Attribute | Example mechanism | NetSim | Veins | Eclipse MOSAIC | EstiNet | ezCar2X | VENTOS | VANETsim |
---|---|---|---|---|---|---|---|---|
Confidentiality | Symmetric and | Â | Â | Â | Â | Â | Â | Â |
 | asymmetric cryptography | X | X | X |  | X | X |  |
Integrity | Message Authentication code, | Â | Â | Â | Â | Â | Â | Â |
 | Digital signature |  | X | X |  | X | X |  |
Availability | Watchdog, | Â | Â | Â | Â | Â | Â | Â |
 | Redundancy |  | X | X | X |  | X |  |
Authentication | Position verification, | Â | Â | Â | Â | Â | Â | Â |
Analyze signal strength, | Â | Â | Â | Â | Â | Â | Â | Â |
Dual Authentication | Â | X | X | X | X | X | X | X |
Non-repudiation | ID-Based cryptosystem | Â | X | Â | Â | Â | Â | Â |
Privacy | Silent periods, | Â | Â | Â | Â | Â | Â | Â |
Mix Zones, | Â | Â | X | Â | Â | Â | Â | X |
Periodical pseudonym change | Â | Â | Â | Â | Â | Â | Â | Â |