2024
DOI: 10.3390/s24020368
|View full text |Cite
|
Sign up to set email alerts
|

Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions

Easa Alalwany,
Imad Mahgoub

Abstract: The Internet of Vehicles (IoV) is a technology that is connected to the public internet and is a subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a mobile and wireless network. Numerous vehicles, users, things, and networks allow nodes to communicate information with their surroundings via various communication channels. IoV aims to enhance the comfort of driving, improve energy management, secure data transmission, and prevent road accidents. Despite IoV’s advantages,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 170 publications
0
5
0
Order By: Relevance
“…Attackers can utilize these vulnerabilities to compromise the communication system's availability, confidentiality, and integrity [38][39][40]. In [10], hacking was employed to gain unauthorized access and control over the functionalities of a Jeep Cherokee.…”
Section: Can Bus Attacksmentioning
confidence: 99%
“…Attackers can utilize these vulnerabilities to compromise the communication system's availability, confidentiality, and integrity [38][39][40]. In [10], hacking was employed to gain unauthorized access and control over the functionalities of a Jeep Cherokee.…”
Section: Can Bus Attacksmentioning
confidence: 99%
“…The primary objective of this algorithm is to identify deviations from normal traffic patterns in V2X communications. Machine learning algorithms, particularly those employing unsupervised learning, analyze historical traffic data to learn normal patterns [41], [42]. These models can detect anomalies such as sudden traffic increases or unusual message volumes, allowing for timely alerts to potential attacks.…”
Section: Machine Learning-based Anomaly Detection Algorithm: Anomaly ...mentioning
confidence: 99%
“…The objective of this algorithm is to classify V2X messages as either benign or malicious based on their content, behavior, and contextual information. Deep learning models, often utilizing neural networks, are capable of processing message content and behavior to learn normal patterns and differentiate them from malicious ones [41]- [44]. This real-time intrusion detection capability is vital for preventing unauthorized access and potential threats.…”
Section: Deep Learning-based Intrusion Detection Algorithm: Intrusion...mentioning
confidence: 99%
“…Chassis execution, integrating actuators and control systems, ensures precise maneuvers, contributing to passenger comfort and confidence [27]. The integration of IoV facilitates real-time data exchange and communication between vehicles and infrastructure, optimizing traffic and enhancing safety features [28]. These technologies collectively revolutionize public transportation, offering efficient, safe, and sustainable mobility solutions for urban environments and shaping the future of autonomous transportation ecosystems.…”
Section: Key Technologies For Autonomous Busesmentioning
confidence: 99%