Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 5

Summary of attacks in Internet of Vehicles (IoV) and defense protocols.

Adversary model Authentication protocols for IoV
[39][40][63][64][65][66][48][52][54]

Audio replay attack000X00X0X
Changing distance attackXXXXXXXXX
Same-type-device attackXXXXXXXXX
Composition attackXXXXXXXXX
Redirection attack00XXXXXXX
Man-in-the-middle attack00XX0XX
Substitution attack000XX0XX
DoS attackXXXXX
Replay attackX0000
Forging attack0XXX0XXX
Colluding attack0X0XXXXX
Flooding attackXXX0XXXXX
Side-channel attackXXX0XXXX
False messages attackXXXXXXX0
Sybil attack0XXX0XX0
Movement trackingXXXXXXXX
Message modificationXXXXXX0X
Impersonation attackXXXXXX0X
Guessing attackXXXXXXXX0
Stolen-verifier attackXXXXXXXX0
Wormhole attack00XX0X000
Blackhole attack00XX0X000
Attribute-trace attackXXXXX0XX0
Eavesdropping attackXX000XX00
Chosen-plaintext attackXXX0XX0X0
Spam attackXXX0X00XX
Identity theft attackXXX0XX0XX
User manipulation attackXXX0XX00X
Routing attack0X0X0X000
Linkability attackXXXXX0X0X
Rejection attackXXXXX0X00
Successive-response attackXXXXX0XXX
Packet analysis attack00XX00X00
Packet tracing attack00XX00X00
Brute-force attackXXXXX0X00

✓ indicates fully supported; X: indicates not supported; 0: indicates partially supported.