From: A service-categorized security scheme with physical unclonable functions for internet of vehicles
Reference | Blockchain | PUF | Security measure | Application | Advantages | Identified issue |
---|---|---|---|---|---|---|
Jiang et al. [16] | No | Yes | Multi-factor authentication | IoV | Strong security due to multi-factor authentication | More computational overhead |
Xiong et al. [17] | No | No | Identity-based encryption | IoV | Inbuilt equality test of Signcryption | It suffers from trapdoor query |
Qureshi et al. [18] | No | No | Trust-based | IoV | Micro-level analysis that instantaneously identifies changes | Slow verification due to varying trust factors |
Wang et al. [19] | Yes | No | Identity-based blind signature technology | IoV | Microservices for blockchain | Model limited to 6G technology |
Tian et al. [20] | No | No | Trust-based | IoV | Punishment model for malicious vehicles | The real roadmap and traffic scenario are not considered |
Yang et al. [21] | Yes | No | Anonyms authentication | IoV | Decentralized operations, Revocation mechanism for malicious vehicles | Transaction latency is high for real IoV systems |
Bagga et al. [22] | Yes | No | Group key-based authentication | IoV | Use of big data analytics and machine learning algorithm for the analysis of authentic data | The execution time on the emulated device is high |
Houmer et al. [23] | No | No | Secret key-based authentication | IoV | Less execution time | Model limited to 6G technology |
Jiang et al. [24] | No | No | Self-checking authentication based on a pseudonym | VANET | Participation of trusted authority in authentication and group signature | Roadside unit deployment cost is high |
Wang et al. [25] | No | No | Multi-server-based authentication | IoV | Smart card is used for extra security of keys | Session disconnection requires a long process increasing the complexity |
Shen et al. [26] | Yes | No | Key-based and privacy | IoV | Decentralized operations, less complexity | Synchronization lag between heterogeneous services |
Xi et al. [27] | No | No | Anonymous mutual authentication | IoV | User traceability is easy and fast reconnection | Overhead in maintaining anonymity |
Zhang et al. [28] | No | No | Mutual authentication | IoV | Less verification time for different users | Session disconnection requires a long process increasing the complexity |
Xie et al. [29] | No | No | Two-stage method towards security | In-Vehicle Applications | Ease of deployment robustness | Non-parallel in-vehicle applications are not supported |