Table 1. Preventive measures for existing Attacks.

Property Violated Attacks Preventive Measures
Privacy Location trailing ID based system
Availability Denial of Service (DOS) IP Info. Handling
Routing attacks Cryptography Hashing etc.
Integrity and confidentiality Eavesdropping Creation of cipher
Replay Time-stamping
Bogus info. Hashing, Asymmetric cryptography
Authenticity Sybil Radio resource testing, Registration, Position verification, etc.
Impersonation Trust authority, PK1
Timing attack Encryption solution (TPM)
Session hijacking Encryption, Random SID generation