Skip to main content

Table 2 Individual analysis of six different well-known authentication protocols

From: Authentication strategies in vehicular communications: a taxonomy and framework

Stage

Case studies

Lin et al. [18]

Zhang et al. [49]

Shim [50]

Horng et al. [59]

Han et al. [36]

Wang et al. [31]

Network domain

Vehicle-centric

Inter-vehicle

Vehicle-centric

Inter-vehicle

Roadside-centric

Vehicle-RSU

Roadside-centric

Vehicle-RSU

Vehicle-centric

Inter-vehicle

Roadside-centric

Vehicle-RSU

Vehicle-centric

Intra-vehicle

Vehicle-centric

Inter-vehicle

Application latency

Low-latency

Low-latency

Low-latency

Low-latency

Low-latency

Low-latency

Credential type

Tag-based

Tag-based

Tag-based

Tag-based

Tag-based

Tag-based

Generation

Dependent

Centralized

Dependent

Decentralized

Dependent

Centralized

Autonomous

Autonomous

Autonomous

Issuance

Certificate-less

Certificate-based

Explicit

Certificate-less

Certificate-based

Explicit

Certificate-based

Implicit

Certificate-less

Distribution

Post-deployment

Post-deployment

Pre-deployment

Post-deployment

Post-deployment

Post-deployment

Revocation

RL-based

Not provided

Not provided

RL-based

Non-RL-based

Non-RL-based

Privacy principle

Anonymity

Unlinkability

Group-signature-based

Anonymity

Pseudonym-based

Unlinkability

Pseudonym-change

Anonymity

Pseudonym-based

Unlinkability

Pseudonym-change

Anonymity

Pseudonym-based

Unlinkability

Pseudonym-change

Non-privacy

Anonymity

Pseudonym-based

Unlinkability

Pseudonym-change

Cryptographic method

Asymmetric

Signature-based

Symmetric

MAC-based

Asymmetric

Signature-based

Asymmetric

Signature-based

Symmetric

Hash-based

Symmetric

MAC-based

Secure hardware

TPD-based

TPD-based

TPD-based

Non-TPD-based

Non-TPD-based

TPD-based

Verification approach

Autonomous

Cooperative

Cooperative

Cooperative

Autonomous

Autonomous