Wired communication channel | Un-encrypted back-end communication channel | Revelation of sensitive information | Eavesdropping between RSU and central entity | Use of encrypted messages | Confidentiality/Privacy |
RSU, Central entity | Hardware vulnerabilities | Network flooding with compromised messages | Bogus information between RSU and central entity | ECDSA | Confidentiality/Authentication |
Wired communication channel | Hardware malfunction, Software flaws,Un-encrypted communication channel | Message alterations en-route to other vehicles via RSU and central entity | MITM attacks between RSU and cental entity | Strong cryptographic techniques | Confidentiality/Availability |
Wired communication channel | Un-encrypted back-end communication channel | Discarding messages | Wormhole attacks | Packet leash [82] [83] , HEAP [84] | Confidentiality/Authentication |