“…Different attacks on integrity. ,24,27,30,[33][34][35][36][37][38][39][40][41][42][43] Change the content of the messages to send wrong information or fake dataMasquerading 18,[21][22][23][24][25]27,29,30,33,37,38,[40][41][42][44][45][46][47][48][49][50][51][52] Send fake data to the users as a trusted ID to create a chaos in the network Black hole21-26, 30, 33, 37, 38, 40, 42, 44, 47, 48, 52, 53 Not allowing any messages to pass which will increase the time to receive the packet and the vehicles might not have enough time to react Gray hole21, 22, 24, 30, 33-35, 38, 42, 44, 47, 50-52 To give the attacker the ability to join the network without the need to be physically there…”