A service-categorized security scheme with physical unclonable functions for internet of vehicles Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.1186/s40537-023-00865-7
In smart cities, communication and information exchange for the Internet of Vehicles rely on open and closed infrastructures along the roadside. Secure communications rely on the sender and receiver devices having self-sustaining authentication methods. The perquisites of the authentication methods are to grip communication without being falsified by an adversary or unidentified third parties. This article introduces the Service-Categorized Security Scheme (SCSS) with a physically unclonable function (PUF) for handling sensitive guidance/communication information. The vehicle-side authentication, access control, and service demands are governed using service-based PUF factors such as digital signatures, passwords, etc. To prevent anonymous third parties and adversaries, the PUF operates over compromised and uncompromised communication devices. Device-specific keys generated by PUFs based on intrinsic physical variances help identify between compromised and uncompromised devices, while keys generated by uncompromised devices conform to their expected profiles In the service-sharing process, mutual authentication using synchronized keys is used for security and service verification. The synchronized keys are integrated with the PUF for monitoring de-synchronization and individual operation. This decision is made using federated learning from the external service provider and the communicator of the vehicle. Through the learning process, a de-synchronization occurrence at the service provider and vehicle is identified as the reason for disconnecting the session. As a result, any suspicious activity that contradicts service security is identified, and the information of the communicating vehicle is secured. The proposed scheme is analyzed using the metrics authentication time, adversary detection ratio, complexity, de-synchronization time, and successful sessions.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1186/s40537-023-00865-7
- https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-023-00865-7
- OA Status
- gold
- Cited By
- 8
- References
- 32
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4390050894
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4390050894Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1186/s40537-023-00865-7Digital Object Identifier
- Title
-
A service-categorized security scheme with physical unclonable functions for internet of vehiclesWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-12-21Full publication date if available
- Authors
-
Nadhir Ben Halima, Ala Saleh Alluhaidan, Mohammad Zunnun Khan, Mohd. Shahid Husain, Mohammad Ayoub KhanList of authors in order
- Landing page
-
https://doi.org/10.1186/s40537-023-00865-7Publisher landing page
- PDF URL
-
https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-023-00865-7Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-023-00865-7Direct OA link when available
- Concepts
-
Computer science, Computer security, Authentication (law), Mutual authentication, Service (business), Adversary model, Service provider, Communication source, Password, Authentication protocol, Computer network, Adversary, Economy, EconomicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
8Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 3, 2024: 5Per-year citation counts (last 5 years)
- References (count)
-
32Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4390050894 |
|---|---|
| doi | https://doi.org/10.1186/s40537-023-00865-7 |
| ids.doi | https://doi.org/10.1186/s40537-023-00865-7 |
| ids.openalex | https://openalex.org/W4390050894 |
| fwci | 3.8543449 |
| type | article |
| title | A service-categorized security scheme with physical unclonable functions for internet of vehicles |
| awards[0].id | https://openalex.org/G5842991027 |
| awards[0].funder_id | https://openalex.org/F4320322484 |
| awards[0].display_name | |
| awards[0].funder_award_id | PNURSP2023R234 |
| awards[0].funder_display_name | Princess Nourah Bint Abdulrahman University |
| biblio.issue | 1 |
| biblio.volume | 10 |
| biblio.last_page | |
| biblio.first_page | |
| grants[0].funder | https://openalex.org/F4320322484 |
| grants[0].award_id | PNURSP2023R234 |
| grants[0].funder_display_name | Princess Nourah Bint Abdulrahman University |
| topics[0].id | https://openalex.org/T12122 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9984999895095825 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1708 |
| topics[0].subfield.display_name | Hardware and Architecture |
| topics[0].display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| topics[1].id | https://openalex.org/T11800 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9983999729156494 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | User Authentication and Security Systems |
| topics[2].id | https://openalex.org/T10828 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9933000206947327 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Biometric Identification and Security |
| funders[0].id | https://openalex.org/F4320322484 |
| funders[0].ror | https://ror.org/05b0cyh02 |
| funders[0].display_name | Princess Nourah Bint Abdulrahman University |
| is_xpac | False |
| apc_list.value | 1060 |
| apc_list.currency | GBP |
| apc_list.value_usd | 1300 |
| apc_paid.value | 1060 |
| apc_paid.currency | GBP |
| apc_paid.value_usd | 1300 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7842593193054199 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.6936478614807129 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C148417208 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6313663721084595 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[2].display_name | Authentication (law) |
| concepts[3].id | https://openalex.org/C2781221063 |
| concepts[3].level | 3 |
| concepts[3].score | 0.5374942421913147 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q6944186 |
| concepts[3].display_name | Mutual authentication |
| concepts[4].id | https://openalex.org/C2780378061 |
| concepts[4].level | 2 |
| concepts[4].score | 0.49455973505973816 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q25351891 |
| concepts[4].display_name | Service (business) |
| concepts[5].id | https://openalex.org/C7606001 |
| concepts[5].level | 3 |
| concepts[5].score | 0.47099369764328003 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q4686702 |
| concepts[5].display_name | Adversary model |
| concepts[6].id | https://openalex.org/C116537 |
| concepts[6].level | 3 |
| concepts[6].score | 0.4674343168735504 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q2169973 |
| concepts[6].display_name | Service provider |
| concepts[7].id | https://openalex.org/C198104137 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4551733136177063 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q974688 |
| concepts[7].display_name | Communication source |
| concepts[8].id | https://openalex.org/C109297577 |
| concepts[8].level | 2 |
| concepts[8].score | 0.44607946276664734 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q161157 |
| concepts[8].display_name | Password |
| concepts[9].id | https://openalex.org/C21564112 |
| concepts[9].level | 3 |
| concepts[9].score | 0.4445200264453888 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q4825885 |
| concepts[9].display_name | Authentication protocol |
| concepts[10].id | https://openalex.org/C31258907 |
| concepts[10].level | 1 |
| concepts[10].score | 0.4435429871082306 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[10].display_name | Computer network |
| concepts[11].id | https://openalex.org/C41065033 |
| concepts[11].level | 2 |
| concepts[11].score | 0.3983776569366455 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q2825412 |
| concepts[11].display_name | Adversary |
| concepts[12].id | https://openalex.org/C136264566 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q159810 |
| concepts[12].display_name | Economy |
| concepts[13].id | https://openalex.org/C162324750 |
| concepts[13].level | 0 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q8134 |
| concepts[13].display_name | Economics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7842593193054199 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.6936478614807129 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/authentication |
| keywords[2].score | 0.6313663721084595 |
| keywords[2].display_name | Authentication (law) |
| keywords[3].id | https://openalex.org/keywords/mutual-authentication |
| keywords[3].score | 0.5374942421913147 |
| keywords[3].display_name | Mutual authentication |
| keywords[4].id | https://openalex.org/keywords/service |
| keywords[4].score | 0.49455973505973816 |
| keywords[4].display_name | Service (business) |
| keywords[5].id | https://openalex.org/keywords/adversary-model |
| keywords[5].score | 0.47099369764328003 |
| keywords[5].display_name | Adversary model |
| keywords[6].id | https://openalex.org/keywords/service-provider |
| keywords[6].score | 0.4674343168735504 |
| keywords[6].display_name | Service provider |
| keywords[7].id | https://openalex.org/keywords/communication-source |
| keywords[7].score | 0.4551733136177063 |
| keywords[7].display_name | Communication source |
| keywords[8].id | https://openalex.org/keywords/password |
| keywords[8].score | 0.44607946276664734 |
| keywords[8].display_name | Password |
| keywords[9].id | https://openalex.org/keywords/authentication-protocol |
| keywords[9].score | 0.4445200264453888 |
| keywords[9].display_name | Authentication protocol |
| keywords[10].id | https://openalex.org/keywords/computer-network |
| keywords[10].score | 0.4435429871082306 |
| keywords[10].display_name | Computer network |
| keywords[11].id | https://openalex.org/keywords/adversary |
| keywords[11].score | 0.3983776569366455 |
| keywords[11].display_name | Adversary |
| language | en |
| locations[0].id | doi:10.1186/s40537-023-00865-7 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2737955091 |
| locations[0].source.issn | 2196-1115 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2196-1115 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Journal Of Big Data |
| locations[0].source.host_organization | https://openalex.org/P4310319900 |
| locations[0].source.host_organization_name | Springer Science+Business Media |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-023-00865-7 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Journal of Big Data |
| locations[0].landing_page_url | https://doi.org/10.1186/s40537-023-00865-7 |
| locations[1].id | pmh:oai:doaj.org/article:e722c87237554277ade9a63fbb059c2c |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Journal of Big Data, Vol 10, Iss 1, Pp 1-23 (2023) |
| locations[1].landing_page_url | https://doaj.org/article/e722c87237554277ade9a63fbb059c2c |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5016363993 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0129-4672 |
| authorships[0].author.display_name | Nadhir Ben Halima |
| authorships[0].countries | QA |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210116586 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Information Technology, Community College of Qatar, 7344, Doha, Qatar |
| authorships[0].institutions[0].id | https://openalex.org/I4210116586 |
| authorships[0].institutions[0].ror | https://ror.org/01psb9158 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210116586 |
| authorships[0].institutions[0].country_code | QA |
| authorships[0].institutions[0].display_name | Community College of Qatar |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Nadhir Ben Halima |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Information Technology, Community College of Qatar, 7344, Doha, Qatar |
| authorships[1].author.id | https://openalex.org/A5063580605 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-6829-9705 |
| authorships[1].author.display_name | Ala Saleh Alluhaidan |
| authorships[1].countries | SA |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I106778892 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Information Systems, College of Computer and Information Science, Princess Nourah Bint Abdulrahman University, Riyadh, P.O. Box 84428, 11671, Saudi Arabia |
| authorships[1].institutions[0].id | https://openalex.org/I106778892 |
| authorships[1].institutions[0].ror | https://ror.org/05b0cyh02 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I106778892 |
| authorships[1].institutions[0].country_code | SA |
| authorships[1].institutions[0].display_name | Princess Nourah bint Abdulrahman University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Ala Saleh Alluhaidan |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | Department of Information Systems, College of Computer and Information Science, Princess Nourah Bint Abdulrahman University, Riyadh, P.O. Box 84428, 11671, Saudi Arabia |
| authorships[2].author.id | https://openalex.org/A5102581929 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Mohammad Zunnun Khan |
| authorships[2].countries | SA |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I4210136004 |
| authorships[2].affiliations[0].raw_affiliation_string | College of Computing and Information Technology, University of Bisha, Bisha, 67714, Saudi Arabia |
| authorships[2].institutions[0].id | https://openalex.org/I4210136004 |
| authorships[2].institutions[0].ror | https://ror.org/040548g92 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I4210136004 |
| authorships[2].institutions[0].country_code | SA |
| authorships[2].institutions[0].display_name | University of Bisha |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Mohammad Zunnun Khan |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | College of Computing and Information Technology, University of Bisha, Bisha, 67714, Saudi Arabia |
| authorships[3].author.id | https://openalex.org/A5056592935 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-4864-9485 |
| authorships[3].author.display_name | Mohd. Shahid Husain |
| authorships[3].countries | OM |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4210114546 |
| authorships[3].affiliations[0].raw_affiliation_string | College of Computing and Information Sciences, University of Technology and Applied Sciences, Ibri, Sultanate of Oman |
| authorships[3].institutions[0].id | https://openalex.org/I4210114546 |
| authorships[3].institutions[0].ror | https://ror.org/01xf31a71 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I4210114546 |
| authorships[3].institutions[0].country_code | OM |
| authorships[3].institutions[0].display_name | College of Applied Sciences, Nizwa |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Mohd Shahid Husain |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | College of Computing and Information Sciences, University of Technology and Applied Sciences, Ibri, Sultanate of Oman |
| authorships[4].author.id | https://openalex.org/A5043995360 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-0398-3722 |
| authorships[4].author.display_name | Mohammad Ayoub Khan |
| authorships[4].countries | SA |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I4210136004 |
| authorships[4].affiliations[0].raw_affiliation_string | College of Computing and Information Technology, University of Bisha, Bisha, 67714, Saudi Arabia |
| authorships[4].institutions[0].id | https://openalex.org/I4210136004 |
| authorships[4].institutions[0].ror | https://ror.org/040548g92 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I4210136004 |
| authorships[4].institutions[0].country_code | SA |
| authorships[4].institutions[0].display_name | University of Bisha |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Mohammad Ayoub Khan |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | College of Computing and Information Technology, University of Bisha, Bisha, 67714, Saudi Arabia |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-023-00865-7 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A service-categorized security scheme with physical unclonable functions for internet of vehicles |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T12122 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9984999895095825 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1708 |
| primary_topic.subfield.display_name | Hardware and Architecture |
| primary_topic.display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| related_works | https://openalex.org/W4388838995, https://openalex.org/W2482813613, https://openalex.org/W2363600212, https://openalex.org/W2736044769, https://openalex.org/W2619897385, https://openalex.org/W2364805998, https://openalex.org/W2963069143, https://openalex.org/W106082050, https://openalex.org/W3201780008, https://openalex.org/W2043851470 |
| cited_by_count | 8 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 3 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 5 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1186/s40537-023-00865-7 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2737955091 |
| best_oa_location.source.issn | 2196-1115 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2196-1115 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Journal Of Big Data |
| best_oa_location.source.host_organization | https://openalex.org/P4310319900 |
| best_oa_location.source.host_organization_name | Springer Science+Business Media |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-023-00865-7 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Journal of Big Data |
| best_oa_location.landing_page_url | https://doi.org/10.1186/s40537-023-00865-7 |
| primary_location.id | doi:10.1186/s40537-023-00865-7 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2737955091 |
| primary_location.source.issn | 2196-1115 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2196-1115 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Journal Of Big Data |
| primary_location.source.host_organization | https://openalex.org/P4310319900 |
| primary_location.source.host_organization_name | Springer Science+Business Media |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-023-00865-7 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Journal of Big Data |
| primary_location.landing_page_url | https://doi.org/10.1186/s40537-023-00865-7 |
| publication_date | 2023-12-21 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W4375798908, https://openalex.org/W3125842443, https://openalex.org/W4384787485, https://openalex.org/W4328007710, https://openalex.org/W4296229496, https://openalex.org/W3041059664, https://openalex.org/W4229050425, https://openalex.org/W4294068524, https://openalex.org/W4306194498, https://openalex.org/W3137041917, https://openalex.org/W4316022144, https://openalex.org/W2997630374, https://openalex.org/W4313134679, https://openalex.org/W4361275963, https://openalex.org/W4379409146, https://openalex.org/W3142542690, https://openalex.org/W3024099579, https://openalex.org/W3161891919, https://openalex.org/W3135344605, https://openalex.org/W2934826843, https://openalex.org/W4293193797, https://openalex.org/W3084999539, https://openalex.org/W4210726911, https://openalex.org/W3090284304, https://openalex.org/W4285267891, https://openalex.org/W4288064657, https://openalex.org/W4285130138, https://openalex.org/W3112090628, https://openalex.org/W3037019494, https://openalex.org/W4285186567, https://openalex.org/W4385486288, https://openalex.org/W3100457262 |
| referenced_works_count | 32 |
| abstract_inverted_index.a | 64, 190, 209 |
| abstract_inverted_index.As | 208 |
| abstract_inverted_index.In | 1, 138 |
| abstract_inverted_index.To | 94 |
| abstract_inverted_index.an | 49 |
| abstract_inverted_index.as | 89, 201 |
| abstract_inverted_index.at | 193 |
| abstract_inverted_index.by | 48, 113, 130 |
| abstract_inverted_index.is | 147, 170, 199, 218, 227, 232 |
| abstract_inverted_index.of | 11, 37, 183, 223 |
| abstract_inverted_index.on | 14, 25, 116 |
| abstract_inverted_index.or | 51 |
| abstract_inverted_index.to | 42, 134 |
| abstract_inverted_index.PUF | 86, 102, 161 |
| abstract_inverted_index.The | 35, 74, 154, 229 |
| abstract_inverted_index.and | 5, 16, 28, 79, 99, 106, 124, 151, 165, 180, 197, 220, 245 |
| abstract_inverted_index.any | 211 |
| abstract_inverted_index.are | 41, 82, 157 |
| abstract_inverted_index.for | 8, 69, 149, 162, 204 |
| abstract_inverted_index.the | 9, 20, 26, 38, 58, 101, 139, 160, 176, 181, 184, 187, 194, 202, 206, 221, 224, 235 |
| abstract_inverted_index.PUFs | 114 |
| abstract_inverted_index.This | 55, 168 |
| abstract_inverted_index.etc. | 93 |
| abstract_inverted_index.from | 175 |
| abstract_inverted_index.grip | 43 |
| abstract_inverted_index.help | 120 |
| abstract_inverted_index.keys | 111, 128, 146, 156 |
| abstract_inverted_index.made | 171 |
| abstract_inverted_index.open | 15 |
| abstract_inverted_index.over | 104 |
| abstract_inverted_index.rely | 13, 24 |
| abstract_inverted_index.such | 88 |
| abstract_inverted_index.that | 214 |
| abstract_inverted_index.used | 148 |
| abstract_inverted_index.with | 63, 159 |
| abstract_inverted_index.(PUF) | 68 |
| abstract_inverted_index.along | 19 |
| abstract_inverted_index.based | 115 |
| abstract_inverted_index.being | 46 |
| abstract_inverted_index.smart | 2 |
| abstract_inverted_index.their | 135 |
| abstract_inverted_index.third | 53, 97 |
| abstract_inverted_index.time, | 238, 244 |
| abstract_inverted_index.using | 84, 144, 172, 234 |
| abstract_inverted_index.while | 127 |
| abstract_inverted_index.(SCSS) | 62 |
| abstract_inverted_index.Scheme | 61 |
| abstract_inverted_index.Secure | 22 |
| abstract_inverted_index.access | 77 |
| abstract_inverted_index.closed | 17 |
| abstract_inverted_index.having | 31 |
| abstract_inverted_index.mutual | 142 |
| abstract_inverted_index.ratio, | 241 |
| abstract_inverted_index.reason | 203 |
| abstract_inverted_index.scheme | 231 |
| abstract_inverted_index.sender | 27 |
| abstract_inverted_index.Through | 186 |
| abstract_inverted_index.article | 56 |
| abstract_inverted_index.between | 122 |
| abstract_inverted_index.cities, | 3 |
| abstract_inverted_index.conform | 133 |
| abstract_inverted_index.demands | 81 |
| abstract_inverted_index.devices | 30, 132 |
| abstract_inverted_index.digital | 90 |
| abstract_inverted_index.factors | 87 |
| abstract_inverted_index.methods | 40 |
| abstract_inverted_index.metrics | 236 |
| abstract_inverted_index.parties | 98 |
| abstract_inverted_index.prevent | 95 |
| abstract_inverted_index.result, | 210 |
| abstract_inverted_index.service | 80, 152, 178, 195, 216 |
| abstract_inverted_index.vehicle | 198, 226 |
| abstract_inverted_index.without | 45 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.Internet | 10 |
| abstract_inverted_index.Security | 60 |
| abstract_inverted_index.Vehicles | 12 |
| abstract_inverted_index.activity | 213 |
| abstract_inverted_index.analyzed | 233 |
| abstract_inverted_index.control, | 78 |
| abstract_inverted_index.decision | 169 |
| abstract_inverted_index.devices, | 126 |
| abstract_inverted_index.devices. | 109 |
| abstract_inverted_index.exchange | 7 |
| abstract_inverted_index.expected | 136 |
| abstract_inverted_index.external | 177 |
| abstract_inverted_index.function | 67 |
| abstract_inverted_index.governed | 83 |
| abstract_inverted_index.handling | 70 |
| abstract_inverted_index.identify | 121 |
| abstract_inverted_index.learning | 174, 188 |
| abstract_inverted_index.methods. | 34 |
| abstract_inverted_index.operates | 103 |
| abstract_inverted_index.parties. | 54 |
| abstract_inverted_index.physical | 118 |
| abstract_inverted_index.process, | 141, 189 |
| abstract_inverted_index.profiles | 137 |
| abstract_inverted_index.proposed | 230 |
| abstract_inverted_index.provider | 179, 196 |
| abstract_inverted_index.receiver | 29 |
| abstract_inverted_index.secured. | 228 |
| abstract_inverted_index.security | 150, 217 |
| abstract_inverted_index.session. | 207 |
| abstract_inverted_index.vehicle. | 185 |
| abstract_inverted_index.adversary | 50, 239 |
| abstract_inverted_index.anonymous | 96 |
| abstract_inverted_index.detection | 240 |
| abstract_inverted_index.falsified | 47 |
| abstract_inverted_index.federated | 173 |
| abstract_inverted_index.generated | 112, 129 |
| abstract_inverted_index.intrinsic | 117 |
| abstract_inverted_index.roadside. | 21 |
| abstract_inverted_index.sensitive | 71 |
| abstract_inverted_index.sessions. | 247 |
| abstract_inverted_index.variances | 119 |
| abstract_inverted_index.identified | 200 |
| abstract_inverted_index.individual | 166 |
| abstract_inverted_index.integrated | 158 |
| abstract_inverted_index.introduces | 57 |
| abstract_inverted_index.monitoring | 163 |
| abstract_inverted_index.occurrence | 192 |
| abstract_inverted_index.operation. | 167 |
| abstract_inverted_index.passwords, | 92 |
| abstract_inverted_index.physically | 65 |
| abstract_inverted_index.successful | 246 |
| abstract_inverted_index.suspicious | 212 |
| abstract_inverted_index.unclonable | 66 |
| abstract_inverted_index.complexity, | 242 |
| abstract_inverted_index.compromised | 105, 123 |
| abstract_inverted_index.contradicts | 215 |
| abstract_inverted_index.identified, | 219 |
| abstract_inverted_index.information | 6, 222 |
| abstract_inverted_index.perquisites | 36 |
| abstract_inverted_index.signatures, | 91 |
| abstract_inverted_index.adversaries, | 100 |
| abstract_inverted_index.communicator | 182 |
| abstract_inverted_index.information. | 73 |
| abstract_inverted_index.synchronized | 145, 155 |
| abstract_inverted_index.unidentified | 52 |
| abstract_inverted_index.vehicle-side | 75 |
| abstract_inverted_index.communicating | 225 |
| abstract_inverted_index.communication | 4, 44, 108 |
| abstract_inverted_index.disconnecting | 205 |
| abstract_inverted_index.service-based | 85 |
| abstract_inverted_index.uncompromised | 107, 125, 131 |
| abstract_inverted_index.verification. | 153 |
| abstract_inverted_index.authentication | 33, 39, 143, 237 |
| abstract_inverted_index.communications | 23 |
| abstract_inverted_index.Device-specific | 110 |
| abstract_inverted_index.authentication, | 76 |
| abstract_inverted_index.infrastructures | 18 |
| abstract_inverted_index.self-sustaining | 32 |
| abstract_inverted_index.service-sharing | 140 |
| abstract_inverted_index.de-synchronization | 164, 191, 243 |
| abstract_inverted_index.Service-Categorized | 59 |
| abstract_inverted_index.guidance/communication | 72 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 97 |
| corresponding_author_ids | https://openalex.org/A5063580605 |
| countries_distinct_count | 3 |
| institutions_distinct_count | 5 |
| corresponding_institution_ids | https://openalex.org/I106778892 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[0].score | 0.4699999988079071 |
| sustainable_development_goals[0].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile.value | 0.91356506 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |