2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT) 2022
DOI: 10.1109/icicict54557.2022.9917816
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats & Attacks in IoV Environment: Open Research Issues and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…In [ 72 ], the security challenges within vehicular networks are discussed primarily, with an emphasis on attacks and preventive measures, but without explicit mentions of machine learning or trust. In [ 73 ], the author examined the security challenges of IoV environments, emphasizing various attack types and the need for privacy preservation and strong authentication, thereby contributing to discussions on security but without ML techniques.…”
Section: Related Surveysmentioning
confidence: 99%
See 1 more Smart Citation
“…In [ 72 ], the security challenges within vehicular networks are discussed primarily, with an emphasis on attacks and preventive measures, but without explicit mentions of machine learning or trust. In [ 73 ], the author examined the security challenges of IoV environments, emphasizing various attack types and the need for privacy preservation and strong authentication, thereby contributing to discussions on security but without ML techniques.…”
Section: Related Surveysmentioning
confidence: 99%
“…We provide a comprehensive discussion of related surveys, the difference between our survey and these related surveys, as well as the survey’s main focus, which is shown in Figure 2 . Despite the fact that there are several surveys on IoV security [ 12 , 65 , 67 , 69 , 71 , 72 , 73 , 74 , 75 ], few surveys have covered ML-based solutions in security or in trust schemes in this environment. For example, the surveys in [ 50 , 70 , 76 ] addressed the use of ML-based trust evaluation in IoV focusing on the trust scheme.…”
Section: Related Surveysmentioning
confidence: 99%
“…Consequently, a piece of secret information is captured and misused for different malicious purposes, which can cause serious interruptions [5]. Moreover, the constant exchange of information between road entities makes IoV an attractive target for eavesdroppers [6]. Such vulnerability raises significant concerns, as it can potentially lead to malicious activities that can endanger the safety, security, and privacy of the vehicle system.…”
Section: Introductionmentioning
confidence: 99%