Review Article
A Summary of Security Techniques-Based Blockchain in IoV
Table 5
Comparison of informal safety analysis methods.
| Security characteristics | [62] | [63] | [64] | [65] |
| Bidirectional authentication | Y | Y | Y | N | Key management | Y | Y | N | Y | Privacy protection | PFS/PBS | Y | N | N | Resist attacks | Man-in-the-middle attack | Man-in-the-middle attack | DOS attack, physical attack, and man-in-the-middle attack | Resist cyberattacks |
|
|