Mobile Information Systems / 2021 / Article / Tab 1 / Research Article
A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles Table 1 The summary of authentication protocols.
Protocols Cryptographic techniques Limitations Li et al. [19 ] (1) Utilized digital signature (2) Utilized asymmetric encryption (3) Based on anonymous authentication (1) Does not resist key compromise impersonation attacks (2) Does not provide user anonymity Ying and Nayak [23 ] (1) Utilized one-way hash function (2) Based on Diffie–Hellman problem (3) Based on anonymous authentication (1) Does not resist replay attacks (2) Does not resist offline identity guessing attacks Mohit et al. [24 ] (1) Utilized one-way hash function (2) Based on smart card (3) Two-factor (1) Does not resist impersonation attacks (2) Does not provide anonymity and untraceability (3) Does not provide mutual authentication Yu et al. [25 ] (1) Utilized one-way hash function (2) Based on smart card (3) Two-factor (1) Does not resist sensor capture attacks (2) Does not resist impersonation attacks (3) Does not provide untraceability Ma et al. [10 ] (1) Utilized one-way hash function (2) Based on smart card(3) Utilized ECC (1) Does not resist internal attacks (2) Does not resist stolen smart card attacks (3) Does not resist known session-specific temporary information attacks Wazid et al. [34 ] (1) Utilized one-way hash function (2) Based on anonymous authentication (3) Utilized ECC — Eftekhari et al. [9 ] (1) Utilized one-way hash function (2) Based on anonymous authentication (3) Utilized ECC — Wu et al. [32 ] (1) Utilized one-way hash function (2) Based on smart card (3) Utilized ECC (4) Two-factor —