Review Article
Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey
Table 1
Security services target and solutions.
| Name of attack | Service | Trust-based | Cryptography-based |
| Betrayal attack | Authenticity, availability, integrity | × | — | Replayed, altered, and injected message attack | Authenticity, availability, integrity | × | × | Illusion attack | Integrity | × | — | Masquerading attack | Authenticity | × | — | Impersonation attack | Authenticity, nonrepudiation | × | × | Sybil attack | Authenticity, nonrepudiation | × | × | GPS position fake attack | Authenticity, nonrepudiation | × | — | Timing attack | Availability | × | × | Black hole attack | Availability | × | × | Gray hole attack | Availability | × | × | Certificate replication attack | Authenticity | — | × | Eavesdropping attack | Confidentiality, privacy | × | × | Tracking/tracing attacks | Privacy | — | × | Denial of service attack | Availability | × | × | Jamming attack | Availability | × | × | Coalition and platooning attack | Availability, privacy | × | — |
|
|