“…Man-in-the-middle: As its name implies, the attacker is inserted between the transmitter and the receiver, for example, as an OBU or RSU inserts between two communicating vehicles to introduces or inject false message or modified the original message. [16] , [17], [18], [19], [20], [21] [22], [23] M C2 Sybil Availbility Authenticity M M M [24], [25], [26], [27], [28], [29], [18], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40] H C3 Jamming Availbility H H H [41,42] [43], [13], [44], [12], [45], [46], [47], [22], [ [58], [59], [60], [61], [62], [63], [64], [65], [18], [66,67], [46]…”