Research Article

Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario

Table 1

Comparison of security properties.

ProtocolsDCIMAANKERTAR

Basudan et al.’s protocol [20]
Xiong and Qin’s protocol [21]
Our protocol