Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET
Connected vehicle means providing different services, such as advanced driver-assistance systems (ADAS) from vehicles connected to the network. Vehicular ad-hoc networks (VANETs) can support vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to realize connected vehicle. In...
Saved in:
Published in | IEEE transactions on network science and engineering Vol. 9; no. 3; pp. 1346 - 1358 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.05.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Connected vehicle means providing different services, such as advanced driver-assistance systems (ADAS) from vehicles connected to the network. Vehicular ad-hoc networks (VANETs) can support vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to realize connected vehicle. In VANETs, secure communication must be ensured, as otherwise it can lead to traffic accidents and human injuries. Recently, many studies on V2I authentication have been conducted to guarantee the security of V2I communications. However, recent V2I authentication protocols do not consider the handover situation, and it causes unnecessary computations. As vehicles have limited computing resources, unnecessary computation can lead to overload to the vehicles. In recent years, blockchain-based VANET is an active field of research because it can provide decentralization, data integrity and transparency. Using the strength of the blockchain technology, we design a blockchain-based handover authentication protocol for VANETs. In the proposed protocol, vehicles only perform lightweight computations in handover situations for efficiency of the network. We also conduct the formal analysis such as Burrows-Abadi-Needham (BAN) logic, Real-Or-Random (ROR) oracle model, and Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation to the proposed protocol. We simulate the proposed protocol using network simulator 3 (NS-3) to verify that the proposed protocol is practical. Finally, we compare the computational cost and security features of the proposed protocol with existing protocols to show that the proposed protocol is more secure and efficient. |
---|---|
AbstractList | Connected vehicle means providing different services, such as advanced driver-assistance systems (ADAS) from vehicles connected to the network. Vehicular ad-hoc networks (VANETs) can support vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to realize connected vehicle. In VANETs, secure communication must be ensured, as otherwise it can lead to traffic accidents and human injuries. Recently, many studies on V2I authentication have been conducted to guarantee the security of V2I communications. However, recent V2I authentication protocols do not consider the handover situation, and it causes unnecessary computations. As vehicles have limited computing resources, unnecessary computation can lead to overload to the vehicles. In recent years, blockchain-based VANET is an active field of research because it can provide decentralization, data integrity and transparency. Using the strength of the blockchain technology, we design a blockchain-based handover authentication protocol for VANETs. In the proposed protocol, vehicles only perform lightweight computations in handover situations for efficiency of the network. We also conduct the formal analysis such as Burrows–Abadi–Needham (BAN) logic, Real-Or-Random (ROR) oracle model, and Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation to the proposed protocol. We simulate the proposed protocol using network simulator 3 (NS-3) to verify that the proposed protocol is practical. Finally, we compare the computational cost and security features of the proposed protocol with existing protocols to show that the proposed protocol is more secure and efficient. |
Author | Son, Seunghwan Lee, Joonyoung Park, Yohan Park, Youngho Das, Ashok Kumar |
Author_xml | – sequence: 1 givenname: Seunghwan orcidid: 0000-0002-3198-8467 surname: Son fullname: Son, Seunghwan email: sonshawn@knu.ac.kr organization: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea – sequence: 2 givenname: Joonyoung orcidid: 0000-0002-8172-6182 surname: Lee fullname: Lee, Joonyoung email: harry250@knu.ac.kr organization: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea – sequence: 3 givenname: Yohan orcidid: 0000-0002-9011-8410 surname: Park fullname: Park, Yohan email: yhpark@kmu.ac.kr organization: School of Computer Engineering, Keimyung University, Daegu, South Korea – sequence: 4 givenname: Youngho orcidid: 0000-0002-0406-6547 surname: Park fullname: Park, Youngho email: parkyh@knu.ac.kr organization: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea – sequence: 5 givenname: Ashok Kumar orcidid: 0000-0002-5196-9589 surname: Das fullname: Das, Ashok Kumar email: iitkgp.akdas@gmail.com organization: Center for Security, Theory, and Algorithmic Research, International Institute of Information Technology, Hyderabad, Telangana, India |
BookMark | eNp9kE1PAjEQhhuDiaj8AOOliefFtsP244iKYkLQRCDeNt1uF6rYardo_PeyYjx48DIzh_eZyTyHqOODtwidUNKnlKjz2fRh1GeEsT7QAWNS7KEuAxhkwNRjp52ZyAZciQPUa5onQghlkgNAF82vbOOWHocaX6yDeTYr7Xx2oRtb4YlbrtKHbStesFs81r4K7zbi4SatrE_O6OSCx_cxpGDCGtch4sVwOpodo_1arxvb--lHaH49ml2Os8ndze3lcJIZpiBltFSVAiKlyBW3QEtZl3ZAa0M0L8uK5zwnwPM6B1nlICpVGlELyTnXsixlBUfobLf3NYa3jW1S8RQ20W9PFoxzRXNFJWxTdJcyMTRNtHXxGt2Ljp8FJUUrsGgFFq3A4kfglhF_GOPS97sparf-lzzdkc5a-3tJcUlBKPgCHYl-iw |
CODEN | ITNSD5 |
CitedBy_id | crossref_primary_10_1016_j_comnet_2022_109400 crossref_primary_10_1109_TCE_2023_3324273 crossref_primary_10_1109_JIOT_2024_3401178 crossref_primary_10_1016_j_vehcom_2024_100848 crossref_primary_10_1109_ACCESS_2022_3224222 crossref_primary_10_1109_ACCESS_2022_3195807 crossref_primary_10_1109_TNSE_2023_3264829 crossref_primary_10_32604_cmc_2024_053854 crossref_primary_10_1109_TITS_2024_3432772 crossref_primary_10_1109_ACCESS_2024_3429184 crossref_primary_10_1109_ACCESS_2022_3168843 crossref_primary_10_1016_j_comnet_2023_109638 crossref_primary_10_1109_JIOT_2023_3325904 crossref_primary_10_32604_iasc_2024_050819 crossref_primary_10_3390_electronics12081812 crossref_primary_10_1016_j_vehcom_2024_100850 crossref_primary_10_1007_s11277_023_10727_3 crossref_primary_10_1016_j_compeleceng_2025_110069 crossref_primary_10_1109_TWC_2024_3354064 crossref_primary_10_1109_JIOT_2024_3361506 crossref_primary_10_3390_math12152383 crossref_primary_10_3390_s22197433 crossref_primary_10_1109_JIOT_2023_3332943 crossref_primary_10_3390_math12111717 crossref_primary_10_3390_s24227119 crossref_primary_10_1109_ACCESS_2023_3328232 crossref_primary_10_1109_TITS_2024_3386730 crossref_primary_10_1007_s11235_023_01016_2 crossref_primary_10_1016_j_comcom_2025_108048 crossref_primary_10_1109_ACCESS_2024_3496555 crossref_primary_10_3390_electronics13081418 crossref_primary_10_1016_j_comnet_2024_110661 crossref_primary_10_1109_ACCESS_2022_3206457 crossref_primary_10_1007_s12083_024_01784_x crossref_primary_10_1109_TSUSC_2023_3283615 crossref_primary_10_1109_ACCESS_2022_3205001 crossref_primary_10_1016_j_asej_2025_103331 crossref_primary_10_3390_s22239123 crossref_primary_10_1109_OJCOMS_2024_3449692 crossref_primary_10_1109_TVT_2023_3322637 crossref_primary_10_1109_TITS_2024_3395184 crossref_primary_10_3390_s24237428 crossref_primary_10_1080_03081079_2024_2345876 crossref_primary_10_1109_TNSM_2024_3416418 crossref_primary_10_3390_electronics11193199 crossref_primary_10_3390_s23042034 crossref_primary_10_1109_TIV_2023_3307699 crossref_primary_10_3390_electronics13030551 crossref_primary_10_3390_s24072331 crossref_primary_10_1016_j_iot_2024_101096 crossref_primary_10_1109_TNSM_2023_3238307 crossref_primary_10_1109_TVT_2024_3390607 crossref_primary_10_1109_TITS_2024_3428491 crossref_primary_10_1109_ACCESS_2022_3208347 crossref_primary_10_1109_ACCESS_2022_3191414 crossref_primary_10_3390_s25030982 crossref_primary_10_3390_math12101450 crossref_primary_10_1002_nem_2224 crossref_primary_10_1016_j_vehcom_2025_100890 crossref_primary_10_1109_TITS_2024_3480029 crossref_primary_10_1016_j_procs_2023_03_120 crossref_primary_10_1186_s13634_023_01075_2 crossref_primary_10_1109_ACCESS_2023_3265959 crossref_primary_10_3390_s22166264 crossref_primary_10_1109_OJCS_2024_3397307 crossref_primary_10_3390_electronics12173688 crossref_primary_10_1109_ACCESS_2023_3286016 crossref_primary_10_1145_3715000 crossref_primary_10_1109_LNET_2023_3234491 crossref_primary_10_1109_TITS_2024_3399200 crossref_primary_10_3390_s24196273 crossref_primary_10_1109_OJCOMS_2024_3494548 crossref_primary_10_1016_j_comnet_2024_110391 crossref_primary_10_1109_TVT_2023_3289175 crossref_primary_10_3390_s22187075 crossref_primary_10_1109_TVT_2023_3310520 crossref_primary_10_1016_j_iot_2023_100685 crossref_primary_10_1109_ACCESS_2024_3484522 crossref_primary_10_3390_math12050716 crossref_primary_10_1109_TITS_2023_3297527 crossref_primary_10_1109_TNSE_2024_3445712 crossref_primary_10_1109_TITS_2024_3394438 crossref_primary_10_1109_TITS_2024_3472013 crossref_primary_10_1016_j_vehcom_2024_100783 crossref_primary_10_1007_s11227_023_05064_y crossref_primary_10_1016_j_vehcom_2023_100663 crossref_primary_10_1109_JIOT_2024_3398579 crossref_primary_10_1007_s41870_023_01712_x crossref_primary_10_1109_ACCESS_2024_3521428 crossref_primary_10_1109_TITS_2024_3516054 crossref_primary_10_1016_j_jisa_2023_103476 crossref_primary_10_1109_TVT_2024_3450078 crossref_primary_10_1016_j_compeleceng_2024_109886 crossref_primary_10_3390_math12233756 crossref_primary_10_1016_j_adhoc_2022_102980 crossref_primary_10_1109_TMC_2024_3412106 crossref_primary_10_1109_TVT_2023_3262173 crossref_primary_10_3390_electronics12061368 crossref_primary_10_1371_journal_pone_0312854 crossref_primary_10_3390_electronics13193930 crossref_primary_10_1016_j_eswa_2023_121461 crossref_primary_10_1109_TVT_2023_3299705 crossref_primary_10_1186_s42400_024_00324_7 |
Cites_doi | 10.1109/TII.2017.2786307 10.1007/978-3-540-30580-4_6 10.1016/j.sysarc.2020.101877 10.1109/TVT.2020.2972923 10.1007/s10207-004-0055-7 10.3390/s20102913 10.1109/ACCESS.2020.3014678 10.1109/TITS.2017.2657649 10.1109/TIT.1983.1056650 10.1145/77648.77649 10.1109/TII.2019.2948053 10.1109/ACCESS.2020.3032680 10.1109/TVT.2021.3050614 10.1109/JIOT.2019.2957421 10.1155/2018/6251219 10.1109/TVT.2020.3000576 10.3390/s18103191 10.1007/s10916-018-0995-5 10.1109/TETC.2020.2978866 10.2307/2007884 10.1109/ACCESS.2020.3005592 10.1109/ACCESS.2019.2933137 10.1109/JIOT.2017.2740569 10.1007/3-540-45539-6_12 10.3390/app10051758 10.1007/11805618_21 10.1109/ACCESS.2020.3000790 10.1016/j.future.2019.03.039 10.1109/JIOT.2019.2923611 10.1016/j.adhoc.2017.03.006 10.1109/ACCESS.2018.2864189 10.1109/ACCESS.2018.2890736 10.1007/3-540-48405-1_25 10.3390/s16122123 10.1109/TVT.2020.2981934 10.1109/ACCESS.2019.2921399 10.1016/j.comcom.2020.12.005 10.1109/TITS.2015.2502322 10.1109/ACCESS.2018.2844190 10.1145/3132747.3132757 10.1109/ACCESS.2019.2936575 10.1109/ACCESS.2018.2810096 10.1109/TVT.2017.2780183 10.3390/app10103565 10.1109/TVT.2019.2911672 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TNSE.2022.3142287 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2334-329X |
EndPage | 1358 |
ExternalDocumentID | 10_1109_TNSE_2022_3142287 9681379 |
Genre | orig-research |
GrantInformation_xml | – fundername: Ministry of Education, Korea grantid: 4199990113966 – fundername: National Research Foundation of Korea grantid: 2020R1I1A3058605 funderid: 10.13039/501100003725 |
GroupedDBID | 0R~ 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IEDLZ IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c293t-1b9d930887596e31b8fbe41fc0a6bbd65650365f538d537d9bc7f78666a8bb8d3 |
IEDL.DBID | RIE |
ISSN | 2327-4697 |
IngestDate | Mon Jun 30 09:54:35 EDT 2025 Tue Jul 01 03:10:44 EDT 2025 Thu Apr 24 23:04:12 EDT 2025 Wed Aug 27 02:36:17 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-1b9d930887596e31b8fbe41fc0a6bbd65650365f538d537d9bc7f78666a8bb8d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-8172-6182 0000-0002-5196-9589 0000-0002-9011-8410 0000-0002-0406-6547 0000-0002-3198-8467 |
PQID | 2669159183 |
PQPubID | 2040409 |
PageCount | 13 |
ParticipantIDs | proquest_journals_2669159183 ieee_primary_9681379 crossref_primary_10_1109_TNSE_2022_3142287 crossref_citationtrail_10_1109_TNSE_2022_3142287 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-05-01 |
PublicationDateYYYYMMDD | 2022-05-01 |
PublicationDate_xml | – month: 05 year: 2022 text: 2022-05-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE transactions on network science and engineering |
PublicationTitleAbbrev | TNSE |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref12 ref15 ref11 ref10 ref17 ref16 ref19 ref18 AVISPA (ref13) 2020 ref51 ref50 ref46 ref45 ref47 ref42 ref41 ref44 ref43 ref8 ref7 ref9 ref4 ref3 Oheimb (ref49) 2005 ref6 ref5 (ref53) 2021 ref40 ref35 ref34 ref37 ref36 ref30 ref33 ref32 ref2 ref1 ref39 ref38 AVISPA (ref48) 2021 ref24 ref23 ref26 (ref52) 2021 ref25 ref20 ref22 ref21 ref28 ref27 ref29 Castro (ref31) 1999 |
References_xml | – start-page: 1 volume-title: Proc. 3rd APPSEM II Workshop Appl. Semantics year: 2005 ident: ref49 article-title: The high-level protocol specification language HLPSL developed in the EU project AVISPA – year: 2020 ident: ref13 article-title: Automated validation of internet security protocols and applications – ident: ref28 doi: 10.1109/TII.2017.2786307 – ident: ref12 doi: 10.1007/978-3-540-30580-4_6 – start-page: 173 volume-title: Proc. 3rd USENIX Symp. Operating Syst. Des. Implementation year: 1999 ident: ref31 article-title: Practical Byzantine fault tolerance – ident: ref9 doi: 10.1016/j.sysarc.2020.101877 – ident: ref24 doi: 10.1109/TVT.2020.2972923 – ident: ref50 doi: 10.1007/s10207-004-0055-7 – ident: ref35 doi: 10.3390/s20102913 – ident: ref19 doi: 10.1109/ACCESS.2020.3014678 – ident: ref16 doi: 10.1109/TITS.2017.2657649 – ident: ref32 doi: 10.1109/TIT.1983.1056650 – ident: ref11 doi: 10.1145/77648.77649 – ident: ref23 doi: 10.1109/TII.2019.2948053 – ident: ref30 doi: 10.1109/ACCESS.2020.3032680 – ident: ref44 doi: 10.1109/TVT.2021.3050614 – ident: ref7 doi: 10.1109/JIOT.2019.2957421 – ident: ref18 doi: 10.1155/2018/6251219 – ident: ref27 doi: 10.1109/TVT.2020.3000576 – ident: ref37 doi: 10.3390/s18103191 – ident: ref29 doi: 10.1007/s10916-018-0995-5 – year: 2021 ident: ref53 article-title: Pairing-based cryptography library – ident: ref25 doi: 10.1109/TETC.2020.2978866 – ident: ref26 doi: 10.2307/2007884 – ident: ref3 doi: 10.1109/ACCESS.2020.3005592 – ident: ref5 doi: 10.1109/ACCESS.2019.2933137 – ident: ref8 doi: 10.1109/JIOT.2017.2740569 – ident: ref47 doi: 10.1007/3-540-45539-6_12 – year: 2021 ident: ref52 article-title: Miracl library – ident: ref40 doi: 10.3390/app10051758 – ident: ref51 doi: 10.1007/11805618_21 – ident: ref4 doi: 10.1109/ACCESS.2020.3000790 – ident: ref6 doi: 10.1016/j.future.2019.03.039 – ident: ref2 doi: 10.1109/JIOT.2019.2923611 – ident: ref1 doi: 10.1016/j.adhoc.2017.03.006 – ident: ref20 doi: 10.1109/ACCESS.2018.2864189 – ident: ref21 doi: 10.1109/ACCESS.2018.2890736 – ident: ref38 doi: 10.1007/3-540-48405-1_25 – ident: ref42 doi: 10.3390/s16122123 – ident: ref33 doi: 10.1109/TVT.2020.2981934 – ident: ref43 doi: 10.1109/ACCESS.2019.2921399 – ident: ref46 doi: 10.1016/j.comcom.2020.12.005 – ident: ref15 doi: 10.1109/TITS.2015.2502322 – ident: ref39 doi: 10.1109/ACCESS.2020.3000790 – ident: ref41 doi: 10.1109/ACCESS.2018.2844190 – ident: ref10 doi: 10.1145/3132747.3132757 – year: 2021 ident: ref48 article-title: SPAN, a security protocol animator for AVISPA – ident: ref22 doi: 10.1109/ACCESS.2019.2936575 – ident: ref17 doi: 10.1109/ACCESS.2018.2810096 – ident: ref34 doi: 10.1109/TVT.2017.2780183 – ident: ref36 doi: 10.3390/app10103565 – ident: ref45 doi: 10.1109/TVT.2019.2911672 |
SSID | ssj0001286333 |
Score | 2.5447407 |
Snippet | Connected vehicle means providing different services, such as advanced driver-assistance systems (ADAS) from vehicles connected to the network. Vehicular... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1346 |
SubjectTerms | Advanced driver assistance systems Authentication Authentication protocols BAN logic Blockchain Blockchains Computational modeling Cryptography Handover Lightweight Mobile ad hoc networks mutual authentication and key agreement NS-3 Protocols ROR model Security Simulation Traffic accidents VANET Vehicle-to-infrastructure Vehicles Vehicular ad hoc networks |
Title | Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET |
URI | https://ieeexplore.ieee.org/document/9681379 https://www.proquest.com/docview/2669159183 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT-MwEB4BJzgAy0MU2JUPnBApSZ2HfQS2qCCokGgRtyjjh0BFCYJUSPx6xk5awbJa7S0HO7I845lvxp9nAA6KzApLMDrAWMZBzOMkwNRyEohMEEPLhfIs32E6GMeX98n9AhzN38IYYzz5zHTdp7_L15WaulTZsUxFxDO5CIsUuDVvtT7lU0TKOW8vLqNQHo-Gt30KAHs9iktdoavsi-vxvVS-GWDvVc7X4Hq2noZMMulOa-yq9z9KNf7vgtdhtYWX7KTRhx-wYMoNWPlUdHATxr89aYNVlp2SJ5uoh-KxDE7Jm2l25UL1N58tZXe9CzYoSu04nsxl0hyvqEnwsZuXqq5IhRhBXnZ3MuyPtmB83h-dDYK2uUKgyMPXQYRSS-5sTCJTwyMUFk0cWRUWKaImmJeQc0ssGUSd8ExLVJnNBEU7hUAUmm_DUlmVZgcYYkIgkBujpCD0ZQsrLUZc25TQoI5sB8LZvueqrTzuGmA85T4CCWXuRJU7UeWtqDpwOJ_y3JTd-NfgTbf184HtrndgfybcvD2YrznhEUkIjgzZ7t9n7cGy-3fDadyHpfplan4S7qjxl1e4D_XB1Io |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB7xOBQOLS1F3ZaCDz1VzZKs48Q-QrtogWVVqbuIW5TxQyCqBEFWSP31HTvZFX0IccvBViyPPd83489jgE9l7qQjGh1hqtIo5amIMHOcDKIEYuy41EHlO8lGs_T0UlyuwJflXRhrbRCf2b7_DGf5ptZznyo7UJlMeK5WYZ1wXwza21qPMioy45x3R5dJrA6mkx9DCgEHA4pMfamr_A_wCa-p_OOCA64cv4LzxYhaOclNf95gX__6q1jjc4e8BS87gskO2xXxGlZs9QY2H5Ud3IbZtyDbYLVjR4RlN_qqvK6iI8Izw8Y-WH8I-VJ2MThho7IyXuXJfC7NK4vaFB_7flc3NS0iRqSXXRxOhtO3MDseTr-Oou55hUgTxjdRgsoo7r2MUJnlCUqHNk2cjssM0RDREwRvwpFLNILnRqHOXS4p3iklojR8B9aqurLvgCEKooHcWq0k8S9XOuUw4cZlxAdN4noQL-a90F3tcf8Exs8ixCCxKrypCm-qojNVDz4vu9y2hTeearztp37ZsJv1HuwujFt0W_O-IEaiiMORK3v__1778GI0PR8X45PJ2QfY8P9pFY67sNbcze1HYiEN7oXF9xs4StfU |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+of+Blockchain-Based+Lightweight+V2I+Handover+Authentication+Protocol+for+VANET&rft.jtitle=IEEE+transactions+on+network+science+and+engineering&rft.au=Son%2C+Seunghwan&rft.au=Lee%2C+Joonyoung&rft.au=Park%2C+Yohan&rft.au=Park%2C+Youngho&rft.date=2022-05-01&rft.issn=2327-4697&rft.eissn=2334-329X&rft.volume=9&rft.issue=3&rft.spage=1346&rft.epage=1358&rft_id=info:doi/10.1109%2FTNSE.2022.3142287&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TNSE_2022_3142287 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4697&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4697&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4697&client=summon |