Skip to main content
. 2020 Apr 27;20(9):2483. doi: 10.3390/s20092483

Table 1.

Comparisons of the current work on secure ITS.

Traditional ITS Infrastructure Blockchain-Based ITS
[10] [11] [13] [5] [26] [27]
Privacy User can be traced User can be traced User can be traced Anonymity Anonymity NA
Trust Signature Signature NA Yes Yes Yes
Authentication Yes Yes Yes Yes Yes Yes
Accountability Yes Yes Yes Yes Yes Yes
Attacks Protection Bogus message attacks Tampering Spoofing NA NA NA
Data Consistency NA NA NA Yes Yes Yes
Confidentiality NA Yes Yes Yes Yes No
Integrity Yes Yes Yes Yes Yes Yes
Non-repudiation Yes Yes NA Yes Yes Yes
Access Control Yes Yes No NA NA NA
Scalability NA NA NA NA NA NA
Implementation Limitations Require to collect the behavior of vehicles Require to register in a group Broadcasting delay of messages High computing power and memory requirement High memory requirement High memory requirement