Research Article
A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks
Table 2
Security features comparison.
| | Functionality | [24] | [29] | [13] | [30] | [35] | [36] | [31] | Our scheme |
| | Anonymous | Yes | No | No | Yes | Yes | Yes | Yes | Yes | | Mutual authentication | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | | Integrity | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | | Traceability | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | | Unlinkability | Yes | Yes | No | No | Yes | Yes | No | Yes | | Replay attack | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | | Man-in-the-middle attack | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | | Counterfeit attack | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | | Batch certification | No | Yes | Yes | Yes | No | No | No | Yes |
|
|