Review Article
A Summary of Security Techniques-Based Blockchain in IoV
Table 3
Comparison of privacy protection.
| Literature | Object | Method | Superiority |
| [41] | Content | Cognitive engine | Flexible short response time | [42] | Content | Software-defined networking, deep reinforcement, and learning spatial crowdsourcing | High throughput and low overhead | [43] | Identity | Remote authentication model | Trace | [44] | Identity | Conditional privacy statement protocol | Trust management method preventing forged messages | [45] | Location | Trust management method based on Dirichlet distribution | Detection of malicious vehicles | [46] | Location | Construction of trusted stealth region based on trust mechanism | Limited computing time and communication costs | [38] | Identity | Cluster-based MAC authentication protocol (ACB-MAC) | High throughput and lower latency |
|
|