Fig. 5From: Authentication strategies in vehicular communications: a taxonomy and frameworkClassification based on Petit et al. [64]Back to article page