Review Article

Lightweight Cryptographic Techniques for Automotive Cybersecurity

Table 2

Asymmetric cryptographic solutions for VANET.

Asymmetric Cryptographic solutions Security Requirements support Limitations

Anonymous keys and certificates. Authentication/Availability/Privacy Preservation Computational hardness
ID-based proxy signatures Authentication/Privacy Preservation/Non-Repudiation Vulnerable to reveal private key
Elliptic Curve Cryptography Authentication/Availability/Privacy Preservation Vulnerable to replay attack
RSU-aided Authentication Methods Authentication/Privacy Preservation Compromise on an RSU can result in disclosure of information
Smart Cards for identification Message authentication/privacy preserving Storage