“…In addition, the approach in [144] cannot provide anonymity [146]. This problem is tackled by the dynamic pseudonym based authentication schemes in [147], [148], [149], [150], [151], [152], [153], [154], [155], [156], [157], [158], [159], [160], [161], [162] and [163]. As such, the eavesdropping the communication channel cannot yield any valid users identities [59], [164], [165].…”