Research Article
Message Authentication Mechanism and Privacy Protection in the Context of Vehicular Ad Hoc Networks
Table 4
The comparison of property.
| Property | Method | [12] | [13] | [14] | [15] | Proposed method |
| Security and privacy preservation | YES | YES | YES | YES | YES | Do need the certificate | NO | NO | NO | YES | NO | Do need the help of RSU for authentication | NO | NO | NO | NO | NO | PKI-based system | NO | NO | NO | NO | NO | Communication within different RSU | YES | YES | YES | YES | YES | Privacy communicate | NO | NO | NO | NO | YES |
|
|