Research Article

Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks

Table 3

Communication comparison of the proposed dereplication approach and the state-of-the-art techniques, i.e., Yu et al.’s algorithm [16], Cui et al.’s algorithm [17], and Xiong et al.’s algorithm [36].

SchemesCommunication cost

Yu et al.’s scheme [16]
Cui et al.’s scheme [17]
Xiong et al.’s scheme [36]
Proposed without dereplication
Proposed data dereplication