Research Article

TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs

Table 2

Summary of authentication schemes in VANETs.

AuthorsCryptography techniqueAdvantageDisadvantage

Zheng et al. [12]ECCLess storage cost, suitable for and in sense of less computing and limited storageMissing formal security analysis
Qu and Tan [15]ECCProvides mutual authentication and key agreement, resists against impersonation attack, stolen smart card, inside attack, and sever spoofing attack, provides user anonymityMissing communication cost, running time, and overhead cost
Nandy et al. [16]ECC and symmetric key operation-based authenticationLightweight and provides vehicle to vehicle secure communicationFaulty design
Vasudev et al. [21]XOR operation, one-way hash functionsResists against impersonation attack, stolen smart card, offline password guessing, and man-in-the-middle attacks and provides anonymityMissing formal security analysis
Mahmood et al. [22]XOR operations, one-way hash functionsProved that Vasudev et al.’s scheme [21] is incorrect and proposed new scheme for V2V secure communication. Resists against impersonation attack, stolen smart card, offline password guessing, man-in-the-middle attacks, and DOS attack and provides anonymity and untraceability.
Li et al. [24]XOR operation, hash function, biometric authenticationImproves the functional and security flaws of Jiang et al.’s scheme [23], communication and computation cost is less than that of other schemesRunning time of scheme is missing
Wang et al. [25]Using multiple hashing functions, biological password-based authenticationReduces the communication, overhead, and computation costFormal security analysis is missing
Paruchuri and Durresi [26]Smart card-based key generationProvides anonymous authentication, less space for key storage in smart cardInformal and formal security analysis is missing