|
| Reference | Type of attack | Security service | Goals and targets achieved by implementation of algorithms |
|
| [58] | Eavesdropping | Availability | Solving attack problems by asymmetric cryptography technique To improve the wireless security, enhance the efficiency |
| [80] | Multiple types | Availability | The framework can reduce the cost and gain outperformed results. |
| [81] | Jamming | Availability | Blowfish cryptosystem is used for encryption and decryption to make secure routes in MANET. |
| [51] | Malware | Availability | To protect location privacy and improve the quality of service in the network |
| [82] | Greedy behavior attack | Target availability | To improve the GSM security via CL-PKC while the handshaking procedure is being done |
| [70] | Blackhole | Availability | To improve the MANET security using fixed slot length, the attacker cannot continue the attack on the network. |
| [83] | Multiple | Availability | Present multiple challenges and solutions for preventing IoT overcloud. |
| [4] | Multiple | Confidentiality | Use encryption technique. Use VIPER technique for V2I communications. |
| [23] | Sybil attack and DoS | Confidentiality | Present multiple solutions to prevent an attack on smartphones. |
| [84] | Sybil attack | Confidentiality | Use a distributed and robust approach |
| [85] | Impersonation attack | Authentication | Make use of SPECS (secure and privacy enhancing communication schemes). Make use digital certificates. |
| [28] | Spoofing attack | Authentication | Present some open challenges in hybrid network of cloud and 5G. |
| [52] | Repudiation attack | Nonrepudiation | Make use of digital signatures. Use PKC-based pseudoidentities. |
| [71] | Sybil attack and DoS | Availability | By the use of signature-based authentication and bit commitment, the impact of DoS attack is reduced. |
| [72] | Sybil attack | Authentication availability | A central authority for validation (VA) deployment validates the network’s components in real time. The working principle of validation will be direct and indirect. By cryptographic technique, nodes that want to establish a direct link authenticate VA indirect validation. VA can use temporary certificates. By using the validation technology, VA is a protected option for attacks. |
| [86] | Jamming | Availability | Change the transmission channel and use FHSS frequency hop technology to produce pseudorandom hopping numbers for the algorithm by using cryptographic algorithms. This strategy needs improvement to the existing OFDM standard. |
| [87] | Certificate and or key replication | Authentication and confidentiality | For certificate and key replication, cross-certification among the various VANET certification authorities CRL (revocation certificate) real-time validity test for digital certificates Use validated and certified disposable keys. |
| [88] | Greedy Malware Wormhole Tunneling Blackhole Spamming | Availability Nonrepudiation Authentication Confidentiality Integrity | The cryptographic technique does not provide practical solutions for these attacks, but specific recommended methods can minimize adverse effects such as digital software signatures. |
|