Review Article

Lightweight Cryptographic Techniques for Automotive Cybersecurity

Table 1

Attacks on VANET and their impact on security requirements.

Security Requirements Attacks Reference (Security Requirements/Attacks)

Message authentication and integrity Sybil/Impersonation/Replay attacks [2023]/[46, 47, 53]
Availability DoS/Sybil/Bogus information/Routing attacks [2426]/[46, 49, 50]
Confidentiality Sybil/Impersonation attacks [20]/[4648]
Non-Repudiation Impersonation attacks [24, 25]/[48]
Privacy Impersonation/Location Trailing/Eavesdropping attacks [28, 29]/[4145]