Review Article

A Summary of Security Techniques-Based Blockchain in IoV

Table 5

Comparison of informal safety analysis methods.

Security characteristics[62][63][64][65]

Bidirectional authenticationYYYN
Key managementYYNY
Privacy protectionPFS/PBSYNN
Resist attacksMan-in-the-middle attackMan-in-the-middle attackDOS attack, physical attack, and man-in-the-middle attackResist cyberattacks