Research Article

Authentication-Based Vehicle-to-Vehicle Secure Communication for VANETs

Table 2

Comparison of security performance.

PerformanceSBVGTACPNTELIPE-TEATPKEPPMALIAU

Defending against impersonation attack
Defending against tampering attack
Defending against replay attack

Note. ✓ meet the requirement, ✕ do not meet the requirement.