Research Article
Message Authentication Mechanism and Privacy Protection in the Context of Vehicular Ad Hoc Networks
Table 8
Performance analysis.
| Property | Method | [12] | [13] | [14] | [15] | Proposed method |
| The broadcast message | Signing: Verification
| Signing: Verification
| Signing: Verification
| Signing: Verification
| Signing Verification
| Spending time | 36.4 ms | 18 ms | 11.1 ms | 18 ms | 10.8 ms | The length of ciphertext | 1112 bits | 480 bits | 480 bits | () + 320 bits | 480 bits |
| Handoff | | N/A | | | 2 * SE + 2 * SD | Spending time | 13.5 ms | N/A | 11.4 ms | 3 ms | <9.68 ms | The length of ciphertext | 480 bits | N/A | 1280 bits | bits | 2048 bits |
| Communication between different RSUs | Signing: Verification
| Signing: Verification
| Signing: Verification
| Signing: Verification
| Signing Verification
| Spending time | 36.4 ms | 18 ms | 11.1 ms | 18 ms | 15.9 ms | The length of ciphertext | 1112 bits | 480 bits | 480 bits | (160 * 160) + 320 bits | 960 bits |
| Privacy communicate | N/A | N/A | N/A | N/A | Signing + SE Verification + SD | Spending time | N/A | N/A | N/A | N/A | <13.84 ms | The length of ciphertext | N/A | N/A | N/A | N/A | 1024 bits |
|
|