Research Article
SAIFC: A Secure Authentication Scheme for IOV Based on Fog-Cloud Federation
Table 7
Comparison of the different schemes in terms of security features.
| Security features | Schemes | SAIFC | [21] | [11] | [15] | [19] | [20] | [18] | [17] | [14] | [13] |
| FV1 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | FV2 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes | FV3 | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | FV4 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | FV5 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | FV6 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | FV7 | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | FV8 | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | FV9 | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | FV10 | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | FV11 | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | FV12 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | FV13 | No | No | No | No | No | No | No | No | No | Yes | FV14 | Yes | No | No | Yes | Yes | No | No | No | No | Yes | FV15 | Yes | No | No | Yes | No | No | No | No | No | Yes | FV16 | Yes | No | No | No | No | No | No | No | No | Yes |
|
|