Review Article

A Summary of Security Techniques-Based Blockchain in IoV

Table 2

Comparison of identity authentication.

LiteratureRegistration authorityFunctions of RAFunctions of blockchainMethod

[30]NamecoinPublic key signature informationPublish, update, and validateMerkle tree
[34]The offline registrationRandom number and public keyValidateRSU collaboration
[35]ADSM area managementAlliance chain validationConsensus algorithm
[36]RTAPublic-private key for the vehicle and system key KValidatePoW and PBFT
[38]CAA certificate and two special hash functionsRSUPseudonyms and hashes