Table 1.
Paper | Year | Network Type | Multilayer Authorization | Blockchain Usage | Authentication Technique | |
---|---|---|---|---|---|---|
VANET | IoV | |||||
[19] | 2021 | N | Y | N | Y | Batch authentication |
[20] | 2021 | N | Y | N | Y | Roadside Unit-assisted authentication |
[21] | 2021 | N | Y | N | Y | Blockchain-based authentication |
[22] | 2021 | N | Y | N | N | Mutual authentication and key agreement |
[23] | 2021 | N | Y | N | Y | Elliptic Curve Cryptography-Enabled Radio Frequency Identification Mutual Authentication |
[24] | 2020 | N | Y | N | N | Cryptography-Based Authentication |
[25] | 2020 | Y | N | N | N | Elliptic Curve Cryptography (ECC) and general one-way hash function |
[26] | 2019 | Y | N | N | N | Authentication based on semi-trusted authority |
[27] | 2019 | Y | N | N | N | RSU-based authentication |
[28] | 2019 | Y | N | N | N | Cryptography-Based Authentication |
[29] | 2019 | Y | N | N | N | Elliptic Curve Cryptography-Enabled Radio Frequency Identification Mutual Authentication |
[31] | 2019 | Y | N | N | N | Cryptography-Based Authentication |
[32] | 2019 | Y | N | Y | N | Cryptography-Based Authentication |
Note: Y: Yes; N: No.