Table 1 Comparison of Representative VANET Authentication Schemes.
From: A cooperative ECC-based authentication protocol for VANETs
Scheme | Cooperative vehicle computation | Batch authentication | Pseudonym update | Dual verification |
|---|---|---|---|---|
Bouakkaz et al. (2020)13 | ✗ | ✓ | ✗ | ✗ |
Chen et al. (2021)14 | ✗ | ✓ | ✗ | ✗ |
Tahir et al. (2023)5 | ✗ | ✓ | ✗ | ✗ |
Shawky et al. (2023)6 | ✗ | ✓ | ✗ | ✗ |
Suo et al. (2023)2 | ✗ | ✓ | ✗ | ✗ |
Wang et al. (2022)20 | ✗ | ✓ | ✓ | ✗ |
Liang et al. (2024)7 | ✗ | ✗ | ✓ | ✗ |
Zhong et al. (2024)8 | ✗ | ✗ | ✓ | ✗ |
Yan et al. (2023)10 | ✗ | ✓ | ✗ | ✗ |
Dwivedi et al. (2024)15 | ✗ | ✓ | ✗ | ✗ |
Our Scheme | ✓ | ✓ | ✓ | ✓ |