Fig. 15From: Authentication strategies in vehicular communications: a taxonomy and frameworkAuthentication framework based on our taxonomyBack to article page