Research Article
Using BDH for the Message Authentication in VANET
Table 5
The comparison of property.
| Property | Method | [4] | [5] | [6] | [7] | [8] | Proposed method |
| Security and privacy preservation | Yes | Yes | Yes | Yes | Yes | Yes | Do need the certificate | No | No | No | No | No | No | Do need the help of RSU for authentication | No | No | No | No | No | No | PKI-based system | No | No | No | Yes | No | No | Communication within different RSU | Yes | No | Yes | Yes | Yes | Yes | Privacy communicate | Yes | Yes | Yes | Yes | No | Yes |
|
|