Review Article

A Summary of Security Techniques-Based Blockchain in IoV

Table 3

Comparison of privacy protection.

LiteratureObjectMethodSuperiority

[41]ContentCognitive engineFlexible short response time
[42]ContentSoftware-defined networking, deep reinforcement, and learning spatial crowdsourcingHigh throughput and low overhead
[43]IdentityRemote authentication modelTrace
[44]IdentityConditional privacy statement protocolTrust management method preventing forged messages
[45]LocationTrust management method based on Dirichlet distributionDetection of malicious vehicles
[46]LocationConstruction of trusted stealth region based on trust mechanismLimited computing time and communication costs
[38]IdentityCluster-based MAC authentication protocol (ACB-MAC)High throughput and lower latency