Table 1 Comparative Analysis of Authentication and Key Agreement Schemes in IoVT/IoT.
Author & Year | Algorithm/Protocol | Achievements | Limitations |
|---|---|---|---|
Ikram et al., 202010 | NAPV Protocol | Reduces signaling overhead for group authentication in 5G IoVT | Transmits vehicle permanent identity in plaintext; privacy risk; vulnerable to eavesdropping and MitM attacks |
Yang et al., 202011 | ECC-based AKA | Strong security using lightweight operations; supports initial and subsequent authentication | High computational cost; session dependency; scalability not addressed; real-time data analysis handling unclear |
Agilandeeswari et al., 202112 | Lightweight Privacy-Preserving AKA | Fast source transmission; low energy consumption | Transmits permanent identity in plaintext; privacy vulnerabilities |
Chein et al., 202113 | Key Transfer Protocol for Fog-enabled SIoV | Enables session key transfer between RSUs; supports vehicle handover | Potential key compromise; no forward/backward key secrecy; vulnerable to MitM attacks |
Wazid et al., 202114 | Lightweight AKA | Mutual authentication; anonymity; dynamic RSU addition; untraceability | Requires secure channel for exchanging information (e.g., in-person interaction) |
Bagga et al., 202115 | Blockchain-based AKA | Resilient against attacks; decentralized authentication | Scalability, latency, energy consumption, and cost concerns due to blockchain overhead |
Miao et al., 202216 | Group AKA for 5G Vehicular Networks | Achieves anonymity, unlinkability, mutual authentication | Lacks forward/backward key secrecy; no key confirmation |
Shang et al., 202217 | D2D Group-oriented AKA with CL-PKC | Supports anonymous, secure D2D group interactions | Complexity due to ECC and certificateless PKC; scalability not explicitly addressed |
Ouaissa et al., 202218 | Enhanced 5G Group AKA | Robust against security threats; group authentication | Missing key confirmation; unlinkability issues; costly ECDH operations |
Mei et al., 202219 | Pseudonym-based AKA | Provides anonymity using nonsingular elliptic curves | Limited scalability analysis; lacks detailed key management for mobility |
Azees et al., 202220 | Signature-based AKA | Lightweight authentication for VANETs | Focused on signatures; may not address group mobility or multi-factor attacks |
Sharma & Dhiman, 202521 | Three-factor User Authentication | Addresses device theft & user impersonation; low computation & communication overhead | Primarily for low-cost IoT; group authentication not addressed |
Sharma & Dhiman, 202522 | IoT Security Survey | Comprehensive taxonomy of security threats; explores blockchain solutions | Review-based; no new protocol proposed; limited focus on group-based AKA |
PSLAE/SL_GAS | Lightweight authentication for 6LoWPAN & IIoT; mutual authentication; anonymity; low signaling & computation costs | Limited to IIoT & 6LoWPAN; not optimized for 5G IoVT group mobility |