Achieve lightweight certification; reduce storage and computation cost; less storage space; resist against impersonation, modification, and replay assaults
Does not resist reaming internal and external assaults such as DoS and man-in-the-middle, respectively
Provide security to the vehicle and preventing unauthorized users, DKM for the user; unauthorized user does not enter the network; resist against replay, masquerading, Sybil, and message alteration assaults
Enhances security level to protect anonymous identities; communication overhead is compared to previous protocols; reduces the message communication cost and computation time; protects DoS, man-in-the-middle, modification, and replay assaults
Symmetric lightweight hash functions and encryption
Provides sufficient security; provide SEMP-IoV best security requirement of the fast mobility vehicle IoV scenario; protects stolen verifier, denial of services, replay, RSU impersonation, mutual authentication, and session key security; authentication process takes 0.198 ms
Detection of malicious nodes; the integrity of the message is maintained; the proposed protocol fulfills the security requirements such as confidentiality, authenticity, and availability
Does not provide formal security analysis and lacks explanation of computation and communication costs
Protects various assaults such as modification assault, man-in-the-middle assault, impersonation assault, concatenation, replay assault, stolen OBU, and password guessing assault
Formal security analysis is missing; computation cost and communication costs are missing