Review Article
Authentication Protocols for Internet of Things: A Comprehensive Survey
Table 5
Summary of attacks in Internet of Vehicles (IoV) and defense protocols.
| Adversary model | Authentication protocols for IoV | [39] | [40] | [63] | [64] | [65] | [66] | [48] | [52] | [54] |
| Audio replay attack | 0 | 0 | 0 | X | 0 | 0 | X | 0 | X | Changing distance attack | X | X | X | X | X | X | X | X | X | Same-type-device attack | X | X | X | X | X | X | X | X | X | Composition attack | X | X | X | X | X | X | X | X | X | Redirection attack | 0 | 0 | X | X | X | X | X | X | X | Man-in-the-middle attack | ✓ | 0 | 0 | X | X | ✓ | 0 | X | X | Substitution attack | 0 | 0 | 0 | X | X | 0 | ✓ | X | X | DoS attack | ✓ | X | X | ✓ | ✓ | ✓ | X | X | X | Replay attack | ✓ | ✓ | ✓ | X | 0 | 0 | 0 | ✓ | 0 | Forging attack | 0 | ✓ | X | X | X | 0 | X | X | X | Colluding attack | 0 | ✓ | X | 0 | X | X | X | X | X | Flooding attack | X | X | X | 0 | X | X | X | X | X | Side-channel attack | X | X | X | 0 | ✓ | X | X | X | X | False messages attack | X | X | X | X | ✓ | X | X | X | 0 | Sybil attack | 0 | X | X | X | ✓ | 0 | X | X | 0 | Movement tracking | X | X | X | X | X | X | X | ✓ | X | Message modification | X | X | X | X | X | X | 0 | ✓ | X | Impersonation attack | X | X | X | X | X | ✓ | X | 0 | X | Guessing attack | X | X | X | X | X | X | X | X | 0 | Stolen-verifier attack | X | X | X | X | X | X | X | X | 0 | Wormhole attack | 0 | 0 | X | X | 0 | X | 0 | 0 | 0 | Blackhole attack | 0 | 0 | X | X | 0 | X | 0 | 0 | 0 | Attribute-trace attack | X | X | X | X | X | 0 | X | X | 0 | Eavesdropping attack | X | X | 0 | 0 | 0 | X | X | 0 | 0 | Chosen-plaintext attack | X | X | X | 0 | X | X | 0 | X | 0 | Spam attack | X | X | X | 0 | X | 0 | 0 | X | X | Identity theft attack | X | X | X | 0 | X | X | 0 | X | X | User manipulation attack | X | X | X | 0 | X | X | 0 | 0 | X | Routing attack | 0 | X | 0 | X | 0 | X | 0 | 0 | 0 | Linkability attack | X | X | X | X | X | 0 | X | 0 | X | Rejection attack | X | X | X | X | X | 0 | X | 0 | 0 | Successive-response attack | X | X | X | X | X | 0 | X | X | X | Packet analysis attack | 0 | 0 | X | X | 0 | 0 | X | 0 | 0 | Packet tracing attack | 0 | 0 | X | X | 0 | 0 | X | 0 | 0 | Brute-force attack | X | X | X | X | X | 0 | X | 0 | 0 |
|
|
✓ indicates fully supported; X: indicates not supported; 0: indicates partially supported.
|