Fig. 1From: Authentication strategies in vehicular communications: a taxonomy and frameworkVehicular network modelBack to article page