Review Article

Lightweight Cryptographic Techniques for Automotive Cybersecurity

Table 5

Summary of cryptographic techniques for attack mitigation and security requirements support.

ā€‰ Cryptographic Solutions Security Requirements Attack Mitigation References

Asymmetric Algo Anonymous keys and certificates. Authentication/Availability/Privacy Preservation Eavesdropping/Replay/Impersonation attacks [21, 63, 66, 68]
ID-based proxy signatures Authentication/Privacy Preservation/Non-Repudiation Routing/DoS/Impersonation attacks [46, 51, 62, 64]
Elliptic Curve Cryptography Authentication/Availability/Privacy PreservationDoS/Routing/Replay attacks [51]
RSU-aided authentication method Privacy Preservation/Authentication Impersonation/Bogus/information Routing attack [66, 72]
Smart cards for identificationMessage authentication/integrant/privacy preserving Impersonation/Sybil attack [71, 73]

Symmetric Algo Blowfish Authentication/Availability Differential related-key attacks/broot force attack [74]
PBAS Authentication/Availability/Confidentiality DoS attack, Impersonation attack [75]
Camellia Authentication/Availability/Privacy PreservationImpersonation attack/DoS/Sybil attacks [76]
CASTAuthentication/Availability/Confidentiality Sybil/Impersonation attack/routing attacks [77]

Lightweight Protocols ARANMessage authentication/Integrity Impersonation/Eavesdropping/Replay [78]
SEADAuthentication/Availability Routing/DoS [79]
Ariadne Availability/Privacy Preservation DoS/Routing/Replay attacks[80]
SAODV/A_SAODV Authentication/Availability/Privacy Preservation Impersonation/Bogus/information/Routing attack [81, 82]
One Time Cookie Availability Session hijacking[83]
ECDSA Authentication Bogus information/Impersonation Attacks [84]
RobSAD Confidentiality/Authentication/Integrity Sybil Attack[85]
Holistic Authentication/ConfidentialityImpersonation Attacks[86]