Table 1.
Comparisons of the current work on secure ITS.
| Traditional ITS Infrastructure | Blockchain-Based ITS | |||||
|---|---|---|---|---|---|---|
| [10] | [11] | [13] | [5] | [26] | [27] | |
| Privacy | User can be traced | User can be traced | User can be traced | Anonymity | Anonymity | NA |
| Trust | Signature | Signature | NA | Yes | Yes | Yes |
| Authentication | Yes | Yes | Yes | Yes | Yes | Yes |
| Accountability | Yes | Yes | Yes | Yes | Yes | Yes |
| Attacks Protection | Bogus message attacks | Tampering | Spoofing | NA | NA | NA |
| Data Consistency | NA | NA | NA | Yes | Yes | Yes |
| Confidentiality | NA | Yes | Yes | Yes | Yes | No |
| Integrity | Yes | Yes | Yes | Yes | Yes | Yes |
| Non-repudiation | Yes | Yes | NA | Yes | Yes | Yes |
| Access Control | Yes | Yes | No | NA | NA | NA |
| Scalability | NA | NA | NA | NA | NA | NA |
| Implementation Limitations | Require to collect the behavior of vehicles | Require to register in a group | Broadcasting delay of messages | High computing power and memory requirement | High memory requirement | High memory requirement |