From: Authentication strategies in vehicular communications: a taxonomy and framework
Stage | Case studies | |||||
---|---|---|---|---|---|---|
Lin et al. [18] | Zhang et al. [49] | Shim [50] | Horng et al. [59] | Han et al. [36] | Wang et al. [31] | |
Network domain | Vehicle-centric Inter-vehicle | Vehicle-centric Inter-vehicle Roadside-centric Vehicle-RSU | Roadside-centric Vehicle-RSU | Vehicle-centric Inter-vehicle Roadside-centric Vehicle-RSU | Vehicle-centric Intra-vehicle | Vehicle-centric Inter-vehicle |
Application latency | Low-latency | Low-latency | Low-latency | Low-latency | Low-latency | Low-latency |
Credential type | Tag-based | Tag-based | Tag-based | Tag-based | Tag-based | Tag-based |
Generation | Dependent Centralized | Dependent Decentralized | Dependent Centralized | Autonomous | Autonomous | Autonomous |
Issuance | Certificate-less | Certificate-based Explicit | Certificate-less | Certificate-based Explicit | Certificate-based Implicit | Certificate-less |
Distribution | Post-deployment | Post-deployment | Pre-deployment | Post-deployment | Post-deployment | Post-deployment |
Revocation | RL-based | Not provided | Not provided | RL-based | Non-RL-based | Non-RL-based |
Privacy principle | Anonymity Unlinkability Group-signature-based | Anonymity Pseudonym-based Unlinkability Pseudonym-change | Anonymity Pseudonym-based Unlinkability Pseudonym-change | Anonymity Pseudonym-based Unlinkability Pseudonym-change | Non-privacy | Anonymity Pseudonym-based Unlinkability Pseudonym-change |
Cryptographic method | Asymmetric Signature-based | Symmetric MAC-based | Asymmetric Signature-based | Asymmetric Signature-based | Symmetric Hash-based | Symmetric MAC-based |
Secure hardware | TPD-based | TPD-based | TPD-based | Non-TPD-based | Non-TPD-based | TPD-based |
Verification approach | Autonomous | Cooperative | Cooperative | Cooperative | Autonomous | Autonomous |