Wired communication channel

Un-encrypted back-end communication channel

Revelation of sensitive information

Eavesdropping between RSU and central entity

Use of encrypted messages

Confidentiality/Privacy

RSU, Central entity

Hardware vulnerabilities

Network flooding with compromised messages

Bogus information between RSU and central entity

ECDSA

Confidentiality/Authentication

Wired communication channel

Hardware malfunction, Software flaws,Un-encrypted communication channel

Message alterations en-route to other vehicles via RSU and central entity

MITM attacks between RSU and cental entity

Strong cryptographic techniques

Confidentiality/Availability

Wired communication channel

Un-encrypted back-end communication channel

Discarding messages

Wormhole attacks

Packet leash [82] [83] ,

HEAP [84]

Confidentiality/Authentication