{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T06:13:35Z","timestamp":1693721615841},"reference-count":26,"publisher":"Wiley","issue":"17","license":[{"start":{"date-parts":[[2016,9,7]],"date-time":"2016-09-07T00:00:00Z","timestamp":1473206400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,11,25]]},"abstract":"Abstract<\/jats:title>The more recent advances in network communication and cloud computing technologies have the potential of significantly improving traveling experience by providing value\u2010added services, such as multimedia on demand (MoD), in vehicular ad hoc networks, where the involved vehicles are provided with enough communication, storage, and computing capabilities. In this scenario, despite many consolidated mobile cloud solutions and pay\u2010per\u2010view systems have been developed and widely deployed in public transportation, the security and privacy of mobile users, mainly concerning the association between users' identities and requested multimedia contents, still presents several open challenges. Mainly, providing pay\u2010per\u2010view services in vehicular clouds while protecting the passenger's anonymity and simultaneously ensuring the robustness of the payment system has become an important issue.Accordingly, we present a novel smart card\u2010based MoD payment solution, to be used in mobile cloud\u2010empowered public transportation systems, that not only guarantees the passenger's anonymity but also uses a personal trusted device to protect the passenger's sensitive information so that he can enjoy the multimedia contents during the long hours of travel. In the future, such scheme can become common practice on MoD\u2010related equipment in vehicular ad hoc networks, thereby enhancing the competitiveness of public transport companies. Copyright \u00a9 2016 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.1614","type":"journal-article","created":{"date-parts":[[2016,9,7]],"date-time":"2016-09-07T11:13:31Z","timestamp":1473246811000},"page":"4378-4390","source":"Crossref","is-referenced-by-count":1,"title":["A secure payment system for multimedia on demand on mobile VANET clouds"],"prefix":"10.1002","volume":"9","author":[{"given":"Chin\u2010Ling","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung 41349 Taiwan"},{"name":"School of Information Engineering Changchun University of Science and Technology Changchun 130600 China"}]},{"given":"Yu\u2010Fan","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung 41349 Taiwan"}]},{"given":"Aniello","family":"Castiglione","sequence":"additional","affiliation":[{"name":"Department of Computer Science University of Salerno Fisciano (SA) Italy"}]},{"given":"Francesco","family":"Palmieri","sequence":"additional","affiliation":[{"name":"Department of Computer Science University of Salerno Fisciano (SA) Italy"}]}],"member":"311","published-online":{"date-parts":[[2016,9,7]]},"reference":[{"key":"e_1_2_6_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.997"},{"key":"e_1_2_6_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/17427371111123577"},{"key":"e_1_2_6_4_1","volume-title":"The Next Paradigm Shift: From Vehicular Networks to Vehicular Clouds. Mobile Ad Hoc Networking: Cutting Edge Directions","author":"Olariu S","year":"2013"},{"key":"e_1_2_6_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7054724"},{"key":"e_1_2_6_6_1","doi-asserted-by":"crossref","unstructured":"MershadK ArtailH.A Framework for Implementing Mobile Cloud Services in VANETs. In 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD) IEEE 2013;83\u201390.","DOI":"10.1109\/CLOUD.2013.15"},{"key":"e_1_2_6_7_1","doi-asserted-by":"crossref","unstructured":"SalahuddinM Al\u2010FuqahaA GuizaniM CherkaouiS.RSU cloud and its resource management in support of enhanced vehicular applications. In Globecom Workshops (GC Wkshps) IEEE 2014;127\u2013132.","DOI":"10.1109\/GLOCOMW.2014.7063418"},{"key":"e_1_2_6_8_1","doi-asserted-by":"crossref","unstructured":"CastiglioneA CattaneoG De SantisA PetagnaF Ferraro PetrilloU:SPEECH: Secure Personal End\u2010to\u2010End Communication with Handheld. In Proceedings ofISSE 2006\u2014Securing Electronic Busines Processes 287\u2013297. Springer Vieweg 2006.","DOI":"10.1007\/978-3-8348-9195-2_31"},{"key":"e_1_2_6_9_1","doi-asserted-by":"crossref","unstructured":"CastiglioneA CattaneoG De MaioG PetagnaF:SECR3T: Secure End\u2010to\u2010End Communication over 3G Telecommunication Networks. In Proceedings ofInnovative Mobile and Internet Services in Ubiquitous Computing(IMIS) 2011 Fifth International Conference on 520\u2013526. IEEE June2011.","DOI":"10.1109\/IMIS.2011.65"},{"key":"e_1_2_6_10_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2012.045708"},{"key":"e_1_2_6_11_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSC.2014.066002"},{"key":"e_1_2_6_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.07.015"},{"key":"e_1_2_6_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2210880"},{"key":"e_1_2_6_14_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2016.073778"},{"key":"e_1_2_6_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00020-6"},{"key":"e_1_2_6_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74573-0_13"},{"key":"e_1_2_6_17_1","unstructured":"ChengC\u2010Y SemanK YunusJ.Authentication public terminal with smart cards. In: Proceedings of TENCON 2000 2000;I\u2010527\u2013I529."},{"issue":"5","key":"e_1_2_6_18_1","first-page":"725","article-title":"Using a PTD to strengthen remote authentication from an untrusted computer","volume":"13","author":"Chen C\u2010L","year":"2012","journal-title":"Journal of Internet Technology"},{"key":"e_1_2_6_19_1","first-page":"394","article-title":"E\u2010commerce: online attacks and protective mechanisms","volume":"7","author":"Akwukwuma V\u2010N","year":"2008","journal-title":"Asian Journal of Information Technology"},{"key":"e_1_2_6_20_1","doi-asserted-by":"crossref","unstructured":"KungpisdanS.A secure account\u2010based mobile payment system protocol. In: Proceedings International Conference on Information Technology: Coding and Computing (ITCC) 2004;35\u201339","DOI":"10.1109\/ITCC.2004.1286422"},{"key":"e_1_2_6_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.03.012"},{"key":"e_1_2_6_22_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSC.2014.060684"},{"key":"e_1_2_6_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-011-9086-0"},{"key":"e_1_2_6_24_1","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.42.4.4471"},{"key":"e_1_2_6_25_1","unstructured":"FinneranMF.WiMax versus Wi\u2010Fi \u2010 A comparison of Technologies Markets and Business Plan dBrn Associates Inc 2004."},{"key":"e_1_2_6_26_1","unstructured":"Information Technology\u2014Generic Coding of Moving Pictures and Associated Audio Information: Video. ISO\/IEC International Standard 13818\u20132:2013.http:\/\/www.iso.org\/iso\/catalogue_detail.htm?csnumber=61152. Accessed May 2016."},{"key":"e_1_2_6_27_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSC.2012.047467"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1614","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1614","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T00:08:17Z","timestamp":1693699697000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,7]]},"references-count":26,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2016,11,25]]}},"alternative-id":["10.1002\/sec.1614"],"URL":"https:\/\/doi.org\/10.1002\/sec.1614","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,7]]}}}