Algorithm 1: An adaptive, lightweight, secure, and efficient RFID-based authentication scheme for IoV. |
Register with the cloud; the cloud synchronizes the RID to the edge server after hashing and encryption broadcast to the surrounding area, where ,. receive if compute if Perform rapid mutual authentication phase else Perform the transfer of ownership phase else return 0 (Request Timeout) |