Review Article
Lightweight Cryptographic Techniques for Automotive Cybersecurity
Table 1
Attacks on VANET and their impact on security requirements.
| Security Requirements | Attacks | Reference (Security Requirements/Attacks) |
| Message authentication and integrity | Sybil/Impersonation/Replay attacks | [20–23]/[46, 47, 53] | Availability | DoS/Sybil/Bogus information/Routing attacks | [24–26]/[46, 49, 50] | Confidentiality | Sybil/Impersonation attacks | [20]/[46–48] | Non-Repudiation | Impersonation attacks | [24, 25]/[48] | Privacy | Impersonation/Location Trailing/Eavesdropping attacks | [28, 29]/[41–45] |
|
|