Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 12

Cryptosystems and countermeasures used in Authentication protocols for Internet of Vehicles (IoV).

Cryptosystems and countermeasures Authentication protocols for IoV
[39][40][63][64][65][66][48][52][54]

Secure cryptographic hash function [149]
Proxy Mobile IP (PMIP) [156]
Symmetric polynomials [157]
Search algorithms [158]
Group signature [159, 160]
Merkle hash tree (MHT) [161]
TESLA scheme [162]
ECDSA signature [163]
Multiplicative secret sharing technique [164]
Identity-based public key cryptosystem [165]
Identity-based aggregate signature [166]
Digital signatures [167]
Anonymous attribute-based group setup scheme [168]
Keyed-hashing for message authentication (HMAC) [169]