Review Article
Authentication Protocols for Internet of Things: A Comprehensive Survey
Table 12
Cryptosystems and countermeasures used in Authentication protocols for Internet of Vehicles (IoV).
| Cryptosystems and countermeasures | Authentication protocols for IoV | [39] | [40] | [63] | [64] | [65] | [66] | [48] | [52] | [54] |
| Secure cryptographic hash function [149] | | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | ✓ | Proxy Mobile IP (PMIP) [156] | ✓ | | | | | | | | | Symmetric polynomials [157] | ✓ | | | | | | | | | Search algorithms [158] | | ✓ | | | | | | | | Group signature [159, 160] | | | ✓ | | | | | | | Merkle hash tree (MHT) [161] | | | | ✓ | | | | | | TESLA scheme [162] | | | | ✓ | | | | | | ECDSA signature [163] | | | | ✓ | | | | | | Multiplicative secret sharing technique [164] | | | | | ✓ | | | | | Identity-based public key cryptosystem [165] | | | | | | | | ✓ | | Identity-based aggregate signature [166] | | | | | | | | ✓ | | Digital signatures [167] | | | | | | ✓ | | | | Anonymous attribute-based group setup scheme [168] | | | | | | | | | ✓ | Keyed-hashing for message authentication (HMAC) [169] | | | | | | | ✓ | | |
|
|