Skip to main content

Table 1 Comparative analysis of related work

From: A service-categorized security scheme with physical unclonable functions for internet of vehicles

Reference

Blockchain

PUF

Security measure

Application

Advantages

Identified issue

Jiang et al. [16]

No

Yes

Multi-factor authentication

IoV

Strong security due to multi-factor authentication

More computational overhead

Xiong et al. [17]

No

No

Identity-based encryption

IoV

Inbuilt equality test of Signcryption

It suffers from trapdoor query

Qureshi et al. [18]

No

No

Trust-based

IoV

Micro-level analysis that instantaneously identifies changes

Slow verification due to varying trust factors

Wang et al. [19]

Yes

No

Identity-based blind signature technology

IoV

Microservices for blockchain

Model limited to 6G technology

Tian et al. [20]

No

No

Trust-based

IoV

Punishment model for malicious vehicles

The real roadmap and traffic scenario are not considered

Yang et al. [21]

Yes

No

Anonyms authentication

IoV

Decentralized operations, Revocation mechanism for malicious vehicles

Transaction latency is high for real IoV systems

Bagga et al. [22]

Yes

No

Group key-based authentication

IoV

Use of big data analytics and machine learning algorithm for the analysis of authentic data

The execution time on the emulated device is high

Houmer et al. [23]

No

No

Secret key-based authentication

IoV

Less execution time

Model limited to 6G technology

Jiang et al. [24]

No

No

Self-checking authentication based on a pseudonym

VANET

Participation of trusted authority in authentication and group signature

Roadside unit deployment cost is high

Wang et al. [25]

No

No

Multi-server-based authentication

IoV

Smart card is used for extra security of keys

Session disconnection requires a long process increasing the complexity

Shen et al. [26]

Yes

No

Key-based and privacy

IoV

Decentralized operations, less complexity

Synchronization lag between heterogeneous services

Xi et al. [27]

No

No

Anonymous mutual authentication

IoV

User traceability is easy and fast reconnection

Overhead in maintaining anonymity

Zhang et al. [28]

No

No

Mutual authentication

IoV

Less verification time for different users

Session disconnection requires a long process increasing the complexity

Xie et al. [29]

No

No

Two-stage method towards security

In-Vehicle Applications

Ease of deployment robustness

Non-parallel in-vehicle applications are not supported