Review Article
Lightweight Cryptographic Techniques for Automotive Cybersecurity
Table 2
Asymmetric cryptographic solutions for VANET.
| Asymmetric Cryptographic solutions | Security Requirements support | Limitations |
| Anonymous keys and certificates. | Authentication/Availability/Privacy Preservation | Computational hardness | ID-based proxy signatures | Authentication/Privacy Preservation/Non-Repudiation | Vulnerable to reveal private key | Elliptic Curve Cryptography | Authentication/Availability/Privacy Preservation | Vulnerable to replay attack | RSU-aided Authentication Methods | Authentication/Privacy Preservation | Compromise on an RSU can result in disclosure of information | Smart Cards for identification | Message authentication/privacy preserving | Storage |
|
|