Fig. 7From: Authentication strategies in vehicular communications: a taxonomy and frameworkClassification based on Lu et al. [67]Back to article page