
ref16
(ref41) 2020
ref19
ref18
barker (ref40) 2016
ref24
(ref6) 2019
ref23
ref26
ref25
ref20
ref22
ref21
(ref29) 1995
(ref38) 2019
ref28
ref27
ref8
ref7
ref9
ref3
muthuramalingam (ref4) 2019
ref5
References_xml – ident: ref8
  doi: 10.1016/j.future.2018.06.027
– ident: ref12
  doi: 10.1109/ACCESS.2015.2474705
– ident: ref13
  doi: 10.1016/j.adhoc.2015.05.014
– ident: ref18
  doi: 10.1109/TDSC.2018.2828306
– ident: ref24
  doi: 10.1016/j.future.2018.09.017
– ident: ref23
  doi: 10.1007/3-540-46035-7_22
– ident: ref11
  doi: 10.1109/WCNC.2014.6952860
– ident: ref39
  doi: 10.1007/s102070100002
– ident: ref27
  doi: 10.1016/j.future.2018.04.019
– ident: ref19
  doi: 10.1109/JIOT.2019.2923373
– ident: ref17
  doi: 10.1109/TII.2017.2773666
– ident: ref35
  doi: 10.1109/TII.2018.2824815
– ident: ref10
  doi: 10.1016/j.adhoc.2014.03.009
– year: 2019
  ident: ref6
  publication-title: Automated Validation of Internet Security Protocols and Applications
– ident: ref26
  doi: 10.1109/TDSC.2017.2764083
– ident: ref22
  doi: 10.1109/TC.2002.1004593
– start-page: 279
  year: 2019
  ident: ref4
  publication-title: IoT Based Intelligent Transportation System (IoT-ITS) for Global Perspective A Case Study
– ident: ref32
  doi: 10.1109/ACCESS.2016.2529723
– year: 2016
  ident: ref40
  publication-title: Recommendation for key management
– year: 2019
  ident: ref38
  publication-title: AVISPA SPAN the Security Protocol Animator for AVISPA
– ident: ref31
  doi: 10.1049/iet-net.2018.5187
– ident: ref37
  doi: 10.1109/TIFS.2015.2439964
– ident: ref2
  doi: 10.1109/MCOM.2009.5307471
– year: 2020
  ident: ref41
  publication-title: The Network Simulator-ns-2
– year: 1995
  ident: ref29
  publication-title: Secure Hash Standard
– ident: ref7
  doi: 10.1007/978-3-540-30580-4_6
– ident: ref9
  doi: 10.1016/j.sysarc.2018.12.005
– ident: ref21
  doi: 10.1109/TIT.1983.1056650
– ident: ref25
  doi: 10.1109/TVT.2017.2780183
– ident: ref30
  doi: 10.1007/978-3-540-24676-3_31
– ident: ref14
  doi: 10.1109/ACCESS.2017.2676119
– ident: ref28
  doi: 10.1016/j.jnca.2019.102496
– ident: ref20
  doi: 10.1109/TIFS.2017.2721359
– ident: ref3
  doi: 10.1016/j.procs.2015.04.069
– ident: ref1
  doi: 10.1016/j.adhoc.2018.01.013
– ident: ref15
  doi: 10.1016/j.jisa.2017.04.002
– ident: ref36
  doi: 10.1109/TVT.2019.2911672
– ident: ref5
  doi: 10.1016/j.future.2018.04.053
– ident: ref33
  doi: 10.1109/ACCESS.2017.2689040
– ident: ref16
  doi: 10.1109/JIOT.2017.2780232
– ident: ref34
  doi: 10.1109/TDSC.2014.2355850
SSID ssj0001105196
Score 2.5113428
Snippet Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party (user) is an important...
Secure access of the real-time data from the IoT smart devices (e.g., vehicles) by a legitimate external party (user) is an important security service for Big...
SourceID swepub
proquest
crossref
ieee
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 7727
SubjectTerms Authentication
Automated validation of Internet security protocols and applications (AVISPA)
AVISPA
Big Data
Cloud computing
Comparative studies
Computer networks
Cryptography
Data collection
Distribuerade datorsystem
Electronic devices
formal security
Gateways
Intelligent transportation systems
Internet of Things
Internet of Things (IoT)-based intelligent transportation system (ITS)
IoT-based ITS
key agreement
NS2 simulation study
Pervasive Mobile Computing
Real-time systems
Secure Big Data collection
Security
Security services
Sensors
Smart devices
user authentication
Title Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System
URI https://ieeexplore.ieee.org/document/9272616
https://www.proquest.com/docview/2517041781
https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-81862
Volume 8
WOSCitedRecordID wos000642765500050&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 2327-4662
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001105196
  issn: 2327-4662
  databaseCode: RIE
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB5UPHjxLa4vctCLWE3abtIc1VVcEfWwireQJqksLFtZu_5-M2m3KojgrYckhH4zzCMz3wAcak1pblkWda1xUZrjIPfCsSgvhEYTlzIbKPPvxP199vIiH-fgpO2Fcc6F4jN3ip_hLd-WZoqpsjMZC-_w83mYF4LXvVpf-RSGzghvHi4ZlWe3_YeBDwBjH5d6SZXYgfLN9IRZKj_dyu9UocG8XK_872KrsNy4keS8xn0N5tx4HVZmIxpIo7EbUPVChYa3TyRk1h158jJHMDGGZUJ1vo48Tsqq9BJBvAdLLoavpKcrTUJOIbQ9kOGY9MtBdOFNniX9lsWzIi03en1QzX--CU_XV4PLm6gZtBCZJKFVJOJuwXnmul45dZLbLHNW6pRqVjjhQaaWFzEteMKtMYnzJszEhWZMW5danotkCxbG5dhtA8l5aiWV_m8wnRYSm_xyq71bkejY0q7pAJ1hoEzDQo7DMEYqRCNUKoRNIWyqga0Dx-2Wt5qC46_FGwhPu7BBpgN7M6BVo6TvCtnaaMpExjpwVIPf7kPW7d7w-Vx5nNWomipk_ot3fj99F5ZiLHUJdZB7sFBNpm4fFs1HNXyfHAQ5_QQU1Omv
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT9wwEB1RilQupS2t2BaKD_RSNcV2HCc-AlvE0mXhsFTcLMd2qpXQBi1Zfn89TjZQqarELQfbsvJmNB-eeQNwYAylpWNFkjnrE1HiIPfKs6SscoMmTjAXKfPH-WRS3NyoqzX41vfCeO9j8Zn_jp_xLd_VdompskPF8-DwyxfwMhOC07Zb6zGjwtAdkd3TJaPq8Hx0OQ0hIA-RaZBVhT0oT4xPnKbyt2P5lCw0GpjTredd7Q287hxJctQi_xbW_PwdbK2GNJBOZ7ehGcYajWChSMyte3IdpI5gagwLhdqMHbla1E0dZIIEH5Ycz36ToWkMiVmF2PhAZnMyqqfJcTB6jox6Hs-G9Ozo7UEtA_p7uD79MT05S7pRC4lNU9okOc8qKQufBfU0aemKwjtlBDWs8nmAmTpZcVrJVDprUx-MmOWVYcw4L5ws8_QDrM_rud8BUkrhFFXhbzAjKoVtfqUzwbFIDXc0swOgKwy07XjIcRzGrY7xCFUaYdMIm-5gG8DXfstdS8Lxv8XbCE-_sENmALsroHWnpvca-dqoYHnBBvClBb_fh7zbw9mvIx1w1rfNUiP3H__479P34dXZ9GKsx6PJz0-wybHwJVZF7sJ6s1j6PdiwD83sfvE5yuwfW7Ls9g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Designing+Secure+User+Authentication+Protocol+for+Big+Data+Collection+in+IoT-Based+Intelligent+Transportation+System&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Jangirala+Srinivas&rft.au=Das%2C+Ashok+Kumar&rft.au=Wazid%2C+Mohammad&rft.au=Vasilakos%2C+Athanasios+V&rft.date=2021-05-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2327-4662&rft.volume=8&rft.issue=9&rft.spage=7727&rft_id=info:doi/10.1109%2FJIOT.2020.3040938&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon