Skip to main content
. 2022 Nov 24;22(23):9123. doi: 10.3390/s22239123

Table 6.

Comparative analysis among reviews.

ID Protection against Attacks Methods and Tools Based on Technology Simulators Evaluation Metrics
RV01 DoS PKI
Tampering ECC
Sybil IBPKC
Replay
Impersonation
RV02 DoS Blockchain
Tampering
Impersonation
Sybil
Replay
Eavesdropping
MitM
RV03 DoS PKC Cloud computing SUMO Computational cost
Tampering SKC OMNET++ Communication overhead
MitM IBPKC NS-2
Eavesdropping PKI NS-3
Impersonation Hash functions Veins
Replay ECC
Sybil
RV04 Tampering
Impersonation
Sybil
MitM
DoS
Eavesdropping
Replay
Bogus
RV05 DoS PKI Blockchain
Tampering Hash functions Fog computing
Eavesdropping
Sybil
Replay
RV06 DoS PKI
Bogus
Impersonation
Eavesdropping
RV07 DoS PKI
Sybil PKC
MitM SKC
Tampering
Impersonation
Replay
RV08 MitM PKI Blockchain
Impersonation IBPKC
Tampering
Eavesdropping
RV09 Tampering PKI Computational cost
Eavesdropping ECC Communication overhead
SKC Average delay
IBPKC
Our review MitM ECC Blockchain SUMO Computational cost
Replay CBC Edge computing OMNet++ Communication overhead
Modification PKI SDN NS-3 Transmission delay
Tampering PKC NFV NS-2 Propagation delay
DoS SKC Fog computing Veins Packet Delivery Ratio
Session Key Disclosure IBPKC Group Formation Criteria SSGA Packet Loss Ratio
Impersonation Hash functions Cloud computing MOVE Accuracy
Sybil Pseudonyms Trust Value
Forgery Data Receiving Rate
Bogus Storage Cost
Eavesdropping Storage Overhead
Plaintext Roaming Latency
Key Leakage Cyphertext Length
Chosen Message Energy Consumption
Ciphertext Throughput
Beacon Transmission Denial Attack Detection Rate
Average Delay
False Accept Rate