“…Many schemes [58], [59], [85], [86], [88], [90], [94], [96], [101]- [103], [105], [106], [116], [118], [120], [125] adopted pseudonym-based mechanism to achieve identity pri-vacy preservation. In order to prevent adversaries from identity tracing, the ME changes its pseudonym every time when it performs handover.…”