Research Article
A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks
Table 2
Security features comparison.
| Functionality | [24] | [29] | [13] | [30] | [35] | [36] | [31] | Our scheme |
| Anonymous | Yes | No | No | Yes | Yes | Yes | Yes | Yes | Mutual authentication | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Integrity | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Traceability | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Unlinkability | Yes | Yes | No | No | Yes | Yes | No | Yes | Replay attack | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Man-in-the-middle attack | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Counterfeit attack | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Batch certification | No | Yes | Yes | Yes | No | No | No | Yes |
|
|