Table 4 Comparison of security parameters.

From: A Dickson polynomial based group key agreement authentication scheme for ensuring conditional privacy preservation and traceability in VANETs

Properties

23

25

26

27

28

35

40

42

48

Ours

Message integrity

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Mutual authentication

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Group key agreement

No

No

No

No

No

No

Yes

Yes

No

Yes

Conditional privacy

Yes

Yes

No

No

No

Yes

Yes

Yes

Yes

Yes

Identity privacy

Yes

No

No

Yes

No

No

Yes

No

Yes

Yes

Location privacy

No

No

No

No

No

No

No

No

Yes

Yes

Traceability

Yes

No

Yes

No

Yes

No

Yes

No

Yes

Yes

Untraceability

No

Yes

No

No

No

No

No

No

No

No

Unlinkability

No

No

No

No

Yes

No

No

Yes

No

Yes

Anonymity

Yes

Yes

No

Yes

Yes

No

Yes

No

No

Yes

Confidentiality

Yes

Yes

No

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Non-repudiation

No

No

No

No

Yes

No

No

No

No

Yes

Key escrow freeness

Yes

Yes

No

No

No

No

No

No

No

Yes

Forward secrecy

No

No

Yes

No

No

Yes

Yes

No

Yes

Yes

Backward secrecy

No

Yes

Yes

No

No

Yes

Yes

No

Yes

Yes

Replay attack

No

Yes

Yes

No

No

Yes

Yes

No

Yes

Yes

Impersonation attack

Yes

Yes

No

No

No

Yes

No

No

Yes

Yes

Modification attack

No

No

Yes

No

No

No

No

No

No

Yes

MiTM attack

Yes

No

Yes

No

No

No

Yes

No

No

Yes

Coalition Attack

No

No

No

No

No

No

No

Yes

No

Yes

Key exposure attack

No

No

No

No

No

No

No

No

No

Yes

DoS attack

No

No

No

No

No

No

No

No

No

Yes

ESL attack

Yes

Yes

No

No

No

Yes

No

No

No

Yes

Cloning attack

Yes

No

No

No

No

No

No

No

No

Yes

Physical/TPD/side-channel attack

Yes

No

No

No

Yes

No

No

No

No

Yes