Review Article

Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey

Table 1

Security services target and solutions.

Name of attackServiceTrust-basedCryptography-based

Betrayal attackAuthenticity, availability, integrity×
Replayed, altered, and injected message attackAuthenticity, availability, integrity××
Illusion attackIntegrity×
Masquerading attackAuthenticity×
Impersonation attackAuthenticity, nonrepudiation××
Sybil attackAuthenticity, nonrepudiation××
GPS position fake attackAuthenticity, nonrepudiation×
Timing attackAvailability××
Black hole attackAvailability××
Gray hole attackAvailability××
Certificate replication attackAuthenticity×
Eavesdropping attackConfidentiality, privacy××
Tracking/tracing attacksPrivacy×
Denial of service attackAvailability××
Jamming attackAvailability××
Coalition and platooning attackAvailability, privacy×