Research Article
TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs
Table 3
Security feature performance analysis.
| Schemes | Ours | [10] | [32] | [33] | [34] |
| Correctness | ✓ | ✓ | ✓ | ✓ | ✓ | Vehicle impersonation attack | ✓ | ✓ | ✓ | ✓ | ✓ | Trusted authority impersonation attack | ✓ | ✓ | ✓ | ✓ | ✓ | Vehicle server impersonation attack | ✓ | ✓ | ✓ | ✓ | ✓ | Stolen SC attack | ✓ | ✓ | ✗ | ✗ | ✗ | Anonymity attack | ✓ | ✓ | ✓ | ✓ | ✓ | Untraceability attack | ✓ | ✓ | ✓ | ✓ | ✓ | Man-in-the-middle attack | ✓ | ✓ | ✗ | ✗ | ✗ | Offline password guessing attack | ✓ | ✓ | ✗ | ✗ | ✗ | Replay attack | ✓ | ✓ | ✓ | ✓ | ✓ | Mutual authentication | ✓ | ✓ | ✓ | ✓ | ✓ | Malicious user tracing | ✓ | ✓ | ✓ | ✗ | ✗ | TA bypassing | ✓ | ✗ | ✓ | ✓ | ✓ |
|
|
Note. ✓: provides or resists; ✗: does not provide or does not resist.
|