[1] S. Chen, H. Xu, D. Liu, B. Hu and H. Wang, "A Vision of IoT: Applications, Challenges andOpportunities with China Perspective,'' IEEE Internet of Things J., vol. 1, no. 4, pp. 349-359, 2014.
[2] C.-M. Chen, Z. Li, A. K. Das, S. A. Chaudhry and P. Lorenz, "Provably Secure Authentication Schemefor Fog Computing-enabled Intelligent Social Internet of Vehicles," IEEE Transactions on Vehicular Technology, vol. 73, no. 9, pp. 13600-13610, DOI: 10.1109/TVT.2024.3382971, Sept. 2024.
[3] S. Mumtaz, A. Bo, A. Al-Dulaimi and K.-F. Tsang, "Guest Editorial 5G and Beyond Mobile Technologiesand Applications for Industrial IoT (IIoT),'' IEEE Transactions on Industrial Informatics, vol. 14, no. 6, pp. 25882591, Jun. 2018.
[4] S. Garg et al., "MobQoS: Mobility-aware and QoS-driven SDN Framework for Autonomous Vehicles,''IEEE Wireless Communications, vol. 26, no. 4, pp. 1220, Aug. 2019.
[5] M. A. Al Sibahee et al., "Blockchain-based Authentication Schemes in Smart Environments: ASystematic Literature Review," IEEE Internet of Things J., vol. 11, no. 21, pp. 34774-34796, 2024.
[6] V.O. Nyangaresi et al., "Energy Efficient Dynamic Symmetric Key Based Protocol for Secure TrafficExchanges in Smart Homes," Applied Sciences, vol. 12, no. 24, p. 12688, 2022.
[7] V.O. Nyangaresi et al., "Smart City Energy Efficient Data Privacy Preservation Protocol Based onBiometrics and Fuzzy Commitment Scheme," Scientific Reports, vol. 14, Article no. 16223, 2024.
[8] V. O. Nyangaresi et al., "Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5GNetworks," Proc. of the 2021 IEEE 2nd Int. Conf. on Signal, Control and Communication (SCC), pp. 188-193, DOI: 10.1109/SCC53769.2021.9768338, Tunis, Tunisia, 2021.
[9] V. O. Nyangaresi et al., "Towards Security and Privacy Preservation in 5G Networks," Proc. of the 202129th Telecommuni. Forum (TELFOR), pp. 1-4, DOI: 10.1109/TELFOR52709.2021.9653385, Belgrade, Serbia, 2021.
[10] G. Rathee et al., "Trusted Orchestration for Smart Decision-making in Internet of Vehicles," IEEEAccess, vol. 8, pp. 157427-157436, 2020.
[11] C.-M. Chen, Q. Miao, S. Kumari, M. K. Khan and J. J. P. C. Rodrigues, "A Privacy-preservingAuthentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain," IEEE Internet of Things J., vol. 11, no. 10, pp. 17538-17551, 15 May15, 2024.
[12] C.-M. Chen et al., "A Secure Authentication Protocol for Internet of Vehicles," IEEE Access, vol. 7, pp.12047-12057, 2019.
[13] J. G. Andrews et al., "What Will 5G Be?" IEEE Journal on Selected Areas in Communications, vol. 32,pp. 1065–1082, 2014.
[14] X. Huang, R. Yu, J. Kang, Y. He and Y. Zhang, "Exploring Mobile Edge Computing for 5G-enabledSoftware Defined Vehicular Networks," IEEE Wireless Communications, vol. 24, pp. 55–63, 2017.
[15] S. A. A. Shah, E. Ahmed, M. Imran and S. Zeadally, "5G for Vehicular Communications," IEEECommunications Magazine, vol. 56, pp. 111–117, 2018.
[16] M. A. Al-Shareeda et al., "Password-guessing Attack-aware Authentication Scheme Based on ChineseRemainder Theorem for 5G-enabled Vehicular Networks," Applied Sciences, vol. 12, no. 3, p. 383, 2022.
[17] B. Parno and A. Perrig, "Challenges in Securing Vehicular Networks,'' Proc. of Workshop Hot TopicsNetwork (HotNets-IV), pp. 1_6, Annapolis, MD, USA, 2005.
[18] S. Capkun and J.-P. Hubaux, "Secure Positioning of Wireless Devices with Application to SensorNetworks,'' Proc. of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1917-1928, Miami, USA, Mar. 2005.
[19] L. Lazos, R. Poovendran and S. Apkun, "ROPE: Robust Position Estimation in Wireless SensorNetworks,'' Proc. of the IEEE 4th Int. Symposium on Information Processing in Sensor Networks (IPSN 2005), Boise, USA, p. 43, 2005.
[20] A. Studer, F. Bai, B. Bellur and A. Perrig, "Flexible, Extensible and Efficient VANET Authentication,'' Journal of Communications and Networks, vol. 11, no. 6, pp. 574-588, Dec. 2009.
[21] X. Lin et al., "TSVC: Timed Efficient and Secure Vehicular Communications with Privacy Preserving,''IEEE Transactions on Wireless Communications, vol. 7, no. 12, pp. 4987-4998, Dec. 2008.
[22] B. Ying, D. Makrakis and H. T. Mouftah, "Privacy Preserving Broadcast Message AuthenticationProtocol for VANETs,'' J. of Network and Computer Applications, vol. 36, no. 5, pp. 1352-1364, 2013.
[23] C. Zhang, R. Lu, X. Lin, P.-H. Ho and X. Shen, "An Efficient Identity-based Batch Verification Schemefor Vehicular Sensor Networks,'' Proc. of the 27th IEE Conf. on Computer Communications (IEEE INFOCOM 2008), pp. 246-250, Phoenix, USA, Apr. 2008.
[24] C. Zhang, P.-H. Ho and J. Tapolcai, "On Batch Verification with Group Testing for VehicularCommunications,'' Wireless Networks, vol. 17, no. 8, p. 1851, 2011.
[25] M. Eltoweissy, S. Olariu and M. Younis, "Towards Autonomous Vehicular Clouds,'' Proc. of the Int.Conf. on Ad Hoc Networks, Part of the Book Series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Eng., vol. 49 pp. 1-16, Berlin, Germany, 2010.
[26] D. Bernstein, N. Vidovic and S. Modi, "A Cloud PAAS for High Scale, Function and Velocity MobileApplications - With Reference Application As the Fully Connected Car,'' Proc. of the 2010 IEEE 5th Int. Conf. on Systems and Networks Communications (ICSNC), pp. 117-123, Nice, France, Aug. 2010.
[27] R. Hussain, J. Son, H. Eun, S. Kimand H. Oh, "Rethinking Vehicular Communications: Merging VANETwith Cloud Computing,'' Proc. of the IEEE 4th Int. Conf. on Cloud Computing Technology and Science Proceedings (CloudCom), pp. 606-609, Taipei, Taiwan, Dec. 2012.
[28] H. Zhong, S. Han, J. Cui, J. Zhang and Y. Xu, "Privacy-preserving Authentication Scheme with FullAggregation," Information Sciences, vol. 476, pp. 211–221, 2019.
[29] M. Azees, P. Vijayakumar and L. J. Deboarh, "EAAP: Efficient Anonymous Authentication withConditional Privacy-preserving Scheme for Vehicular Ad Hoc Networks," IEEE Transactions on Intelligent Transportation Systems, vol. 18, pp. 2467–2476, 2017.
[30] L. Zhang et al., "Distributed Aggregate Privacy-preserving Authentication in VANETs," IEEETransactions on Intelligent Transportation Systems, vol. 18, pp. 516–526, 2016.
[31] M. Bayat et al., "A New and Efficient Authentication Scheme for Vehicular Ad Hoc Networks,"Journal of Intelligent Transportation Systems, vol. 24, pp. 171–183, 2020.
[32] M. Bayat, M. Pournaghi, M. Rahimi and M. Barmshoory, "NERA: A New and Efficient RSU-basedAuthentication Scheme for VANETs," Wireless Networks, vol. 26, pp. 3083–3098, 2020.
[33] S. M. Pournaghi et al., "NECPPA: A Novel and Efficient Conditional Privacy-preserving AuthenticationScheme for VANET," Computer Networks, vol. 134, pp. 78–92, 2018.
[34] M. A. Al-Shareeda et al., "SE-CPPA: A Secure and Efficient Conditional Privacy-preservingAuthentication Scheme in Vehicular Ad Hoc Networks," Sensors, vol. 21, p. 8206, 2021.
[35] D. He, S. Zeadally, B. Xu and X. Huang, "An Efficient Identity-based Conditional Privacy-preservingAuthentication Scheme for Vehicular Ad Hoc Networks," IEEE Transactions on Information Forensics and Security, vol. 10, pp. 2681–2691, 2015.
[36] M. R. Asaar, M. Salmasizadeh, W. Susilo and A. Majidi, "A Secure and Efficient AuthenticationTechnique for Vehicular Ad-hoc Networks," IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5409–5423, 2018.
[37] M. A. Al-Shareeda, M. Anbar, S. Manickam and I. H. Hasbullah, "Towards Identity-based ConditionalPrivacy-preserving Authentication Scheme for Vehicular Ad Hoc Networks," IEEE Access, vol. 9, pp. 113226–113238, 2021.
[38] M. A. Al-Shareeda, M. Anbar, M. A. Alazzawi, S. Manickam and A. S. Al-Hiti, "LSWBVM: ALightweight Security without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network," IEEE Access, vol. 8, pp. 170507-170518, DOI: 10.1109/ACCESS.2020.3024587, 2020.
[39] J. S. Alshudukhi, B. A. Mohammed and Z. G. Al-Mekhlafi, "Conditional Privacy-preservingAuthentication Scheme without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC)," IEEE Access, vol. 8, pp. 222032–222040, 2020.
[40] M. Alazzawi, H. Lu, A. Yassin and K. Chen, "Efficient Conditional Anonymity with Message Integrity and Authentication in a Vehicular Ad hoc Network," IEEE Access, vol. 7, pp. 71424–71435, 2019.
[41] M. A. Alazzawi et al., "ID-PPA: Robust Identity-based Privacy-preserving Authentication Scheme for aVehicular Ad-Hoc Network," Proc. of Advances in Cyber Security (ACeS 2020), Part of Book Series: Communications in Computer and Information Science, vol. 1347, DOI: 10.1007/978-981-33-6835-4_6, Springer, Singapore, 2021.
[42] J. S. Alshudukhi, Z. G. Al-Mekhlafi and B. A. Mohammed, "A Lightweight Authentication with Privacy-preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography," IEEE Access, vol. 9, pp. 15633–15642, 2021.
[43] J. Cui, J. Chen, H. Zhong, J. Zhang and L. Liu, "Reliable and Efficient Content Sharing for 5G-enabledVehicular Networks," IEEE Trans. on Intelligent Transportation Syst., vol. 23, no. 2, pp. 1–13, 2020.
[44] J. Cui, X. Zhang, H. Zhong, Z. Ying and L. Liu, "RSMA: Reputation System-based Lightweight MessageAuthentication Framework and Protocol for 5G-enabled Vehicular Networks," IEEE Internet of Things J., vol. 6, no. 4, pp. 6417–6428, 2019.
[45] J. Zhang, H. Zhong, J. Cui, M. Tian, Y. Xu and L. Liu, "Edge Computing-based Privacy-preservingAuthentication Framework and Protocol for 5G-enabled Vehicular Networks," IEEE Transactions on Vehicular Technology, vol. 69, no. 7, pp. 7940–7954, 2020.
[46] M. A. Al-Shareeda et al., "CM-CPPA: Chaotic Map-based Conditional Privacy-preservingAuthentication Scheme in 5G-enabled Vehicular Networks," Sensors, vol. 22, no. 13, p. 5026, 2022.
[47] M. A. Al-Shareeda et al., "Efficient Conditional Privacy Preservation with Mutual Authentication inVehicular Ad Hoc Networks," IEEE Access, vol. 8, pp. 144957–144968, 2020.
[48] M. A. Alazzawi, H. Lu, A. A.Yassin and K. Chen, "Robust Conditional Privacy-preservingAuthentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks," KSII Trans. on Internet and Information Systems, vol. 13, no. 12, DOI: 10.3837/tiis.2019.12.018, 2019.
[49] T.-Y. Wu, Z. Lee, L. Yang and C.-M. Chen, "A Provably Secure Authentication and Key ExchangeProtocol in Vehicular Ad Hoc Networks," Security and Communication Networks, vol. 2021, no. 1, p. 9944460, 2021.
[50] S. M. Karim et al., "BSDCE-IoV: Blockchain-based Secure Data Collection and Exchange Scheme forIoV in 5G Environment," IEEE Access, vol. 11, pp. 36158-36175, 2023.
[51] Y. Salami, V. Khajehvand and E. Zeinali, "SAIFC: A Secure Authentication Scheme for IOV Based onFog-cloud Federation," Security and Communication Networks, vol. 2023, no. 1, p. 9143563, DOI: 10.1155/2023/9143563, 2023.
[52] Q. Xie and J. Huang, "Improvement of a Conditional Privacy-preserving and Desynchronization-Resistant Authentication Protocol for IoV," Applied Sciences, vol. 14, no. 6, p. 2451, 2024.