Table 9.
Security features analysis.
| Security Service | Liao [24] |
Zhao [109] |
Alamr [110] |
Naeem [111] |
Dinarvand [112] |
Benssalah [113] |
Zheng [114] |
Yang [115] |
Aloui [116] |
Izza [117] |
|---|---|---|---|---|---|---|---|---|---|---|
| Confidentiality | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | - | - |
| Availability | Yes | Yes | No | Yes | Yes | Yes | Yes | - | Yes | - |
| Forward secrecy | Yes | Yes | Yes | - | Yes | Yes | Yes | - | Yes | No |
| Mutual authentication | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Anonymity | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Scalability | Yes | Yes | No | Yes | Yes | Yes | Yes | - | Yes | Yes |
| Location privacy | Yes | Yes | Yes | Yes | No | Yes | Yes | - | - | No |
| Data integrity | Yes | No | No | Yes | Yes | Yes | Yes | Yes | - | - |