A vehicular ad hoc network privacy protection scheme without a trusted third party
Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other components. In a vehicular ad hoc network, data transmission and management rely heavily on the wireless channel, which is subject to potent...
Saved in:
Published in | International journal of distributed sensor networks Vol. 13; no. 12; p. 155014771774369 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
London, England
SAGE Publications
01.12.2017
Wiley |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other components. In a vehicular ad hoc network, data transmission and management rely heavily on the wireless channel, which is subject to potential threats such as information leakage and data attacks due to the openness of the automotive network. The construction of a secure and trusted system that does not damage the privacy of vehicular ad hoc networks must be further addressed. Existing works usually focus on the anonymous authentication mechanism but neglect anonymity abuse. Furthermore, they always require a trusted third party as a central authority, which causes some security problems. In view of these problems, this article proposes a scheme that is based on the no-certificate-center algorithm. By security analysis and experiments, the scheme is proved to have higher anonymity and higher efficiency. |
---|---|
AbstractList | Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other components. In a vehicular ad hoc network, data transmission and management rely heavily on the wireless channel, which is subject to potential threats such as information leakage and data attacks due to the openness of the automotive network. The construction of a secure and trusted system that does not damage the privacy of vehicular ad hoc networks must be further addressed. Existing works usually focus on the anonymous authentication mechanism but neglect anonymity abuse. Furthermore, they always require a trusted third party as a central authority, which causes some security problems. In view of these problems, this article proposes a scheme that is based on the no-certificate-center algorithm. By security analysis and experiments, the scheme is proved to have higher anonymity and higher efficiency. |
Author | Xia, Zhihua Bai, Liang Zhao, Shujing Li, Shuifan Wang, Xiaoliang |
Author_xml | – sequence: 1 givenname: Xiaoliang surname: Wang fullname: Wang, Xiaoliang email: xlwang@bama.ua.edu – sequence: 2 givenname: Shuifan surname: Li fullname: Li, Shuifan – sequence: 3 givenname: Shujing surname: Zhao fullname: Zhao, Shujing – sequence: 4 givenname: Zhihua surname: Xia fullname: Xia, Zhihua – sequence: 5 givenname: Liang surname: Bai fullname: Bai, Liang |
BookMark | eNp9UE1Lw0AUXKSCbfXucf9AdDfJbrLHUvwoFATRc3jZvDRb02zZbFv6791Y9VDQ0wzDm3nDTMiosx0ScsvZHedZds-FYDzNssDTRCp5QcaDFA3a6Icnsboik75fM5bIWPIxeZ3RPTZG71pwFCraWE079AfrPujWmT3oY0DrUXtjO9rrBjdID8Y3ducpUO92vceK-sa4im7B-eM1uayh7fHmG6fk_fHhbf4cLV-eFvPZMtJJrnyUVplmtchjiDnjHAFkwgQTaZ4oWYs0zlHXkDMmRIm8qiVKUVUsLxWmEnSZTMnilFtZWBeh7AbcsbBgii_BulUR6hjdYpGWmVY1qkyWkCoJJYtzEKBkyRkLf0MWO2VpZ_veYf2bx1kx7Fuc7xss8syijYdhJe_AtP8Zo5OxhxUWa7tzXZjp7_tPQ6KNOw |
CitedBy_id | crossref_primary_10_1002_dac_4317 crossref_primary_10_1007_s11227_020_03149_6 crossref_primary_10_1109_COMST_2018_2828120 crossref_primary_10_1109_ACCESS_2018_2880984 crossref_primary_10_1016_j_scs_2022_104366 crossref_primary_10_32604_jcs_2022_028792 crossref_primary_10_3390_sym12111762 crossref_primary_10_3390_math10203895 crossref_primary_10_1109_ACCESS_2018_2822806 |
Cites_doi | 10.1007/s10586-013-0260-0 10.1109/TVT.2012.2186992 10.1016/j.ins.2016.12.030 10.1109/TDSC.2014.2355850 10.1016/j.ins.2015.03.070 10.1016/j.vehcom.2014.05.001 10.1002/dac.2468 10.1023/A:1015231126594 10.4156/jdcta.vol6.issue9.20 10.1016/j.ins.2014.10.040 10.1109/TPDS.2010.14 10.15373/2249555X/June2014/32 10.1007/3-540-36178-2_26 10.1109/TPDS.2014.2308215 10.1109/TIFS.2015.2473820 |
ContentType | Journal Article |
Copyright | The Author(s) 2017 |
Copyright_xml | – notice: The Author(s) 2017 |
DBID | AFRWT AAYXX CITATION DOA |
DOI | 10.1177/1550147717743696 |
DatabaseName | Sage Journals GOLD Open Access 2024 CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: DOA name: Open Access: DOAJ - Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: AFRWT name: Sage Journals Open Access url: http://journals.sagepub.com/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1550-1477 |
ExternalDocumentID | oai_doaj_org_article_4b7c9fe976ba496ab028a5a96b100a63 10_1177_1550147717743696 10.1177_1550147717743696 |
GroupedDBID | .4S .DC 0R~ 24P 29J 4.4 54M 5GY 5VS 8FE 8FG AAJEY AAJPV AAKPC AASGM ABAWP ABJCF ABQXT ABUWG ACCMX ACGEJ ACGFS ACIWK ACROE ADBBV ADMLS ADXPE AEDFJ AENEX AEWDL AFCOW AFKRA AFKRG AFRWT AJUZI ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AUTPY AWYRJ AYAKG AZQEC BCNDV BDDNI BENPR BGLVJ BPHCQ CAG CCPQU COF CS3 CWDGH DU5 DWQXO EBS EDO EJD GNUQQ GROUPED_DOAJ H13 HCIFZ I-F IAO ICD IEA IL9 IPNFZ ITC J8X K.F K6V K7- KQ8 L6V M4Z M7S O9- OK1 P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PTHSS RIG RNS ROL SAUOL SCNPE SFC TDBHL TFW TUS TWF TWQ XH6 AAYXX CITATION ACHEB |
ID | FETCH-LOGICAL-c389t-4d7c0f582a21011eaa63050548396f5428ecfa80055be1df6e65dd08b9e46acb3 |
IEDL.DBID | DOA |
ISSN | 1550-1329 1550-1477 |
IngestDate | Wed Aug 27 01:24:03 EDT 2025 Thu Apr 24 23:09:12 EDT 2025 Tue Jul 01 04:10:55 EDT 2025 Tue Jun 17 22:28:54 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 12 |
Keywords | Vehicular ad hoc network anonymity decentralization tracking authentication |
Language | English |
License | This article is distributed under the terms of the Creative Commons Attribution 4.0 License (http://www.creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access pages (https://us.sagepub.com/en-us/nam/open-access-at-sage). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c389t-4d7c0f582a21011eaa63050548396f5428ecfa80055be1df6e65dd08b9e46acb3 |
OpenAccessLink | https://doaj.org/article/4b7c9fe976ba496ab028a5a96b100a63 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_4b7c9fe976ba496ab028a5a96b100a63 crossref_primary_10_1177_1550147717743696 crossref_citationtrail_10_1177_1550147717743696 sage_journals_10_1177_1550147717743696 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2017-12-01 |
PublicationDateYYYYMMDD | 2017-12-01 |
PublicationDate_xml | – month: 12 year: 2017 text: 2017-12-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | London, England |
PublicationPlace_xml | – name: London, England |
PublicationTitle | International journal of distributed sensor networks |
PublicationYear | 2017 |
Publisher | SAGE Publications Wiley |
Publisher_xml | – name: SAGE Publications – name: Wiley |
References | Zhu, Liu, Wei 2013; 16 Brinkhoff 2002; 6 Mejri, Ben-Othman, Hamdi 2014; 1 Shim 2012; 61 Tian, Qiang 2012; 28 Sun, Zhang, Zhang 2010; 21 Wang, Wang, He 2014; 12 Wen, Shao, Xue 2015; 295 Patil, Patil 2015; 3 Liu, Zhang, Li 2012; 33 Li, Lu, Guizani 2015; 26 Wang, Wang, Wang 2015; 321 Zhang, Cui, Xu 2012; 6 Jinila, Komathy 2014; 4 Wang, Zhong, Xu 2016; 18 He, Zeadally, Xu 2015; 10 Ma, Wang, Zhao 2014; 27 Xia, Xiong, Vasilakos 2017; 387 Xia, Zhu, Sun 2015; 295 bibr22-1550147717743696 bibr5-1550147717743696 Lu R (bibr18-1550147717743696) Xia Z (bibr7-1550147717743696) 2015; 295 Tian X (bibr17-1550147717743696) 2012; 28 Wang Y (bibr20-1550147717743696) 2016; 18 bibr11-1550147717743696 bibr3-1550147717743696 bibr12-1550147717743696 bibr14-1550147717743696 bibr16-1550147717743696 bibr15-1550147717743696 bibr6-1550147717743696 bibr1-1550147717743696 bibr4-1550147717743696 Guo J (bibr9-1550147717743696) bibr23-1550147717743696 Patil V (bibr2-1550147717743696) 2015; 3 bibr8-1550147717743696 bibr13-1550147717743696 Calandriello G (bibr10-1550147717743696) Liu F-B (bibr21-1550147717743696) 2012; 33 bibr19-1550147717743696 |
References_xml | – volume: 295 start-page: 395 issue: 1 year: 2015 end-page: 406 article-title: A rapid learning algorithm for vehicle classification publication-title: Inf Sci – volume: 16 start-page: 873 issue: 4 year: 2013 end-page: 886 article-title: PPAS: privacy protection authentication scheme for VANET publication-title: Cluster Comput – volume: 1 start-page: 53 issue: 2 year: 2014 end-page: 66 article-title: Survey on VANET security challenges and possible cryptographic solutions publication-title: Veh Commun – volume: 6 start-page: 157 issue: 9 year: 2012 end-page: 164 article-title: A novel and efficient privacy-preserving authentication protocol in VANETs publication-title: Int J Digit Content Technol Appl – volume: 12 start-page: 428 issue: 4 year: 2014 end-page: 442 article-title: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment publication-title: IEEE T Depend Secure – volume: 6 start-page: 153 issue: 2 year: 2002 end-page: 180 article-title: A framework for generating network-based moving objects publication-title: Geoinformatica – volume: 27 start-page: 2215 issue: 10 year: 2014 end-page: 2227 article-title: Security flaws in two improved remote user authentication schemes using smart cards publication-title: Int J Commun Syst – volume: 3 start-page: 305 issue: 2 year: 2015 end-page: 309 article-title: Secured and privacy preserving navigation for VANET publication-title: Int J Electr Electron Res – volume: 21 start-page: 1227 issue: 9 year: 2010 end-page: 1239 article-title: An identity-based security system for user privacy in vehicular ad hoc networks publication-title: IEEE T Parall Distr – volume: 28 start-page: 170 issue: 10 year: 2012 end-page: 173 article-title: Research of an authentication scheme based on the proxy blind signature scheme for the vehicular ad-hoc networks publication-title: Bull Sci Technol – volume: 26 start-page: 938 issue: 4 year: 2015 end-page: 948 article-title: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs publication-title: IEEE T Parall Distr – volume: 10 start-page: 2681 issue: 12 year: 2015 end-page: 2691 article-title: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks publication-title: IEEE T Inf Foren Sec – volume: 321 start-page: 162 issue: 5 year: 2015 end-page: 178 article-title: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity publication-title: Inf Sci – volume: 4 start-page: 106 year: 2014 end-page: 109 article-title: An efficient authentication scheme for Vanet using Cha Cheon’s ID based signatures publication-title: Indian J Appl Res – volume: 61 start-page: 1874 issue: 4 year: 2012 end-page: 1883 article-title: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks publication-title: IEEE T Veh Technol – volume: 33 start-page: 208 issue: 8 year: 2012 end-page: 213 article-title: Threshold traceability anonymous authentication scheme without trusted center for ad hoc network publication-title: J Commun – volume: 295 start-page: 395 issue: 1 year: 2015 end-page: 406 article-title: Towards privacy-preserving content-based image retrieval in cloud computing publication-title: IEEE Trans Cloud Comput – volume: 387 start-page: 195 year: 2017 end-page: 204 article-title: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing publication-title: Inf Sci – volume: 18 start-page: 374 issue: 2 year: 2016 end-page: 382 article-title: ECPB: efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs publication-title: Int J Netw Secur – ident: bibr15-1550147717743696 doi: 10.1007/s10586-013-0260-0 – volume: 28 start-page: 170 issue: 10 year: 2012 ident: bibr17-1550147717743696 publication-title: Bull Sci Technol – ident: bibr19-1550147717743696 doi: 10.1109/TVT.2012.2186992 – ident: bibr8-1550147717743696 doi: 10.1016/j.ins.2016.12.030 – volume: 33 start-page: 208 issue: 8 year: 2012 ident: bibr21-1550147717743696 publication-title: J Commun – ident: bibr4-1550147717743696 doi: 10.1109/TDSC.2014.2355850 – ident: bibr5-1550147717743696 doi: 10.1016/j.ins.2015.03.070 – ident: bibr1-1550147717743696 doi: 10.1016/j.vehcom.2014.05.001 – ident: bibr3-1550147717743696 doi: 10.1002/dac.2468 – ident: bibr23-1550147717743696 doi: 10.1023/A:1015231126594 – ident: bibr11-1550147717743696 doi: 10.4156/jdcta.vol6.issue9.20 – ident: bibr6-1550147717743696 doi: 10.1016/j.ins.2014.10.040 – ident: bibr12-1550147717743696 doi: 10.1109/TPDS.2010.14 – volume: 3 start-page: 305 issue: 2 year: 2015 ident: bibr2-1550147717743696 publication-title: Int J Electr Electron Res – ident: bibr14-1550147717743696 doi: 10.15373/2249555X/June2014/32 – start-page: 19 volume-title: Proceedings of the fourth ACM international workshop on vehicular ad hoc networks (VANET 07) ident: bibr10-1550147717743696 – start-page: 103 volume-title: Mobile networking for vehicular environments (MOVE) ident: bibr9-1550147717743696 – ident: bibr22-1550147717743696 doi: 10.1007/3-540-36178-2_26 – ident: bibr13-1550147717743696 doi: 10.1109/TPDS.2014.2308215 – volume: 18 start-page: 374 issue: 2 year: 2016 ident: bibr20-1550147717743696 publication-title: Int J Netw Secur – start-page: 1903 volume-title: The 27th conference on computer communications (INFOCOM 2008) ident: bibr18-1550147717743696 – volume: 295 start-page: 395 issue: 1 year: 2015 ident: bibr7-1550147717743696 publication-title: IEEE Trans Cloud Comput – ident: bibr16-1550147717743696 doi: 10.1109/TIFS.2015.2473820 |
SSID | ssj0036261 |
Score | 2.1652937 |
Snippet | Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other... |
SourceID | doaj crossref sage |
SourceType | Open Website Enrichment Source Index Database Publisher |
StartPage | 155014771774369 |
SummonAdditionalLinks | – databaseName: Sage Journals GOLD Open Access 2024 dbid: AFRWT link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fa9swEBZd-rKXdes2lnYteiiDPaixHUm2nkZWGsqgfSgt7ZvRj_MSWJyQOYX8972z5Y5ubOzVyMi-O-k-6e6-Y-wEnVhllQxCG8iFlEoJI70UGrFR5SvjM0P1zpdX-uJWfrtX9zus7mthogR_nlJaFX5Ru1nT6qbb6FEMMo4IV6cyx6MIOkBt9JdNsyi72-6-qQY9ofD0ZkGRbU_5kFvRV7e9YLtZrlU2YLuT6fXdTb93EzdLx7CqEkEt2H8FNv-Y85kja_n-nyWDtf5p-pq9isCSTzpLeMN2oN5ne33TBh7X8Ft2PeEPMJu36afcBj5bel53ueB8tZ4_WL_lkbwBVcbx8AsL4HRdu9w03PK2SAMCb2bzdeArtLztO3Y7Pb85uxCxsYLwiE8aIUPuk0oVmcUDX5qCtXpMHe0koiVdKTyRgK9sQfxcDlBnGrQKISmcAamtd-P3bFAva_jAOIqm8MWYiOJApg6M8SqRPpMqeMhDNmSjXkqlj6zj1PziR5lGovHf5Tpkn5_eWHWMG_8Y-5UE_zSOuLLbB8v19zIuvVK63JsKEHc5K422DiGVVdZolyYJ_vmQfSK1lb3p_XW2g_8deMheZuT926yXj2yAmoEjxC6NO44G9wiiNOXA priority: 102 providerName: SAGE Publications |
Title | A vehicular ad hoc network privacy protection scheme without a trusted third party |
URI | https://journals.sagepub.com/doi/full/10.1177/1550147717743696 https://doaj.org/article/4b7c9fe976ba496ab028a5a96b100a63 |
Volume | 13 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8NAEF2kXrz4LdaPsgcRPIQm6e4me6xiKYqCpcXewn5MaEHTUmOh_97ZJK1VUC9ecggJm7zJ5r1JZt8QcoEklirOrCckRB5jnHuSGeYJ1EapSaUJpVvv_PAougN2N-TDtVZfriastAcugWsyHRmZArKmVkwKpZEQFVdS6MD3lSh8PpHzlslU-Q52HivB50_JptPhAYswdUHCFM6gf42ECq_-L4VcBbd0dsl2JQppu7yYPbIB2T7ZWTZcoNX8OyC9Np3DaFyUjlJl6WhiaFbWcdPpbDxXZkEr4wWEm2LiCq9A3afWyXtOFS0WWICl-Wg8s3SKN784JIPObf-m61VNETyD2iL3mI2Mn_I4VJisBQEoxMB1o2OodETKMZsAk6rYeWtpQLwFCG6tH2sJTCijW0eklk0yOCYUoYlN3HImb8ACDVIa7jMTMm4NRDask-YSpcRUjuGuccVLElQm4d9xrZOr1RnT0i3jl2OvHfCr45zPdbEDo59U0U_-in6dXLqwJdXEe_txtJP_GO2UbIWO1YtqljNSw6jBOWqSXDfIZrvTe-43iscQt_dP8QcNLdvS |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxoxEB6lcEgvbdI0Kk3T-FBFymGb3cX2ro-0KiIpcECgclv5MVuQEkCURsq_z3gxNKRqlevK-_r8mG_smW8APpERK7XgLpIKs4hzISLFLY8kcaPSlsqmyuc79_qyM-LXYzF-VOorIPjrsw-roi-qFuvt7PZ54sKfhGXkhZDtk0q-gDoXtBDXoN5qD34MN8uwl1lZi6WKOPLV1P-cUf71jB2bVEn378R1VaamfQCvAkdkrXWnHsIezt7A6039BRam4xEMWuwOJ9MqkpRpxyZzy2brsG62WE7vtL1nQYeB0Gfkx-ItMr_zOv-9YppV-Rbo2GoyXTq2oEF0_xZG7W_Dr50o1EiILFGNVcRdZuNS5Kkm3y1JUGvZ9MXpOBEfWQpyLtCWOvdSWwYJfolSOBfnRiGX2prmMdRm8xm-A0bQ5DZves035IlBpayIuU25cBYzlzbgcoNSYYOAuK9jcVMkQTP8Ka4NuNjesViLZ_yn7RcP_Ladl72uLsyXP4swiwpuMqtKJAplNFdSG2JHWmglTRLH9OcNOPfdVmxG0T_f9v65Dc9gvzPsdYvuVf_7CbxMvVGvglk-QI16CU-JkqzMxzD4HgAA4dMg |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTxsxEB6VICEuhRZQU6D1AVXisM3uZuxdH9NHRIEihEDltvJjtokESZSmkfj3jDcOFaBWva5mXzMezzf2-BuAAw5itZHoE6WpSBClTDQ6TBRjo9rV2uU6nHf-fqaOrvD4Wl7H2pxwFiZq8NfHUFbFX9RM1sG7J77uxD3GToDVGRaciXD8U1qtwCoi53gtWO31L35cLqfiQLWyIEyVaRI6qv_Zp3z2jEdxqaHvf1Tb1YSb_ia8jDhR9BaGfQUvaPQaNpY9GER0yS246Ik5DYZNNakwXgzGTowWpd1iMh3OjbsTkYuBLSA4l6VbEmH1dfx7JoxozlyQF7PBcOrFhAfS3TZc9b9efj5KYp-ExDHcmCXoC5fWsswN529ZRsaobmhQhwx-VC05wSBXmzLQbVliEyhS0vu0tJpQGWe7O9AajUf0BgSrpnRlN_C-EWaWtHYyRZej9I4Kn7ehs9RS5SKJeOhlcVNlkTf8qV7bcPhwx2RBoPEP2U9B8Q9ygfq6uTCe_qyiJ1VoC6drYhhlDWplLCMkI41WNktT_vM2fAhmq5Yj6a9ve_u_gu9h7fxLvzr9dnayC-t5iOtNPcsetNhItM-oZGbfxbF3D2jA1Dk |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+vehicular+ad+hoc+network+privacy+protection+scheme+without+a+trusted+third+party&rft.jtitle=International+journal+of+distributed+sensor+networks&rft.au=Xiaoliang+Wang&rft.au=Shuifan+Li&rft.au=Shujing+Zhao&rft.au=Zhihua+Xia&rft.date=2017-12-01&rft.pub=Wiley&rft.eissn=1550-1477&rft.volume=13&rft_id=info:doi/10.1177%2F1550147717743696&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_4b7c9fe976ba496ab028a5a96b100a63 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1550-1329&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1550-1329&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1550-1329&client=summon |