Research Article

Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles

Table 4

Security features.

SchemesOur[23][22][24]

Mutual authentication
Stolen verifier
Vehicle anonymity
VS impersonation
RSU impersonation
Vehicle impersonation
Man in middle attack
Session key security
Denial of service
Replay attack

Note: ✓, provides or resists; ✗,does not provide or does not resist.