Table 2 Comparison of security features of related schemes.
Schemes | RS | RTT | TA | RSU |
|---|---|---|---|---|
Zhu et al.1 | \(\checkmark\) | \(\times\) | \(\times\) | \(\times\) |
Wu et al.7 | \(\times\) | \(\checkmark\) | \(\times\) | \(\times\) |
Zhu et al.8 | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Zhou et al.18 | \(\checkmark\) | \(\times\) | \(\times\) | \(\times\) |
Yang et al.29 | \(\checkmark\) | \(\times\) | \(\times\) | \(\times\) |
Our scheme | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) |