Internet of Vehicles (IoV) has become an intelligent application of Internet of Things (IoT) in smart transportation. IoV takes the intelligent commitments to the passengers for improving efficiency and safety of traffic. It also creates enjoyable riding atmosphere. Another variation of mobile cloud computing is fog cloud based IoV, where Internet and vehicular cloud can co-operate in an effective way in IoV. Moreover, IoV is becoming dangerous to various attacks due to the increasing dependency of wireless communication and computing technologies. Recently, Wazid et al. proposed “AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment” to make the communication secure between vehicles, fog servers, road side units and cloud servers. In this comment, we cryptanalyzed the protocol of Wazid et al. and found it vulnerable to vehicle impersonation, fog server impersonation, road side unit impersonation and cloud server impersonation attacks.