Review Article

[Retracted] A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks

Table 1

Classification of attacks and goals achieved after implementation of different algorithms.

ReferenceType of attackSecurity serviceGoals and targets achieved by implementation of algorithms

[58]EavesdroppingAvailabilitySolving attack problems by asymmetric cryptography technique
To improve the wireless security, enhance the efficiency
[80]Multiple typesAvailabilityThe framework can reduce the cost and gain outperformed results.
[81]JammingAvailabilityBlowfish cryptosystem is used for encryption and decryption to make secure routes in MANET.
[51]MalwareAvailabilityTo protect location privacy and improve the quality of service in the network
[82]Greedy behavior attackTarget availabilityTo improve the GSM security via CL-PKC while the handshaking procedure is being done
[70]BlackholeAvailabilityTo improve the MANET security using fixed slot length, the attacker cannot continue the attack on the network.
[83]MultipleAvailabilityPresent multiple challenges and solutions for preventing IoT overcloud.
[4]MultipleConfidentialityUse encryption technique.
Use VIPER technique for V2I communications.
[23]Sybil attack and DoSConfidentialityPresent multiple solutions to prevent an attack on smartphones.
[84]Sybil attackConfidentialityUse a distributed and robust approach
[85]Impersonation attackAuthenticationMake use of SPECS (secure and privacy enhancing communication schemes).
Make use digital certificates.
[28]Spoofing attackAuthenticationPresent some open challenges in hybrid network of cloud and 5G.
[52]Repudiation attackNonrepudiationMake use of digital signatures.
Use PKC-based pseudoidentities.
[71]Sybil attack and DoSAvailabilityBy the use of signature-based authentication and bit commitment, the impact of DoS attack is reduced.
[72]Sybil attackAuthentication availabilityA central authority for validation (VA) deployment validates the network’s components in real time. The working principle of validation will be direct and indirect.
By cryptographic technique, nodes that want to establish a direct link authenticate VA indirect validation.
VA can use temporary certificates. By using the validation technology, VA is a protected option for attacks.
[86]JammingAvailabilityChange the transmission channel and use FHSS frequency hop technology to produce pseudorandom hopping numbers for the algorithm by using cryptographic algorithms. This strategy needs improvement to the existing OFDM standard.
[87]Certificate and or key replicationAuthentication and confidentialityFor certificate and key replication, cross-certification among the various VANET certification authorities
CRL (revocation certificate) real-time validity test for digital certificates
Use validated and certified disposable keys.
[88]Greedy
Malware
Wormhole
Tunneling
Blackhole
Spamming
Availability
Nonrepudiation
Authentication
Confidentiality
Integrity
The cryptographic technique does not provide practical solutions for these attacks, but specific recommended methods can minimize adverse effects such as digital software signatures.