“…1) Cryptography methods: Cryptographic methods are the most used by the authentication and privacy preserving Secure hash function [72] , [73], [74], [75], [76], [77], [78], [79], [80], [81], [82], [83], [84], [85], [86], [87], [88], [89], [90], [91], [92], [93], [62], [94], [63], [64], [95], [96], [65], [97], [98], [99], [100], [66], [101], [102], [103], [104], [105], [106], [107], [108], [109], [110], [71] Index-pseudonym [83] UMTS-AKA mechanism [111], [112] Message Authentication Code (MAC) [112],…”