Review Article
Lightweight Cryptographic Techniques for Automotive Cybersecurity
Table 4
Lightweight Protocols for vehicular network with respect to security requirements and attack mitigation.
| Lightweight Protocols | Security Requirements | Attack Mitigation |
| ARAN | Message authentication/Integrity | Impersonation/Eavesdropping/Replay | SEAD | Authentication/Availability/Privacy Preservation | Routing/DoS/Impersonation Attacks | Ariadne | Availability/Privacy Preservation | DoS/Routing/Replay attacks | SAODV/A_SAODV | Authentication/Availability/Privacy Preservation | Impersonation/Bogus/information/Routing attack | OTC | Availability | Session hijacking | ECDSA | Authentication | Bogus information/Impersonation Attacks | RobSAD | Confidentiality/Authentication/Integrity | Sybil Attack | Holistic | Authentication/Confidentiality | Impersonation Attacks |
|
|