A Scalable Authentication Scheme with Anonymity for Vehicular Networks Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.38124/ijisrt/25aug1022
The extensive development of vehicle networks, particularly Vehicular Ad-Hoc Networks (VANETs), has revolutionized the area of road safety, traffic management, and entertainment services of transportation systems. However, maintaining privacy protection and scalability in the network is a tremendous task in the context of the dynamic movement of vehicles and a need for immediate, effective communication. This article presents a new privacy-preserving and scalable authentication protocol (PPSAP) for VANETs with the purpose of addressing the intrinsic problems of user privacy, security, and scalability. Our protocol integrates elliptic curve cryptography (ECC), digital signatures, and light-weight authentication protocols to ensure secure communication while not infringing vehicle privacy. Simulation results indicate that PPSAP ensures significantly improved security, privacy, and scalability compared to existing protocols.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.38124/ijisrt/25aug1022
- OA Status
- gold
- References
- 7
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4413739907
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4413739907Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.38124/ijisrt/25aug1022Digital Object Identifier
- Title
-
A Scalable Authentication Scheme with Anonymity for Vehicular NetworksWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-08-27Full publication date if available
- Authors
-
Mukul Yadav, Samta Jaın GoyalList of authors in order
- Landing page
-
https://doi.org/10.38124/ijisrt/25aug1022Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.38124/ijisrt/25aug1022Direct OA link when available
- Concepts
-
Anonymity, Scalability, Scheme (mathematics), Computer science, Authentication (law), Computer network, Computer security, Vehicular ad hoc network, Telecommunications, Wireless ad hoc network, Wireless, Mathematics, Mathematical analysis, DatabaseTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
7Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4413739907 |
|---|---|
| doi | https://doi.org/10.38124/ijisrt/25aug1022 |
| ids.doi | https://doi.org/10.38124/ijisrt/25aug1022 |
| ids.openalex | https://openalex.org/W4413739907 |
| fwci | 0.0 |
| type | article |
| title | A Scalable Authentication Scheme with Anonymity for Vehicular Networks |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 1331 |
| biblio.first_page | 1326 |
| topics[0].id | https://openalex.org/T10761 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2208 |
| topics[0].subfield.display_name | Electrical and Electronic Engineering |
| topics[0].display_name | Vehicular Ad Hoc Networks (VANETs) |
| topics[1].id | https://openalex.org/T11504 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9987999796867371 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Advanced Authentication Protocols Security |
| topics[2].id | https://openalex.org/T11800 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9919999837875366 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | User Authentication and Security Systems |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C178005623 |
| concepts[0].level | 2 |
| concepts[0].score | 0.847807765007019 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q308859 |
| concepts[0].display_name | Anonymity |
| concepts[1].id | https://openalex.org/C48044578 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6531904339790344 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q727490 |
| concepts[1].display_name | Scalability |
| concepts[2].id | https://openalex.org/C77618280 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6524200439453125 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[2].display_name | Scheme (mathematics) |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.6474575996398926 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C148417208 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5840186476707458 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[4].display_name | Authentication (law) |
| concepts[5].id | https://openalex.org/C31258907 |
| concepts[5].level | 1 |
| concepts[5].score | 0.5536009669303894 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[5].display_name | Computer network |
| concepts[6].id | https://openalex.org/C38652104 |
| concepts[6].level | 1 |
| concepts[6].score | 0.50749272108078 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[6].display_name | Computer security |
| concepts[7].id | https://openalex.org/C192448918 |
| concepts[7].level | 4 |
| concepts[7].score | 0.4405193328857422 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q682677 |
| concepts[7].display_name | Vehicular ad hoc network |
| concepts[8].id | https://openalex.org/C76155785 |
| concepts[8].level | 1 |
| concepts[8].score | 0.2044791877269745 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[8].display_name | Telecommunications |
| concepts[9].id | https://openalex.org/C94523657 |
| concepts[9].level | 3 |
| concepts[9].score | 0.14359453320503235 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q4085781 |
| concepts[9].display_name | Wireless ad hoc network |
| concepts[10].id | https://openalex.org/C555944384 |
| concepts[10].level | 2 |
| concepts[10].score | 0.0735369622707367 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q249 |
| concepts[10].display_name | Wireless |
| concepts[11].id | https://openalex.org/C33923547 |
| concepts[11].level | 0 |
| concepts[11].score | 0.05353245139122009 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[11].display_name | Mathematics |
| concepts[12].id | https://openalex.org/C134306372 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[12].display_name | Mathematical analysis |
| concepts[13].id | https://openalex.org/C77088390 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[13].display_name | Database |
| keywords[0].id | https://openalex.org/keywords/anonymity |
| keywords[0].score | 0.847807765007019 |
| keywords[0].display_name | Anonymity |
| keywords[1].id | https://openalex.org/keywords/scalability |
| keywords[1].score | 0.6531904339790344 |
| keywords[1].display_name | Scalability |
| keywords[2].id | https://openalex.org/keywords/scheme |
| keywords[2].score | 0.6524200439453125 |
| keywords[2].display_name | Scheme (mathematics) |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.6474575996398926 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/authentication |
| keywords[4].score | 0.5840186476707458 |
| keywords[4].display_name | Authentication (law) |
| keywords[5].id | https://openalex.org/keywords/computer-network |
| keywords[5].score | 0.5536009669303894 |
| keywords[5].display_name | Computer network |
| keywords[6].id | https://openalex.org/keywords/computer-security |
| keywords[6].score | 0.50749272108078 |
| keywords[6].display_name | Computer security |
| keywords[7].id | https://openalex.org/keywords/vehicular-ad-hoc-network |
| keywords[7].score | 0.4405193328857422 |
| keywords[7].display_name | Vehicular ad hoc network |
| keywords[8].id | https://openalex.org/keywords/telecommunications |
| keywords[8].score | 0.2044791877269745 |
| keywords[8].display_name | Telecommunications |
| keywords[9].id | https://openalex.org/keywords/wireless-ad-hoc-network |
| keywords[9].score | 0.14359453320503235 |
| keywords[9].display_name | Wireless ad hoc network |
| keywords[10].id | https://openalex.org/keywords/wireless |
| keywords[10].score | 0.0735369622707367 |
| keywords[10].display_name | Wireless |
| keywords[11].id | https://openalex.org/keywords/mathematics |
| keywords[11].score | 0.05353245139122009 |
| keywords[11].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.38124/ijisrt/25aug1022 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Innovative Science and Research Technology |
| locations[0].landing_page_url | https://doi.org/10.38124/ijisrt/25aug1022 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101923585 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-0752-7847 |
| authorships[0].author.display_name | Mukul Yadav |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Mahendra Singh Yadav |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5022916696 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-7055-8144 |
| authorships[1].author.display_name | Samta Jaın Goyal |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Samta Jain Goyal |
| authorships[1].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.38124/ijisrt/25aug1022 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A Scalable Authentication Scheme with Anonymity for Vehicular Networks |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10761 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2208 |
| primary_topic.subfield.display_name | Electrical and Electronic Engineering |
| primary_topic.display_name | Vehicular Ad Hoc Networks (VANETs) |
| related_works | https://openalex.org/W1966494590, https://openalex.org/W2016593366, https://openalex.org/W1593132758, https://openalex.org/W2117874351, https://openalex.org/W4206398305, https://openalex.org/W3023934611, https://openalex.org/W2086251583, https://openalex.org/W2242172122, https://openalex.org/W3025994448, https://openalex.org/W2888823465 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.38124/ijisrt/25aug1022 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Innovative Science and Research Technology |
| best_oa_location.landing_page_url | https://doi.org/10.38124/ijisrt/25aug1022 |
| primary_location.id | doi:10.38124/ijisrt/25aug1022 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Innovative Science and Research Technology |
| primary_location.landing_page_url | https://doi.org/10.38124/ijisrt/25aug1022 |
| publication_date | 2025-08-27 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W3210259347, https://openalex.org/W3111727118, https://openalex.org/W4380185282, https://openalex.org/W1567669944, https://openalex.org/W3134621771, https://openalex.org/W4296696141, https://openalex.org/W3165722858 |
| referenced_works_count | 7 |
| abstract_inverted_index.a | 36, 49, 58 |
| abstract_inverted_index.in | 32, 39 |
| abstract_inverted_index.is | 35 |
| abstract_inverted_index.of | 3, 15, 23, 42, 46, 71, 76 |
| abstract_inverted_index.to | 95, 117 |
| abstract_inverted_index.Our | 82 |
| abstract_inverted_index.The | 0 |
| abstract_inverted_index.and | 20, 30, 48, 61, 80, 91, 114 |
| abstract_inverted_index.for | 51, 66 |
| abstract_inverted_index.has | 11 |
| abstract_inverted_index.new | 59 |
| abstract_inverted_index.not | 100 |
| abstract_inverted_index.the | 13, 33, 40, 43, 69, 73 |
| abstract_inverted_index.This | 55 |
| abstract_inverted_index.area | 14 |
| abstract_inverted_index.need | 50 |
| abstract_inverted_index.road | 16 |
| abstract_inverted_index.task | 38 |
| abstract_inverted_index.that | 107 |
| abstract_inverted_index.user | 77 |
| abstract_inverted_index.with | 68 |
| abstract_inverted_index.PPSAP | 108 |
| abstract_inverted_index.curve | 86 |
| abstract_inverted_index.while | 99 |
| abstract_inverted_index.(ECC), | 88 |
| abstract_inverted_index.Ad-Hoc | 8 |
| abstract_inverted_index.VANETs | 67 |
| abstract_inverted_index.ensure | 96 |
| abstract_inverted_index.secure | 97 |
| abstract_inverted_index.(PPSAP) | 65 |
| abstract_inverted_index.article | 56 |
| abstract_inverted_index.context | 41 |
| abstract_inverted_index.digital | 89 |
| abstract_inverted_index.dynamic | 44 |
| abstract_inverted_index.ensures | 109 |
| abstract_inverted_index.network | 34 |
| abstract_inverted_index.privacy | 28 |
| abstract_inverted_index.purpose | 70 |
| abstract_inverted_index.results | 105 |
| abstract_inverted_index.safety, | 17 |
| abstract_inverted_index.traffic | 18 |
| abstract_inverted_index.vehicle | 4, 102 |
| abstract_inverted_index.However, | 26 |
| abstract_inverted_index.Networks | 9 |
| abstract_inverted_index.compared | 116 |
| abstract_inverted_index.elliptic | 85 |
| abstract_inverted_index.existing | 118 |
| abstract_inverted_index.improved | 111 |
| abstract_inverted_index.indicate | 106 |
| abstract_inverted_index.movement | 45 |
| abstract_inverted_index.presents | 57 |
| abstract_inverted_index.privacy, | 78, 113 |
| abstract_inverted_index.privacy. | 103 |
| abstract_inverted_index.problems | 75 |
| abstract_inverted_index.protocol | 64, 83 |
| abstract_inverted_index.scalable | 62 |
| abstract_inverted_index.services | 22 |
| abstract_inverted_index.systems. | 25 |
| abstract_inverted_index.vehicles | 47 |
| abstract_inverted_index.(VANETs), | 10 |
| abstract_inverted_index.Vehicular | 7 |
| abstract_inverted_index.effective | 53 |
| abstract_inverted_index.extensive | 1 |
| abstract_inverted_index.intrinsic | 74 |
| abstract_inverted_index.networks, | 5 |
| abstract_inverted_index.protocols | 94 |
| abstract_inverted_index.security, | 79, 112 |
| abstract_inverted_index.Simulation | 104 |
| abstract_inverted_index.addressing | 72 |
| abstract_inverted_index.immediate, | 52 |
| abstract_inverted_index.infringing | 101 |
| abstract_inverted_index.integrates | 84 |
| abstract_inverted_index.protection | 29 |
| abstract_inverted_index.protocols. | 119 |
| abstract_inverted_index.tremendous | 37 |
| abstract_inverted_index.development | 2 |
| abstract_inverted_index.maintaining | 27 |
| abstract_inverted_index.management, | 19 |
| abstract_inverted_index.scalability | 31, 115 |
| abstract_inverted_index.signatures, | 90 |
| abstract_inverted_index.cryptography | 87 |
| abstract_inverted_index.light-weight | 92 |
| abstract_inverted_index.particularly | 6 |
| abstract_inverted_index.scalability. | 81 |
| abstract_inverted_index.communication | 98 |
| abstract_inverted_index.entertainment | 21 |
| abstract_inverted_index.significantly | 110 |
| abstract_inverted_index.authentication | 63, 93 |
| abstract_inverted_index.communication. | 54 |
| abstract_inverted_index.revolutionized | 12 |
| abstract_inverted_index.transportation | 24 |
| abstract_inverted_index.privacy-preserving | 60 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.41503425 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |