Research Article

A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles

Table 3

Comparisons of security.

Security properties[10][34][9][32]Ours

Mutual authentication
User anonymity
Perfect forward secrecy
Man-in-the-middle attacks
Impersonation attacks
Known session-specific temporary information attacks
Untraceability
Offline password guessing attacks
Replay attacks