A vehicular ad hoc network privacy protection scheme without a trusted third party

Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other components. In a vehicular ad hoc network, data transmission and management rely heavily on the wireless channel, which is subject to potent...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of distributed sensor networks Vol. 13; no. 12; p. 155014771774369
Main Authors Wang, Xiaoliang, Li, Shuifan, Zhao, Shujing, Xia, Zhihua, Bai, Liang
Format Journal Article
LanguageEnglish
Published London, England SAGE Publications 01.12.2017
Wiley
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other components. In a vehicular ad hoc network, data transmission and management rely heavily on the wireless channel, which is subject to potential threats such as information leakage and data attacks due to the openness of the automotive network. The construction of a secure and trusted system that does not damage the privacy of vehicular ad hoc networks must be further addressed. Existing works usually focus on the anonymous authentication mechanism but neglect anonymity abuse. Furthermore, they always require a trusted third party as a central authority, which causes some security problems. In view of these problems, this article proposes a scheme that is based on the no-certificate-center algorithm. By security analysis and experiments, the scheme is proved to have higher anonymity and higher efficiency.
AbstractList Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other components. In a vehicular ad hoc network, data transmission and management rely heavily on the wireless channel, which is subject to potential threats such as information leakage and data attacks due to the openness of the automotive network. The construction of a secure and trusted system that does not damage the privacy of vehicular ad hoc networks must be further addressed. Existing works usually focus on the anonymous authentication mechanism but neglect anonymity abuse. Furthermore, they always require a trusted third party as a central authority, which causes some security problems. In view of these problems, this article proposes a scheme that is based on the no-certificate-center algorithm. By security analysis and experiments, the scheme is proved to have higher anonymity and higher efficiency.
Author Xia, Zhihua
Bai, Liang
Zhao, Shujing
Li, Shuifan
Wang, Xiaoliang
Author_xml – sequence: 1
  givenname: Xiaoliang
  surname: Wang
  fullname: Wang, Xiaoliang
  email: xlwang@bama.ua.edu
– sequence: 2
  givenname: Shuifan
  surname: Li
  fullname: Li, Shuifan
– sequence: 3
  givenname: Shujing
  surname: Zhao
  fullname: Zhao, Shujing
– sequence: 4
  givenname: Zhihua
  surname: Xia
  fullname: Xia, Zhihua
– sequence: 5
  givenname: Liang
  surname: Bai
  fullname: Bai, Liang
BookMark eNp9UE1Lw0AUXKSCbfXucf9AdDfJbrLHUvwoFATRc3jZvDRb02zZbFv6791Y9VDQ0wzDm3nDTMiosx0ScsvZHedZds-FYDzNssDTRCp5QcaDFA3a6Icnsboik75fM5bIWPIxeZ3RPTZG71pwFCraWE079AfrPujWmT3oY0DrUXtjO9rrBjdID8Y3ducpUO92vceK-sa4im7B-eM1uayh7fHmG6fk_fHhbf4cLV-eFvPZMtJJrnyUVplmtchjiDnjHAFkwgQTaZ4oWYs0zlHXkDMmRIm8qiVKUVUsLxWmEnSZTMnilFtZWBeh7AbcsbBgii_BulUR6hjdYpGWmVY1qkyWkCoJJYtzEKBkyRkLf0MWO2VpZ_veYf2bx1kx7Fuc7xss8syijYdhJe_AtP8Zo5OxhxUWa7tzXZjp7_tPQ6KNOw
CitedBy_id crossref_primary_10_1002_dac_4317
crossref_primary_10_1007_s11227_020_03149_6
crossref_primary_10_1109_COMST_2018_2828120
crossref_primary_10_1109_ACCESS_2018_2880984
crossref_primary_10_1016_j_scs_2022_104366
crossref_primary_10_32604_jcs_2022_028792
crossref_primary_10_3390_sym12111762
crossref_primary_10_3390_math10203895
crossref_primary_10_1109_ACCESS_2018_2822806
Cites_doi 10.1007/s10586-013-0260-0
10.1109/TVT.2012.2186992
10.1016/j.ins.2016.12.030
10.1109/TDSC.2014.2355850
10.1016/j.ins.2015.03.070
10.1016/j.vehcom.2014.05.001
10.1002/dac.2468
10.1023/A:1015231126594
10.4156/jdcta.vol6.issue9.20
10.1016/j.ins.2014.10.040
10.1109/TPDS.2010.14
10.15373/2249555X/June2014/32
10.1007/3-540-36178-2_26
10.1109/TPDS.2014.2308215
10.1109/TIFS.2015.2473820
ContentType Journal Article
Copyright The Author(s) 2017
Copyright_xml – notice: The Author(s) 2017
DBID AFRWT
AAYXX
CITATION
DOA
DOI 10.1177/1550147717743696
DatabaseName Sage Journals GOLD Open Access 2024
CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: DOA
  name: Open Access: DOAJ - Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: AFRWT
  name: Sage Journals Open Access
  url: http://journals.sagepub.com/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1550-1477
ExternalDocumentID oai_doaj_org_article_4b7c9fe976ba496ab028a5a96b100a63
10_1177_1550147717743696
10.1177_1550147717743696
GroupedDBID .4S
.DC
0R~
24P
29J
4.4
54M
5GY
5VS
8FE
8FG
AAJEY
AAJPV
AAKPC
AASGM
ABAWP
ABJCF
ABQXT
ABUWG
ACCMX
ACGEJ
ACGFS
ACIWK
ACROE
ADBBV
ADMLS
ADXPE
AEDFJ
AENEX
AEWDL
AFCOW
AFKRA
AFKRG
AFRWT
AJUZI
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
AUTPY
AWYRJ
AYAKG
AZQEC
BCNDV
BDDNI
BENPR
BGLVJ
BPHCQ
CAG
CCPQU
COF
CS3
CWDGH
DU5
DWQXO
EBS
EDO
EJD
GNUQQ
GROUPED_DOAJ
H13
HCIFZ
I-F
IAO
ICD
IEA
IL9
IPNFZ
ITC
J8X
K.F
K6V
K7-
KQ8
L6V
M4Z
M7S
O9-
OK1
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PTHSS
RIG
RNS
ROL
SAUOL
SCNPE
SFC
TDBHL
TFW
TUS
TWF
TWQ
XH6
AAYXX
CITATION
ACHEB
ID FETCH-LOGICAL-c389t-4d7c0f582a21011eaa63050548396f5428ecfa80055be1df6e65dd08b9e46acb3
IEDL.DBID DOA
ISSN 1550-1329
1550-1477
IngestDate Wed Aug 27 01:24:03 EDT 2025
Thu Apr 24 23:09:12 EDT 2025
Tue Jul 01 04:10:55 EDT 2025
Tue Jun 17 22:28:54 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 12
Keywords Vehicular ad hoc network
anonymity
decentralization
tracking
authentication
Language English
License This article is distributed under the terms of the Creative Commons Attribution 4.0 License (http://www.creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access pages (https://us.sagepub.com/en-us/nam/open-access-at-sage).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c389t-4d7c0f582a21011eaa63050548396f5428ecfa80055be1df6e65dd08b9e46acb3
OpenAccessLink https://doaj.org/article/4b7c9fe976ba496ab028a5a96b100a63
ParticipantIDs doaj_primary_oai_doaj_org_article_4b7c9fe976ba496ab028a5a96b100a63
crossref_primary_10_1177_1550147717743696
crossref_citationtrail_10_1177_1550147717743696
sage_journals_10_1177_1550147717743696
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2017-12-01
PublicationDateYYYYMMDD 2017-12-01
PublicationDate_xml – month: 12
  year: 2017
  text: 2017-12-01
  day: 01
PublicationDecade 2010
PublicationPlace London, England
PublicationPlace_xml – name: London, England
PublicationTitle International journal of distributed sensor networks
PublicationYear 2017
Publisher SAGE Publications
Wiley
Publisher_xml – name: SAGE Publications
– name: Wiley
References Zhu, Liu, Wei 2013; 16
Brinkhoff 2002; 6
Mejri, Ben-Othman, Hamdi 2014; 1
Shim 2012; 61
Tian, Qiang 2012; 28
Sun, Zhang, Zhang 2010; 21
Wang, Wang, He 2014; 12
Wen, Shao, Xue 2015; 295
Patil, Patil 2015; 3
Liu, Zhang, Li 2012; 33
Li, Lu, Guizani 2015; 26
Wang, Wang, Wang 2015; 321
Zhang, Cui, Xu 2012; 6
Jinila, Komathy 2014; 4
Wang, Zhong, Xu 2016; 18
He, Zeadally, Xu 2015; 10
Ma, Wang, Zhao 2014; 27
Xia, Xiong, Vasilakos 2017; 387
Xia, Zhu, Sun 2015; 295
bibr22-1550147717743696
bibr5-1550147717743696
Lu R (bibr18-1550147717743696)
Xia Z (bibr7-1550147717743696) 2015; 295
Tian X (bibr17-1550147717743696) 2012; 28
Wang Y (bibr20-1550147717743696) 2016; 18
bibr11-1550147717743696
bibr3-1550147717743696
bibr12-1550147717743696
bibr14-1550147717743696
bibr16-1550147717743696
bibr15-1550147717743696
bibr6-1550147717743696
bibr1-1550147717743696
bibr4-1550147717743696
Guo J (bibr9-1550147717743696)
bibr23-1550147717743696
Patil V (bibr2-1550147717743696) 2015; 3
bibr8-1550147717743696
bibr13-1550147717743696
Calandriello G (bibr10-1550147717743696)
Liu F-B (bibr21-1550147717743696) 2012; 33
bibr19-1550147717743696
References_xml – volume: 295
  start-page: 395
  issue: 1
  year: 2015
  end-page: 406
  article-title: A rapid learning algorithm for vehicle classification
  publication-title: Inf Sci
– volume: 16
  start-page: 873
  issue: 4
  year: 2013
  end-page: 886
  article-title: PPAS: privacy protection authentication scheme for VANET
  publication-title: Cluster Comput
– volume: 1
  start-page: 53
  issue: 2
  year: 2014
  end-page: 66
  article-title: Survey on VANET security challenges and possible cryptographic solutions
  publication-title: Veh Commun
– volume: 6
  start-page: 157
  issue: 9
  year: 2012
  end-page: 164
  article-title: A novel and efficient privacy-preserving authentication protocol in VANETs
  publication-title: Int J Digit Content Technol Appl
– volume: 12
  start-page: 428
  issue: 4
  year: 2014
  end-page: 442
  article-title: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
  publication-title: IEEE T Depend Secure
– volume: 6
  start-page: 153
  issue: 2
  year: 2002
  end-page: 180
  article-title: A framework for generating network-based moving objects
  publication-title: Geoinformatica
– volume: 27
  start-page: 2215
  issue: 10
  year: 2014
  end-page: 2227
  article-title: Security flaws in two improved remote user authentication schemes using smart cards
  publication-title: Int J Commun Syst
– volume: 3
  start-page: 305
  issue: 2
  year: 2015
  end-page: 309
  article-title: Secured and privacy preserving navigation for VANET
  publication-title: Int J Electr Electron Res
– volume: 21
  start-page: 1227
  issue: 9
  year: 2010
  end-page: 1239
  article-title: An identity-based security system for user privacy in vehicular ad hoc networks
  publication-title: IEEE T Parall Distr
– volume: 28
  start-page: 170
  issue: 10
  year: 2012
  end-page: 173
  article-title: Research of an authentication scheme based on the proxy blind signature scheme for the vehicular ad-hoc networks
  publication-title: Bull Sci Technol
– volume: 26
  start-page: 938
  issue: 4
  year: 2015
  end-page: 948
  article-title: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
  publication-title: IEEE T Parall Distr
– volume: 10
  start-page: 2681
  issue: 12
  year: 2015
  end-page: 2691
  article-title: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
  publication-title: IEEE T Inf Foren Sec
– volume: 321
  start-page: 162
  issue: 5
  year: 2015
  end-page: 178
  article-title: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
  publication-title: Inf Sci
– volume: 4
  start-page: 106
  year: 2014
  end-page: 109
  article-title: An efficient authentication scheme for Vanet using Cha Cheon’s ID based signatures
  publication-title: Indian J Appl Res
– volume: 61
  start-page: 1874
  issue: 4
  year: 2012
  end-page: 1883
  article-title: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks
  publication-title: IEEE T Veh Technol
– volume: 33
  start-page: 208
  issue: 8
  year: 2012
  end-page: 213
  article-title: Threshold traceability anonymous authentication scheme without trusted center for ad hoc network
  publication-title: J Commun
– volume: 295
  start-page: 395
  issue: 1
  year: 2015
  end-page: 406
  article-title: Towards privacy-preserving content-based image retrieval in cloud computing
  publication-title: IEEE Trans Cloud Comput
– volume: 387
  start-page: 195
  year: 2017
  end-page: 204
  article-title: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing
  publication-title: Inf Sci
– volume: 18
  start-page: 374
  issue: 2
  year: 2016
  end-page: 382
  article-title: ECPB: efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs
  publication-title: Int J Netw Secur
– ident: bibr15-1550147717743696
  doi: 10.1007/s10586-013-0260-0
– volume: 28
  start-page: 170
  issue: 10
  year: 2012
  ident: bibr17-1550147717743696
  publication-title: Bull Sci Technol
– ident: bibr19-1550147717743696
  doi: 10.1109/TVT.2012.2186992
– ident: bibr8-1550147717743696
  doi: 10.1016/j.ins.2016.12.030
– volume: 33
  start-page: 208
  issue: 8
  year: 2012
  ident: bibr21-1550147717743696
  publication-title: J Commun
– ident: bibr4-1550147717743696
  doi: 10.1109/TDSC.2014.2355850
– ident: bibr5-1550147717743696
  doi: 10.1016/j.ins.2015.03.070
– ident: bibr1-1550147717743696
  doi: 10.1016/j.vehcom.2014.05.001
– ident: bibr3-1550147717743696
  doi: 10.1002/dac.2468
– ident: bibr23-1550147717743696
  doi: 10.1023/A:1015231126594
– ident: bibr11-1550147717743696
  doi: 10.4156/jdcta.vol6.issue9.20
– ident: bibr6-1550147717743696
  doi: 10.1016/j.ins.2014.10.040
– ident: bibr12-1550147717743696
  doi: 10.1109/TPDS.2010.14
– volume: 3
  start-page: 305
  issue: 2
  year: 2015
  ident: bibr2-1550147717743696
  publication-title: Int J Electr Electron Res
– ident: bibr14-1550147717743696
  doi: 10.15373/2249555X/June2014/32
– start-page: 19
  volume-title: Proceedings of the fourth ACM international workshop on vehicular ad hoc networks (VANET 07)
  ident: bibr10-1550147717743696
– start-page: 103
  volume-title: Mobile networking for vehicular environments (MOVE)
  ident: bibr9-1550147717743696
– ident: bibr22-1550147717743696
  doi: 10.1007/3-540-36178-2_26
– ident: bibr13-1550147717743696
  doi: 10.1109/TPDS.2014.2308215
– volume: 18
  start-page: 374
  issue: 2
  year: 2016
  ident: bibr20-1550147717743696
  publication-title: Int J Netw Secur
– start-page: 1903
  volume-title: The 27th conference on computer communications (INFOCOM 2008)
  ident: bibr18-1550147717743696
– volume: 295
  start-page: 395
  issue: 1
  year: 2015
  ident: bibr7-1550147717743696
  publication-title: IEEE Trans Cloud Comput
– ident: bibr16-1550147717743696
  doi: 10.1109/TIFS.2015.2473820
SSID ssj0036261
Score 2.1652937
Snippet Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other...
SourceID doaj
crossref
sage
SourceType Open Website
Enrichment Source
Index Database
Publisher
StartPage 155014771774369
SummonAdditionalLinks – databaseName: Sage Journals GOLD Open Access 2024
  dbid: AFRWT
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fa9swEBZd-rKXdes2lnYteiiDPaixHUm2nkZWGsqgfSgt7ZvRj_MSWJyQOYX8972z5Y5ubOzVyMi-O-k-6e6-Y-wEnVhllQxCG8iFlEoJI70UGrFR5SvjM0P1zpdX-uJWfrtX9zus7mthogR_nlJaFX5Ru1nT6qbb6FEMMo4IV6cyx6MIOkBt9JdNsyi72-6-qQY9ofD0ZkGRbU_5kFvRV7e9YLtZrlU2YLuT6fXdTb93EzdLx7CqEkEt2H8FNv-Y85kja_n-nyWDtf5p-pq9isCSTzpLeMN2oN5ne33TBh7X8Ft2PeEPMJu36afcBj5bel53ueB8tZ4_WL_lkbwBVcbx8AsL4HRdu9w03PK2SAMCb2bzdeArtLztO3Y7Pb85uxCxsYLwiE8aIUPuk0oVmcUDX5qCtXpMHe0koiVdKTyRgK9sQfxcDlBnGrQKISmcAamtd-P3bFAva_jAOIqm8MWYiOJApg6M8SqRPpMqeMhDNmSjXkqlj6zj1PziR5lGovHf5Tpkn5_eWHWMG_8Y-5UE_zSOuLLbB8v19zIuvVK63JsKEHc5K422DiGVVdZolyYJ_vmQfSK1lb3p_XW2g_8deMheZuT926yXj2yAmoEjxC6NO44G9wiiNOXA
  priority: 102
  providerName: SAGE Publications
Title A vehicular ad hoc network privacy protection scheme without a trusted third party
URI https://journals.sagepub.com/doi/full/10.1177/1550147717743696
https://doaj.org/article/4b7c9fe976ba496ab028a5a96b100a63
Volume 13
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8NAEF2kXrz4LdaPsgcRPIQm6e4me6xiKYqCpcXewn5MaEHTUmOh_97ZJK1VUC9ecggJm7zJ5r1JZt8QcoEklirOrCckRB5jnHuSGeYJ1EapSaUJpVvv_PAougN2N-TDtVZfriastAcugWsyHRmZArKmVkwKpZEQFVdS6MD3lSh8PpHzlslU-Q52HivB50_JptPhAYswdUHCFM6gf42ECq_-L4VcBbd0dsl2JQppu7yYPbIB2T7ZWTZcoNX8OyC9Np3DaFyUjlJl6WhiaFbWcdPpbDxXZkEr4wWEm2LiCq9A3afWyXtOFS0WWICl-Wg8s3SKN784JIPObf-m61VNETyD2iL3mI2Mn_I4VJisBQEoxMB1o2OodETKMZsAk6rYeWtpQLwFCG6tH2sJTCijW0eklk0yOCYUoYlN3HImb8ACDVIa7jMTMm4NRDask-YSpcRUjuGuccVLElQm4d9xrZOr1RnT0i3jl2OvHfCr45zPdbEDo59U0U_-in6dXLqwJdXEe_txtJP_GO2UbIWO1YtqljNSw6jBOWqSXDfIZrvTe-43iscQt_dP8QcNLdvS
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxoxEB6lcEgvbdI0Kk3T-FBFymGb3cX2ro-0KiIpcECgclv5MVuQEkCURsq_z3gxNKRqlevK-_r8mG_smW8APpERK7XgLpIKs4hzISLFLY8kcaPSlsqmyuc79_qyM-LXYzF-VOorIPjrsw-roi-qFuvt7PZ54sKfhGXkhZDtk0q-gDoXtBDXoN5qD34MN8uwl1lZi6WKOPLV1P-cUf71jB2bVEn378R1VaamfQCvAkdkrXWnHsIezt7A6039BRam4xEMWuwOJ9MqkpRpxyZzy2brsG62WE7vtL1nQYeB0Gfkx-ItMr_zOv-9YppV-Rbo2GoyXTq2oEF0_xZG7W_Dr50o1EiILFGNVcRdZuNS5Kkm3y1JUGvZ9MXpOBEfWQpyLtCWOvdSWwYJfolSOBfnRiGX2prmMdRm8xm-A0bQ5DZves035IlBpayIuU25cBYzlzbgcoNSYYOAuK9jcVMkQTP8Ka4NuNjesViLZ_yn7RcP_Ladl72uLsyXP4swiwpuMqtKJAplNFdSG2JHWmglTRLH9OcNOPfdVmxG0T_f9v65Dc9gvzPsdYvuVf_7CbxMvVGvglk-QI16CU-JkqzMxzD4HgAA4dMg
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTxsxEB6VICEuhRZQU6D1AVXisM3uZuxdH9NHRIEihEDltvJjtokESZSmkfj3jDcOFaBWva5mXzMezzf2-BuAAw5itZHoE6WpSBClTDQ6TBRjo9rV2uU6nHf-fqaOrvD4Wl7H2pxwFiZq8NfHUFbFX9RM1sG7J77uxD3GToDVGRaciXD8U1qtwCoi53gtWO31L35cLqfiQLWyIEyVaRI6qv_Zp3z2jEdxqaHvf1Tb1YSb_ia8jDhR9BaGfQUvaPQaNpY9GER0yS246Ik5DYZNNakwXgzGTowWpd1iMh3OjbsTkYuBLSA4l6VbEmH1dfx7JoxozlyQF7PBcOrFhAfS3TZc9b9efj5KYp-ExDHcmCXoC5fWsswN529ZRsaobmhQhwx-VC05wSBXmzLQbVliEyhS0vu0tJpQGWe7O9AajUf0BgSrpnRlN_C-EWaWtHYyRZej9I4Kn7ehs9RS5SKJeOhlcVNlkTf8qV7bcPhwx2RBoPEP2U9B8Q9ygfq6uTCe_qyiJ1VoC6drYhhlDWplLCMkI41WNktT_vM2fAhmq5Yj6a9ve_u_gu9h7fxLvzr9dnayC-t5iOtNPcsetNhItM-oZGbfxbF3D2jA1Dk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+vehicular+ad+hoc+network+privacy+protection+scheme+without+a+trusted+third+party&rft.jtitle=International+journal+of+distributed+sensor+networks&rft.au=Xiaoliang+Wang&rft.au=Shuifan+Li&rft.au=Shujing+Zhao&rft.au=Zhihua+Xia&rft.date=2017-12-01&rft.pub=Wiley&rft.eissn=1550-1477&rft.volume=13&rft_id=info:doi/10.1177%2F1550147717743696&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_4b7c9fe976ba496ab028a5a96b100a63
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1550-1329&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1550-1329&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1550-1329&client=summon