Research Article
Authentication-Based Vehicle-to-Vehicle Secure Communication for VANETs
Table 2
Comparison of security performance.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note. ✓ meet the requirement, ✕ do not meet the requirement. |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note. ✓ meet the requirement, ✕ do not meet the requirement. |