Table 6.
Comparative analysis among reviews.
| ID | Protection against Attacks | Methods and Tools | Based on Technology | Simulators | Evaluation Metrics |
|---|---|---|---|---|---|
| RV01 | DoS | PKI | |||
| Tampering | ECC | ||||
| Sybil | IBPKC | ||||
| Replay | |||||
| Impersonation | |||||
| RV02 | DoS | Blockchain | |||
| Tampering | |||||
| Impersonation | |||||
| Sybil | |||||
| Replay | |||||
| Eavesdropping | |||||
| MitM | |||||
| RV03 | DoS | PKC | Cloud computing | SUMO | Computational cost |
| Tampering | SKC | OMNET++ | Communication overhead | ||
| MitM | IBPKC | NS-2 | |||
| Eavesdropping | PKI | NS-3 | |||
| Impersonation | Hash functions | Veins | |||
| Replay | ECC | ||||
| Sybil | |||||
| RV04 | Tampering | ||||
| Impersonation | |||||
| Sybil | |||||
| MitM | |||||
| DoS | |||||
| Eavesdropping | |||||
| Replay | |||||
| Bogus | |||||
| RV05 | DoS | PKI | Blockchain | ||
| Tampering | Hash functions | Fog computing | |||
| Eavesdropping | |||||
| Sybil | |||||
| Replay | |||||
| RV06 | DoS | PKI | |||
| Bogus | |||||
| Impersonation | |||||
| Eavesdropping | |||||
| RV07 | DoS | PKI | |||
| Sybil | PKC | ||||
| MitM | SKC | ||||
| Tampering | |||||
| Impersonation | |||||
| Replay | |||||
| RV08 | MitM | PKI | Blockchain | ||
| Impersonation | IBPKC | ||||
| Tampering | |||||
| Eavesdropping | |||||
| RV09 | Tampering | PKI | Computational cost | ||
| Eavesdropping | ECC | Communication overhead | |||
| SKC | Average delay | ||||
| IBPKC | |||||
| Our review | MitM | ECC | Blockchain | SUMO | Computational cost |
| Replay | CBC | Edge computing | OMNet++ | Communication overhead | |
| Modification | PKI | SDN | NS-3 | Transmission delay | |
| Tampering | PKC | NFV | NS-2 | Propagation delay | |
| DoS | SKC | Fog computing | Veins | Packet Delivery Ratio | |
| Session Key Disclosure | IBPKC | Group Formation Criteria | SSGA | Packet Loss Ratio | |
| Impersonation | Hash functions | Cloud computing | MOVE | Accuracy | |
| Sybil | Pseudonyms | Trust Value | |||
| Forgery | Data Receiving Rate | ||||
| Bogus | Storage Cost | ||||
| Eavesdropping | Storage Overhead | ||||
| Plaintext | Roaming Latency | ||||
| Key Leakage | Cyphertext Length | ||||
| Chosen Message | Energy Consumption | ||||
| Ciphertext | Throughput | ||||
| Beacon Transmission Denial | Attack Detection Rate | ||||
| Average Delay | |||||
| False Accept Rate |