Provides mutual authentication and key agreement, resists against impersonation attack, stolen smart card, inside attack, and sever spoofing attack, provides user anonymity
Missing communication cost, running time, and overhead cost
Proved that Vasudev et al.’s scheme [21] is incorrect and proposed new scheme for V2V secure communication. Resists against impersonation attack, stolen smart card, offline password guessing, man-in-the-middle attacks, and DOS attack and provides anonymity and untraceability.