|
Protocol | Data attacked | Approach |
|
Lai et al. (2013) [38] | Replaying the data between the mobiles equipment and the 3GPP network | Random numbers |
Sun et al. (2015) [53] | Replaying the intercepted login message | Random numbers |
Lai et al. (2013) [37] | Replaying the message between serving gateway and home subscriber server | Random numbers |
Cespedes et al. (2013) [39] | Replaying one of the router solicitation messages | Random numbers |
Wasef and Shen (2013) [40] | Replaying the disseminated messages in IoV | Timestamp |
Shao et al. (2016) [63] | Replaying the disseminated messages in IoV | Timestamp |
Zhang et al. (2016) [52] | Replaying the disseminated messages in IoV | Timestamp |
Li et al. (2014) [49] | Replaying the electricity consumption reports | Merkle hash tree technique |
Nicanfar et al. (2011) [139] | Replaying the electricity consumption reports | Timestamp |
Chim et al. (2011) [140] | Replaying the electricity consumption reports | Timestamp |
Fouda et al. (2011) [141] | Replaying the electricity consumption reports | Timestamp |
Nicanfar et al. (2014) [142] | Forwarding a previous acknowledgment from the smart meter to the server | Timestamp |
Mahmood et al. (2016) [67] | Intercept messages by home area network and replay those archaic messages to building area network gateway | Timestamp |
Kumari et al. (2016) [68] | Intercept and replay the login request to gateway wireless node | Timestamp |
Jan et al. (2016) [143] | Eavesdrop on advertisement packets and/or join-request packets and replay in other parts of the network | Hash function and ring keys |
Amin and Biswas (2016) [70] | Replaying the message in the IoS | Timestamp |
Das (2016) [72] | Replaying the login request message | Timestamp |
Chang and Le (2016) [73] | Replaying the login request message | Timestamp |
Farash et al. (2016) [75] | Replaying the login request message | Timestamp |
Srinivas et al. (2017) [144] | Replaying the messages in the IoS | Timestamp |
Kumari et al. (2016) [76] | Intercept and replay the login request to gateway wireless node | Timestamp |
Jiang et al. (2017) [77] | Intercept the login request | Timestamp |
Liu and Chung [148] | Intercept the login request | Timestamp |
|