Review Article
A Summary of Security Techniques-Based Blockchain in IoV
Table 2
Comparison of identity authentication.
| Literature | Registration authority | Functions of RA | Functions of blockchain | Method |
| [30] | Namecoin | Public key signature information | Publish, update, and validate | Merkle tree | [34] | The offline registration | Random number and public key | Validate | RSU collaboration | [35] | AD | SM area management | Alliance chain validation | Consensus algorithm | [36] | RTA | Public-private key for the vehicle and system key K | Validate | PoW and PBFT | [38] | CA | A certificate and two special hash functions | RSU | Pseudonyms and hashes |
|
|