Research Article
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario
Table 1
Comparison of security properties.
| Protocols | DCI | MA | AN | KER | TAR |
| Basudan et al.’s protocol [20] | ✓ | – | ✓ | ✓ | ✓ | Xiong and Qin’s protocol [21] | ✓ | ✓ | ✓ | ✓ | ✓ | Our protocol | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|