The Security of "2FLIP" Authentication Scheme for VANETs: Attacks and Rectifications

Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The vehicles and RSUs within transmission range establish a self-organizing network called Vehicular Ad-hoc Ne...

Full description

Saved in:
Bibliographic Details
Published inIEEE open journal of vehicular technology Vol. 4; pp. 1 - 13
Main Authors Rezazadeh Baee, Mir Ali, Simpson, Leonie, Foo, Ernest, Pieprzyk, Josef
Format Journal Article
LanguageEnglish
Published IEEE 01.01.2023
Subjects
Online AccessGet full text
ISSN2644-1330
2644-1330
DOI10.1109/OJVT.2022.3217552

Cover

Loading…
Abstract Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The vehicles and RSUs within transmission range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). The V2V communication in VANETs is vulnerable to cyber attacks involving message manipulation. Thus, mechanisms should be applied to ensure both the authenticity and integrity of the data broadcast. However, due to privacy concerns, it is important to avoid the use of identifiers that may aid tracking and surveillance of drivers. This is a serious constraint on authentication mechanisms. Recently, Wang et al. [1] proposed A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET named 2FLIP. They claim that their scheme includes a secure system-key update protocol to restore the whole system when necessary and further that this resists an adversary obtaining any information about the updated system-key. In this paper, we show that this is incorrect: 2FLIP does not provide perfect forward secrecy. This results in a known-key attack, as well as message forgery attack by an external adversary who may be an unregistered vehicle user. This external adversary can generate valid anonymous messages and further, they cannot be traced. The 2FLIP scheme is efficient, so we propose a modification to improve the security. We provide a formal security proof to show that our proposal is indeed provably secure. We demonstrate the efficiency of our proposal by conducting extensive performance analysis. We believe the enhanced system-key update protocol will be useful for application by researchers and designers in current and future VANET authentication schemes.
AbstractList Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The vehicles and RSUs within transmission range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). The V2V communication in VANETs is vulnerable to cyber attacks involving message manipulation. Thus, mechanisms should be applied to ensure both the authenticity and integrity of the data broadcast. However, due to privacy concerns, it is important to avoid the use of identifiers that may aid tracking and surveillance of drivers. This is a serious constraint on authentication mechanisms. Recently, Wang et al. [1] proposed A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET named 2FLIP. They claim that their scheme includes a secure system-key update protocol to restore the whole system when necessary and further that this resists an adversary obtaining any information about the updated system-key. In this paper, we show that this is incorrect: 2FLIP does not provide perfect forward secrecy. This results in a known-key attack, as well as message forgery attack by an external adversary who may be an unregistered vehicle user. This external adversary can generate valid anonymous messages and further, they cannot be traced. The 2FLIP scheme is efficient, so we propose a modification to improve the security. We provide a formal security proof to show that our proposal is indeed provably secure. We demonstrate the efficiency of our proposal by conducting extensive performance analysis. We believe the enhanced system-key update protocol will be useful for application by researchers and designers in current and future VANET authentication schemes.
Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The vehicles and RSUs within transmission range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). The V2V communication in VANETs is vulnerable to cyber-attacks involving message manipulation. Thus, mechanisms should be applied to ensure both the authenticity and integrity of the data broadcast. However, due to privacy concerns, it is important to avoid the use of identifiers that may aid tracking and surveillance of drivers. This is a serious constraint on authentication mechanisms. Recently, Wang et al. [1] proposed A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET named 2FLIP. They claim that their scheme includes a secure systemkey update protocol to restore the whole system when necessary. In this paper, we show that this is incorrect: 2FLIP does not provide perfect forward secrecy. This results in a known-key attack, as well as message forgery attack by an external adversary who may be an unregistered vehicle user. This external adversary can generate valid anonymous messages and further, they cannot be traced. The 2FLIP scheme is efficient, so we propose a modification to improve the security. We provide a formal security proof to show that our proposal is indeed provably secure. We demonstrate the efficiency of our proposal by conducting extensive performance analysis. We believe the enhanced system-key update protocol will be useful for application by researchers and designers in current and future VANET authentication schemes.
Author Simpson, Leonie
Pieprzyk, Josef
Rezazadeh Baee, Mir Ali
Foo, Ernest
Author_xml – sequence: 1
  givenname: Mir Ali
  orcidid: 0000-0003-1575-7287
  surname: Rezazadeh Baee
  fullname: Rezazadeh Baee, Mir Ali
  organization: School of Computer Science, Queensland University of Technology, QLD, Australia
– sequence: 2
  givenname: Leonie
  orcidid: 0000-0001-8434-9741
  surname: Simpson
  fullname: Simpson, Leonie
  organization: School of Computer Science, Queensland University of Technology, QLD, Australia
– sequence: 3
  givenname: Ernest
  orcidid: 0000-0002-3971-6415
  surname: Foo
  fullname: Foo, Ernest
  organization: School of Information and Communication Technology, Griffith University, QLD, Australia
– sequence: 4
  givenname: Josef
  orcidid: 0000-0002-1917-6466
  surname: Pieprzyk
  fullname: Pieprzyk, Josef
  organization: Commonwealth Scientific and Industrial Research Organization, Data61, NSW, Australia
BookMark eNp9kE1LAzEQhoMoWKs_QLwE76353Ox6K-JHpajo6jXMZic2te5KNh76793aIuLB0wzDPO8wzwHZbdoGCTnmbMw5K87ub1_KsWBCjKXgRmuxQwYiU2rEpWS7v_p9ctR1C8aY0JxzaQakLOdIn9B9xpBWtPX0VFzNpg-ndPKZ5tik4CCFtqFPbo7vSH0b6cvk7rLszukkJXBvHYWmpo_oUvDb5e6Q7HlYdni0rUPyfHVZXtyMZvfX04vJbOSkUWkkc4dVJXhR5IKZrGICZIYGuK5qrwvo5zJTTKPJwTPQWpvaAVe1dIBZZeSQTDe5dQsL-xHDO8SVbSHY70EbXy3E_oUlWicUmAJznXujjFdVbyoTUjsQBrD2fRbfZLnYdl1E_5PHmV1btmvLdm3Zbi33jPnDuJC-FaQIYfkvebIhAyL-XCoKyZXQ8gu5Goo0
CODEN IOJVAO
CitedBy_id crossref_primary_10_1007_s12083_024_01726_7
crossref_primary_10_1109_TITS_2023_3306547
crossref_primary_10_3390_cryptography8010005
crossref_primary_10_1002_dac_6125
crossref_primary_10_1109_TVT_2024_3452513
Cites_doi 10.1109/CSCloud.2015.32
10.1007/978-3-642-14623-7_34
10.1109/CCCI52664.2021.9583219
10.1017/CBO9781107360211
10.1109/TVT.2021.3097088
10.1109/TIFS.2021.3087359
10.17487/rfc2898
10.1007/3-540-44448-3_41
10.1016/j.vehcom.2020.100255
10.1109/MCOM.2009.4939288
10.1109/TVT.2015.2402166
10.1186/s13638-015-0353-y
10.17487/rfc7366
10.1007/978-3-319-61273-7_5
10.1109/JSYST.2020.2991168
10.1007/s00521-021-06152-x
10.1109/TVT.2019.2945339
10.1109/TVT.2007.906878
10.1109/MCOM.2009.5307471
10.1109/JIOT.2021.3068268
10.17487/rfc5869
10.1109/JCN.2009.6388411
10.1080/01611194.2012.687431
10.1007/s00145-014-9185-x
10.1109/TDSC.2022.3164436
10.1145/1102219.1102223
10.1109/TIT.2009.2034881
10.1112/plms/s2-42.1.230
10.1109/TWC.2014.010214.122008
10.1109/EuroSP48549.2020.00033
10.1109/TVT.2020.2996574
10.1007/s10586-017-0848-x
10.1007/11693383_22
ContentType Journal Article
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
DOA
DOI 10.1109/OJVT.2022.3217552
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2644-1330
EndPage 13
ExternalDocumentID oai_doaj_org_article_c24a79e858f747f4b3216235ca27aedf
10_1109_OJVT_2022_3217552
9931425
Genre orig-research
GrantInformation_xml – fundername: Queensland University of Technology Postgraduate Research Award
– fundername: Australian Research Council
  grantid: DP180102199
– fundername: Polish National Science Center (Narodowe Centrum Nauki)
  grantid: 2018/31/B/ST6/03003
GroupedDBID 0R~
97E
AAJGR
ABAZT
ABVLG
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
ESBDL
GROUPED_DOAJ
JAVBF
M~E
OCL
OK1
RIA
RIE
AAYXX
CITATION
ID FETCH-LOGICAL-c374t-38cebb219982076b02a36e7a15bdf59a99836405e78af0a5557dca14d3cae6b73
IEDL.DBID DOA
ISSN 2644-1330
IngestDate Wed Aug 27 01:30:33 EDT 2025
Thu Apr 24 23:03:27 EDT 2025
Tue Jul 01 01:47:50 EDT 2025
Wed Aug 27 02:18:25 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c374t-38cebb219982076b02a36e7a15bdf59a99836405e78af0a5557dca14d3cae6b73
ORCID 0000-0002-3971-6415
0000-0003-1575-7287
0000-0001-8434-9741
0000-0002-1917-6466
OpenAccessLink https://doaj.org/article/c24a79e858f747f4b3216235ca27aedf
PageCount 13
ParticipantIDs crossref_primary_10_1109_OJVT_2022_3217552
crossref_citationtrail_10_1109_OJVT_2022_3217552
ieee_primary_9931425
doaj_primary_oai_doaj_org_article_c24a79e858f747f4b3216235ca27aedf
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-01-01
PublicationDateYYYYMMDD 2023-01-01
PublicationDate_xml – month: 01
  year: 2023
  text: 2023-01-01
  day: 01
PublicationDecade 2020
PublicationTitle IEEE open journal of vehicular technology
PublicationTitleAbbrev OJVT
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
References ref13
ref12
ref15
ref14
ref11
ref17
ref16
baee (ref7) 2021; 70
ref19
ref18
dworkin (ref29) 2001
(ref41) 0
ref46
ref45
ref48
baee (ref44) 2014
ref42
ref43
goldreich (ref38) 2007
ref49
baee (ref24) 2021; 2021
ref3
ref6
baee (ref8) 2021
ref5
ref35
ref34
washington (ref37) 2008
ref36
goudarzi (ref10) 0
ref30
ref33
ref32
ref2
ref1
just (ref28) 2005
(ref40) 2017; 1609 2a 2017
ref23
menezes (ref9) 1996
ref26
ref25
ref20
ref22
ref21
abdalla (ref27) 1999; 1999
(ref39) 2003
sakemi (ref47) 2019
bond (ref31) 2002; 198
(ref4) 2005
References_xml – ident: ref15
  doi: 10.1109/CSCloud.2015.32
– ident: ref33
  doi: 10.1007/978-3-642-14623-7_34
– ident: ref21
  doi: 10.1109/CCCI52664.2021.9583219
– ident: ref43
  doi: 10.1017/CBO9781107360211
– volume: 1999
  year: 1999
  ident: ref27
  article-title: DHAES: An encryption scheme based on the diffie-hellman problem
  publication-title: IACR Cryptol ePrint Arch
– volume: 70
  start-page: 9306
  year: 2021
  ident: ref7
  article-title: A model to evaluate reliability of authentication protocols in C-ITS safety-critical applications
  publication-title: IEEE Trans Veh Technol
  doi: 10.1109/TVT.2021.3097088
– year: 2005
  ident: ref4
  article-title: Vehicle safety communications project: Task 3 final report - identify intelligent vehicle safety applications enabled by DSRC
  publication-title: Tech Rep
– ident: ref42
  doi: 10.1109/TIFS.2021.3087359
– ident: ref36
  doi: 10.17487/rfc2898
– ident: ref30
  doi: 10.1007/3-540-44448-3_41
– start-page: 1
  year: 0
  ident: ref10
  article-title: A systematic review of security in vehicular ad hoc network
  publication-title: Proc 2nd Symp Wireless Sensors Cellular Netw
– year: 2007
  ident: ref38
  publication-title: Foundations of Cryptography Volume 1 Basic Tools
– year: 0
  ident: ref41
  publication-title: NXP Semiconductors RoadLINK SAF5400 Single Chip Modem
– start-page: 154
  year: 2005
  ident: ref28
  publication-title: Diffie-Hellman Key Agreement
– ident: ref19
  doi: 10.1016/j.vehcom.2020.100255
– ident: ref6
  doi: 10.1109/MCOM.2009.4939288
– volume: 1609 2a 2017
  start-page: 1
  year: 2017
  ident: ref40
  article-title: IEEE standard for wireless access in vehicular environments-security services for applications and management messages - Amendment 1
– ident: ref1
  doi: 10.1109/TVT.2015.2402166
– volume: 198
  start-page: 1
  year: 2002
  ident: ref31
  article-title: The keyed-hash message authentication code (HMAC
  publication-title: Fed Inf Process Stand Publ
– ident: ref11
  doi: 10.1186/s13638-015-0353-y
– volume: 2021
  start-page: 1
  year: 2021
  ident: ref24
  article-title: Authentication strategies in vehicular communications: A taxonomy and framework
  publication-title: EURASIP J Wireless Commun Netw
– ident: ref49
  doi: 10.17487/rfc7366
– ident: ref48
  doi: 10.1007/978-3-319-61273-7_5
– ident: ref20
  doi: 10.1109/JSYST.2020.2991168
– ident: ref22
  doi: 10.1007/s00521-021-06152-x
– ident: ref5
  doi: 10.1109/TVT.2019.2945339
– ident: ref13
  doi: 10.1109/TVT.2007.906878
– year: 1996
  ident: ref9
  publication-title: Handbook of Applied Cryptography
– ident: ref3
  doi: 10.1109/MCOM.2009.5307471
– year: 2014
  ident: ref44
  article-title: Implementation and performance analysis of identity-based authentication in wireless sensor networks
– ident: ref23
  doi: 10.1109/JIOT.2021.3068268
– ident: ref34
  doi: 10.17487/rfc5869
– year: 2001
  ident: ref29
  article-title: Recommendation for block cipher modes of operation. methods and techniques
  publication-title: Nat Inst of Standards and Technol Gaithersburg MD Comput Secur Div
– ident: ref14
  doi: 10.1109/JCN.2009.6388411
– ident: ref32
  doi: 10.1080/01611194.2012.687431
– ident: ref35
  doi: 10.1007/s00145-014-9185-x
– ident: ref25
  doi: 10.1109/TDSC.2022.3164436
– ident: ref12
  doi: 10.1145/1102219.1102223
– ident: ref45
  doi: 10.1109/TIT.2009.2034881
– year: 2019
  ident: ref47
  article-title: Pairing-friendly curves
– year: 2021
  ident: ref8
  article-title: Privacy-preserving authentication and key management for cooperative intelligent transportation systems
– year: 2003
  ident: ref39
  article-title: OpenSSL: The open source toolkit for SSL/TLS
  publication-title: The Openssl Project
– ident: ref26
  doi: 10.1112/plms/s2-42.1.230
– ident: ref2
  doi: 10.1109/TWC.2014.010214.122008
– ident: ref18
  doi: 10.1109/EuroSP48549.2020.00033
– ident: ref17
  doi: 10.1109/TVT.2020.2996574
– year: 2008
  ident: ref37
  publication-title: Elliptic Curves Number Theory and Cryptography
– ident: ref16
  doi: 10.1007/s10586-017-0848-x
– ident: ref46
  doi: 10.1007/11693383_22
SSID ssj0002511137
Score 2.2603452
Snippet Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred...
SourceID doaj
crossref
ieee
SourceType Open Website
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Australia
Authentication
Cryptography
known-key attack
message forgery attack
perfect forward secrecy
Privacy
Protocols
Roads
Symbols
Vehicular ad hoc networks
SummonAdditionalLinks – databaseName: IEEE Xplore
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB5WT3rwLa4vgngSuzZJ07TeVnFZBBXcB3srSZpc1F3R7sVf76TtFhURb2VISug3Tb6ZzAPgVDFhhHRJ4KJUBcj_dYDkiAY505aGzoq0zK26u4_7o-h2IiYtOG9yYay1ZfCZ7fjH8i4_n5m5d5Vd4FlKUceWYAkNtypXq_GneKpMuawvLmmYXjzcjodoADLW4ci7hWDfjp6yQv-3lirlidJbh7vFWqpAkqfOvNAd8_GjTON_F7sBazW1JN1KFzahZadbsPql4OA2DFEryKBuWUdmjpywHpr2J8R7ynzcUOXAIwOE8sUSJLRk3L2_Gb5fkm5R-HR8oqY5efS7pFt4-3Zg1LsZXveDuq9CYLiMioAnxmrNfHYdC2WsQ6Z4bKWiQudOpArlPEYiZ2WiXKiEEDI3ikY5N8rGWvJdWJ7OpnYPCO4INE4V11zrKPHpmJomoTAyNUo4p9oQLj55Zuqi4773xXNWGh9hmnmUMo9SVqPUhrNmymtVceOvwVcex2agL5ZdChCKrP73MsMiJVObiMSh8eQijZOR9QmjmFQ2d23Y9vA1L6mR2_9dfAArvuV85YY5hOXibW6PkJgU-rjUyE9J_d4l
  priority: 102
  providerName: IEEE
Title The Security of "2FLIP" Authentication Scheme for VANETs: Attacks and Rectifications
URI https://ieeexplore.ieee.org/document/9931425
https://doaj.org/article/c24a79e858f747f4b3216235ca27aedf
Volume 4
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT8MwDI4QJzggYCDGY4omTkhlTdI0LbeBNk2TNiT20G5VkiYn2BCUK78du-2m7QIXLj1EqVXZrv3ZiW1CbjWXViqfBD5KdQD43wQAjliQc-NY6J1My9qq0TgezKLhQi62Rn3hnbCqPXDFuI7lkVapS2TiAfn6yAjOwGVLq7nSLvdofcHnbQVTaIMRODOh6mNMFqad5-F8CuEg5_dAQEnJdxxR2a9_Z8BK6V_6x-SoBoa0W33QCdlzy1NyuNUusEGmIFM6qQfO0ZWnbd6HwLxNMc-Ft36q9BudgCDeHAU4SufdcW_6-UC7RYHF9FQvc_qCNs6vc3VnZNbvTZ8GQT0VIbBCRUUgEuuM4Vgbx0MVm5BrETulmTS5l6mGdREDDHMq0T7UUkqVW82iXFjtYqPEOdlfrpbuglD4n1mcamGEMVGCxZSGJaG0KrVaeq-bJFyzKLN1y3CcXPGalaFDmGbI1Qy5mtVcbZK7zSvvVb-M3zY_It83G7HVdbkACpDVCpD9pQBN0kCpbYgA4GJgiC7_g_YVOcDx8lXK5ZrsFx9f7gZASGFapb7Bc_Tda5VVgz-oNtb_
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT9wwEB1Remg5tKWAuv20UE-I7MZ2HCe9bStWC2W3UgmIW2Q79oWyi2j20l_fmSQbFYRQb5FlR1bexH4z9psB-GyEckqHLApJbiLk_zZCcsSjSljP4-BV3mirZvN0ep6cXKrLDTjstTDe--bymR_SY3OWXy3dikJlI9xLOdrYE3iqSIzbqrX6iAqRZS51d3TJ43z04-SiQBdQiKFE5q2UuLP5NDn67xRVafaUyUuYrWfTXiW5Gq5qO3R_7iVq_N_pvoIXHblk49YatmHDL17D1j8pB3egQLtgZ13ROrYMbF9M0LnfZxQro5tDbQiPnSGY154hpWUX4_lR8fsLG9c1CfKZWVTsJ62TYR3v24XzyVHxbRp1lRUiJ3VSRzJz3lpB-joR69TGwsjUa8OVrYLKDbbLFKmc15kJsVFK6coZnlTSGZ9aLfdgc7Fc-DfAcE3gaW6kldYmGQkyLc9i5XTujArBDCBef_LSdWnHqfrFr7JxP-K8JJRKQqnsUBrAQT_kps258Vjnr4Rj35HSZTcNCEXZ_X2lE4nRuc9UFtB9ConFwcj7lDNCG1-FAewQfP1LOuTePtz8CZ5Ni9lpeXo8__4OnlMB-jYo8x4269uV_4A0pbYfG-v8CweY4W0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Security+of+%222FLIP%22+Authentication+Scheme+for+VANETs%3A+Attacks+and+Rectifications&rft.jtitle=IEEE+open+journal+of+vehicular+technology&rft.au=Mir+Ali+Rezazadeh+Baee&rft.au=Leonie+Simpson&rft.au=Ernest+Foo&rft.au=Josef+Pieprzyk&rft.date=2023-01-01&rft.pub=IEEE&rft.eissn=2644-1330&rft.volume=4&rft.spage=101&rft.epage=113&rft_id=info:doi/10.1109%2FOJVT.2022.3217552&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_c24a79e858f747f4b3216235ca27aedf
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2644-1330&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2644-1330&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2644-1330&client=summon