Review Article

Lightweight Cryptographic Techniques for Automotive Cybersecurity

Table 4

Lightweight Protocols for vehicular network with respect to security requirements and attack mitigation.

Lightweight Protocols Security Requirements Attack Mitigation

ARAN Message authentication/IntegrityImpersonation/Eavesdropping/Replay
SEAD Authentication/Availability/Privacy Preservation Routing/DoS/Impersonation Attacks
AriadneAvailability/Privacy Preservation DoS/Routing/Replay attacks
SAODV/A_SAODV Authentication/Availability/Privacy PreservationImpersonation/Bogus/information/Routing attack
OTCAvailability Session hijacking
ECDSA AuthenticationBogus information/Impersonation Attacks
RobSADConfidentiality/Authentication/IntegritySybil Attack
HolisticAuthentication/ConfidentialityImpersonation Attacks