Research Article
A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles
| Security properties | [10] | [34] | [9] | [32] | Ours |
| Mutual authentication | ✔ | ✔ | ✔ | ✔ | ✔ | User anonymity | | ✔ | ✔ | ✔ | ✔ | Perfect forward secrecy | ✔ | — | ✔ | ✔ | ✔ | Man-in-the-middle attacks | ✔ | — | — | ✔ | ✔ | Impersonation attacks | ✔ | ✔ | ✔ | ✔ | ✔ | Known session-specific temporary information attacks | | — | ✔ | ✔ | ✔ | Untraceability | | ✔ | ✔ | ✔ | ✔ | Offline password guessing attacks | ✔ | ✔ | — | ✔ | ✔ | Replay attacks | ✔ | ✔ | ✔ | ✔ | ✔ |
|
|