2023
DOI: 10.1016/j.iot.2023.100809
|View full text |Cite
|
Sign up to set email alerts
|

Security issues in Internet of Vehicles (IoV): A comprehensive survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 63 publications
0
11
0
Order By: Relevance
“…The objective of this algorithm is to classify V2X messages as either benign or malicious based on their content, behavior, and contextual information. Deep learning models, often utilizing neural networks, are capable of processing message content and behavior to learn normal patterns and differentiate them from malicious ones [41]- [44]. This real-time intrusion detection capability is vital for preventing unauthorized access and potential threats.…”
Section: Deep Learning-based Intrusion Detection Algorithm: Intrusion...mentioning
confidence: 99%
“…The objective of this algorithm is to classify V2X messages as either benign or malicious based on their content, behavior, and contextual information. Deep learning models, often utilizing neural networks, are capable of processing message content and behavior to learn normal patterns and differentiate them from malicious ones [41]- [44]. This real-time intrusion detection capability is vital for preventing unauthorized access and potential threats.…”
Section: Deep Learning-based Intrusion Detection Algorithm: Intrusion...mentioning
confidence: 99%
“…DoS attack poses a significant threat to the IoV environment [9], [10]. These malicious endeavors aim to disrupt normal traffic, overwhelm network resources, and degrade essential service communication, to undermine the IoV's primary objective: seamless and efficient vehicular communication.…”
Section: Dos Attack In Iov Contextsmentioning
confidence: 99%
“…In an IoV topology, a successful DoS attack can have dire consequences, ranging from minor disruptions in traffic communication to catastrophic failures in emergency response communications. The primary purpose of these communications is to enhance road safety, traffic efficiency, and to pave the way for seamless integration of autonomous vehicles in smart city [11].…”
Section: Dos Attack In Iov Contextsmentioning
confidence: 99%
“…With the continuous development of Internet of Things (IoT) technology, the Internet of Vehicles (IoV) has received more and more attention. IoV is a concept rooted in IoT technology, aimed at integrating vehicles, roads, drivers, and infrastructure into a unified network for communication and information exchange [4]. Utilizing wireless communication, sensor technology, and data analysis, IoV enables vehicles to communicate with each other, interact with traffic infrastructure, and connect to drivers and cloud-based servers [5].…”
Section: Introductionmentioning
confidence: 99%
“…This review adopts a unique classification of DT's recent IoV applications over the past 3-5 years into four categories according to the application direction, presenting a fresh perspective and comprehensive analysis that offers clear insights and research directions. 4.…”
mentioning
confidence: 99%