Research Article

A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles

Table 1

The summary of authentication protocols.

ProtocolsCryptographic techniquesLimitations

Li et al. [19](1) Utilized digital signature
(2) Utilized asymmetric encryption
(3) Based on anonymous authentication
(1) Does not resist key compromise impersonation attacks
(2) Does not provide user anonymity
Ying and Nayak [23](1) Utilized one-way hash function
(2) Based on Diffie–Hellman problem
(3) Based on anonymous authentication
(1) Does not resist replay attacks
(2) Does not resist offline identity guessing attacks
Mohit et al. [24](1) Utilized one-way hash function
(2) Based on smart card
(3) Two-factor
(1) Does not resist impersonation attacks
(2) Does not provide anonymity and untraceability
(3) Does not provide mutual authentication
Yu et al. [25](1) Utilized one-way hash function
(2) Based on smart card
(3) Two-factor
(1) Does not resist sensor capture attacks
(2) Does not resist impersonation attacks
(3) Does not provide untraceability
Ma et al. [10](1) Utilized one-way hash function
(2) Based on smart card(3) Utilized ECC
(1) Does not resist internal attacks
(2) Does not resist stolen smart card attacks
(3) Does not resist known session-specific temporary information attacks
Wazid et al. [34](1) Utilized one-way hash function
(2) Based on anonymous authentication
(3) Utilized ECC
Eftekhari et al. [9](1) Utilized one-way hash function
(2) Based on anonymous authentication
(3) Utilized ECC
Wu et al. [32](1) Utilized one-way hash function
(2) Based on smart card
(3) Utilized ECC
(4) Two-factor