|
ā | Cryptographic Solutions | Security Requirements | Attack Mitigation | References |
|
Asymmetric Algo | Anonymous keys and certificates. | Authentication/Availability/Privacy Preservation | Eavesdropping/Replay/Impersonation attacks | [21, 63, 66, 68] |
ID-based proxy signatures | Authentication/Privacy Preservation/Non-Repudiation | Routing/DoS/Impersonation attacks | [46, 51, 62, 64] |
Elliptic Curve Cryptography | Authentication/Availability/Privacy Preservation | DoS/Routing/Replay attacks | [51] |
RSU-aided authentication method | Privacy Preservation/Authentication | Impersonation/Bogus/information Routing attack | [66, 72] |
Smart cards for identification | Message authentication/integrant/privacy preserving | Impersonation/Sybil attack | [71, 73] |
|
Symmetric Algo | Blowfish | Authentication/Availability | Differential related-key attacks/broot force attack | [74] |
PBAS | Authentication/Availability/Confidentiality | DoS attack, Impersonation attack | [75] |
Camellia | Authentication/Availability/Privacy Preservation | Impersonation attack/DoS/Sybil attacks | [76] |
CAST | Authentication/Availability/Confidentiality | Sybil/Impersonation attack/routing attacks | [77] |
|
Lightweight Protocols | ARAN | Message authentication/Integrity | Impersonation/Eavesdropping/Replay | [78] |
SEAD | Authentication/Availability | Routing/DoS | [79] |
Ariadne | Availability/Privacy Preservation | DoS/Routing/Replay attacks | [80] |
SAODV/A_SAODV | Authentication/Availability/Privacy Preservation | Impersonation/Bogus/information/Routing attack | [81, 82] |
One Time Cookie | Availability | Session hijacking | [83] |
ECDSA | Authentication | Bogus information/Impersonation Attacks | [84] |
RobSAD | Confidentiality/Authentication/Integrity | Sybil Attack | [85] |
Holistic | Authentication/Confidentiality | Impersonation Attacks | [86] |
|