Fig. 6From: Authentication strategies in vehicular communications: a taxonomy and frameworkClassification based on Manvi et al. [65]Back to article page