Table 2 Comparison of security features of related schemes.

From: Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles

Schemes

RS

RTT

TA

RSU

Zhu et al.1

\(\checkmark\)

\(\times\)

\(\times\)

\(\times\)

Wu et al.7

\(\times\)

\(\checkmark\)

\(\times\)

\(\times\)

Zhu et al.8

\(\times\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Zhou et al.18

\(\checkmark\)

\(\times\)

\(\times\)

\(\times\)

Yang et al.29

\(\checkmark\)

\(\times\)

\(\times\)

\(\times\)

Our scheme

\(\checkmark\)

\(\checkmark\)

\(\times\)

\(\checkmark\)