Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions
Abstract
:1. Introduction
- We provide a detailed description of the concept of IoV that provides an overview and covers the architectures and types of connections in IoV.
- We explain the fundamentals of trust evaluation and its features in IoV.
- Security is a significant factor in an IoV environment, and serious security concerns of IoV are discussed in this survey.
- An IoV environment requires various security requirements to ensure constant safety and security.
- The survey discusses and identifies various security attacks including attacks on authentication, confidentiality, availability, integrity, secrecy, and routing.
- We present possible trust and security solutions for IoV environments by mainly focusing on classification using three types of ML models (supervised learning, unsupervised learning, and reinforcement learning).
2. Search Methodology
3. Background
3.1. Trust Management in IoV
3.1.1. Trust Properties
3.1.2. Components of Trust
3.1.3. Attributes of Trust
- Similarity: This refers to the degree to which two vehicles are similar in terms of content and services. Euclidean distance is often used to describe the similarity of messages or vehicles in the literature. The direction of travel of the two nodes, which is usually the location based on trajectory similarity, is known as Euclidean distance [29].
- Timeliness: The attribute of timeliness relates to how recently the two vehicles have interacted with each other. It is usually determined by adding the current time to the time when the interaction happened. Maintaining the timeliness of data and the trust score contributes to higher levels of trust; however, old data reveal an outmoded trust value, which can lead to negative consequences [30].
- Duration of Interaction: This refers to the length of interaction among the two nodes. Longer interactions allow the entity to learn more about the other entity’s conduct and capabilities, and as a result, long interactions have been seen to lead to better interactions among entities, which leads to higher trust levels [31].
- Familiarity: This attribute exhibits the level of acquaintance the two vehicles have with one another. This feature was derived from social networks, and it is worth noting that increased familiarity leads to increased trust in interpersonal relationships. Higher familiarity with the trustee is frequently a reflection of the evaluator’s past understanding and knowledge of the trustee [32].
- Packet Delivery Ratio: This can be described as the degree of connection between the trustor and the trustee. The only criterion required to calculate direct trust toward a trustee is the packet delivery ratio. In the literature, this is typically referred to as the packet transmission rate between nodes. Furthermore, it is a main goal in the development of trust models and a key criterion for detecting harmful activity [33].
- Frequency of Interactions: On a regular basis, the trustor and trustee communicate with one another., and this is measured by the frequency of their interactions. When two nodes communicate, they can learn each other’s communication and behavioral patterns to improve trust computations [31].
3.1.4. Trust Metrics
- Reputation-based metrics: This type of trust metric calculates trust value from the recommendations given by specific nodes in the network. These network nodes may have similar opinions about the node that has been propagated within the network. This metric method considers major opinions or global feedback regarding the node.
- Knowledge-based metrics: This technique calculates trust value based on direct or previous experience that the node has or has gained from another specific node. These metrics help identify selfish nodes that may be part of a network.
- Expectation-based metrics: These metric methods involve a node determining the trust of another node based on how it expects the node to act. Its expectations are based upon previous interactions with the node, received suggestions, or the initial prediction in the case of no prior communication.
- Node-properties-based metrics: Trust calculations make use of the main parameters of proximity such as location and distance with the considered node.
- Environmental-factors-based metrics: When measuring an IoV network, this metric takes into account environmental factors, including network density and topology.
3.1.5. Trust Computation
- Trust Propagation: This module assists in establishing the trustworthiness of various communication system nodes based on previously established worthiness values while collaborating. It combines features from both a centralized approach, where trust is granted to entities through a single, trusted node or mechanism, and a decentralized system, where no one entity acts as a central point of control. The module’s main features are trust transitivity and trust fusion. Instead of determining each individual entity’s trust, resource computation costs in this module can be decreased by measuring trust value in a propagating network [34].
- Trust Aggregation: Multiple network pathways can be used to disseminate different versions of a node’s trust value. When it receives diverse trust values for the node, this module aims to define a singular value based on the sum of data received. The Bayesian model, weighted sum approaches, and fuzzy logic are the most commonly used aggregation strategies. The primary principle for composing trust from the path of trust for various received values is trust aggregation.
- Trust Update: This refers to the process of bringing trust values up to date, and it can be divided into three schemas:
- -
- Event-driven Trust: this is where node trust is adjusted after an event or during the occurrence of a transaction.
- -
- Time-driven trust: this is where the aggregation scheme is used to adjust the node trust value within a determined time period.
- -
- Continuous trust update: this is mostly used to protect integrity and is used to regulate one single node task.
- Trust Prediction: the purpose of this module is to predict trust connections between entities by utilizing selected criteria. This module predicts whether trust can develop between trusted nodes.
- Trust Evaluation: This module often contains sections on experience, suggestions, and global knowledge. Requesting node neighbors provides experience, which is continually updated in the table of trust, from which it is communicated as a recommendation trust node. The assessed trust value is linked to the global knowledge component.
- Trust Formation: This is the module where the trust formula is defined. To define how trust can be computed, it is necessary to establish the set of trust qualities and metrics considered by the trust formula. For the formation of the trust formula, the two trust categories of multitrust and single trust must be defined.
3.1.6. Trust Management Approaches
3.2. Machine Learning
3.2.1. Supervised Learning
3.2.2. Unsupervised Learning
3.2.3. Reinforcement Learning
3.3. Security Requirements
3.3.1. Authentication
3.3.2. Confidentiality
3.3.3. Availability
3.3.4. Data Integrity
3.3.5. Nonrepudiation
3.3.6. Access Control
3.3.7. Privacy
3.3.8. Real-Time Guarantees
4. Related Surveys
5. The Concept of IoV
5.1. The Internet of Vehicles
5.2. Comparison of IoV and VANETs
- Goal: Both VANETs and IoV aim to enhance traffic safety and efficiency. However, while VANETs focus more on cost and pollutant emission efficiency, IoV focuses on commercial infotainment. Infotainment is one of the most crucial components of IoV because it helps passengers access services such as online video streaming and file downloading.
- Network specification: IoV has a diverse network framework. The network is used for collaboration and entails communication types such as 4G, Wi-Fi, WAVE, and satellite [81].
- Communication types: IoV has five types of communication, with each type relying on specific wireless communication technology. The five types of communication are vehicle to sensors (V2S), vehicle to road side units (V2R), possible vehicle to vehicle (V2V), vehicle to personal devices (V2P), and vehicle to the infrastructure of cellular networks (V2I) [82]. Figure 3 illustrates the types of communication used in IoV.
- Processing competence: IoV is capable of handling large packets of global data. The system incorporates intelligent computing platforms such as fog computing, cloud computing, and edge computing, which enable it to process large amounts of data at a fast speed [83].
- Compatibility: IoV is easy to use since all the devices used are compatible with the network, thus making it easier for information to be disseminated among the nodes in the most efficient way possible. As such, an interactive environment is created, making it possible to detect hazards early.
- Network connectivity: Communication is a critical component of IoV networks; for this reason, IoV operates in an environment with the best communication. Moreover, it can easily switch to a stronger and more efficient network in case the current one fails.
- Internet facilities: IoV environments enable vehicles to be connected to the internet at all times. The reliability of IoT networks depends on the speed of the internet and a high bandwidth.
- Cloud computing: Massive quantities of data are processed on a daily basis in an IoV environment. As such, cloud computing is often regarded as the most effective approach for managing vast quantities of data. Cloud computing makes it easier for information to be collected, stored, and analyzed [84].
5.3. IoV Architecture
5.4. Challenges Facing IoV
- Complex and diversified networks;
- The security and reliability of services, incompatibility and accuracy of services, and limited storage capacity;
- Data storage and management;
- Scalability;
- Internet provision;
- Poor reception and weak signals that hinder the availability of satellite-based GPS systems;
- Disruptive tolerant communication;
- High mobility of dynamic topologies and vehicle nodes;
- Localization issues;
- Addressing and tracking network fragmentation.
5.5. Security Issues in IoV Communication
5.5.1. Regular Network Monitoring
5.5.2. Encrypted Data/Communication
5.5.3. Authentication and Key Management
5.5.4. Wireless Security Protocols
5.6. Security Threats and Attacks in IoV Environments
5.6.1. Wormhole Attack
5.6.2. Black Hole Attack
5.6.3. Dissimulation of a GPS Attack
5.6.4. Denial-of-Service Attack
- Malicious—there is an objective behind the attack;
- Disruptive—the attack has the potential to degrade the network;
- Remote—the attack does not emanate from within the network.
5.6.5. Distributed Denial-of-Service
5.6.6. Sybil Attack
5.6.7. Man-in-the-Middle Attack (MITM)
5.6.8. Masquerading Attack
5.6.9. Eavesdropping Attack
5.6.10. Malware Attack
6. Solutions for Security and Trust in IoV
6.1. Traditional-Based Solutions
6.2. Machine Learning-Based Solutions for Security
6.2.1. Supervised-Learning-Based Solutions
6.2.2. Unsupervised-Learning-Based Solutions
6.2.3. RL-Based Solutions
6.3. ML-Based Solutions for Trust
6.3.1. Supervised-Learning-Based Solutions
6.3.2. Unsupervised-Learning-Based Solutions
6.3.3. Reinforcement-Learning-Based Solutions
6.4. Future Directions
6.4.1. Real-Time Testing
6.4.2. Unknown Attacks
6.4.3. Blockchains
6.4.4. IoV and Big Data
6.4.5. Availability of Datasets
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Zantalis, F.; Koulouras, G.; Karabetsos, S.; Kandris, D. A review of machine learning and IoT in smart transportation. Future Internet 2019, 11, 94. [Google Scholar] [CrossRef]
- Lee, I.; Lee, K. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus. Horizons 2015, 58, 431–440. [Google Scholar] [CrossRef]
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
- Bhardwaj, I.; Khara, S. Research trends in architecture, security, services and applications of internet of vehicles (IOV). In Proceedings of the 2018 International Conference on Computing, Power and Communication Technologies (GUCON), Greater Noida, India, 28–29 September 2018; pp. 91–95. [Google Scholar]
- Gerla, M.; Lee, E.K.; Pau, G.; Lee, U. Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Republic of Korea, 6–8 March 2014; pp. 241–246. [Google Scholar]
- Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
- Ning, H.; Wang, Z. Future internet of things architecture: Like mankind neural system or social organization framework? IEEE Commun. Lett. 2011, 15, 461–463. [Google Scholar] [CrossRef]
- Nitti, M.; Girau, R.; Floris, A.; Atzori, L. On adding the social dimension to the internet of vehicles: Friendship and middleware. In Proceedings of the 2014 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Odessa, Ukraine, 27–30 May 2014; pp. 134–138. [Google Scholar]
- Alam, K.M.; Saini, M.; El Saddik, A. Toward social internet of vehicles: Concept, architecture, and applications. IEEE Access 2015, 3, 343–357. [Google Scholar] [CrossRef]
- Cheng, J.; Cheng, J.; Zhou, M.; Liu, F.; Gao, S.; Liu, C. Routing in internet of vehicles: A review. IEEE Trans. Intell. Transp. Syst. 2015, 16, 2339–2352. [Google Scholar] [CrossRef]
- Datta, S.K.; Da Costa, R.P.F.; Härri, J.; Bonnet, C. Integrating connected vehicles in Internet of Things ecosystems: Challenges and solutions. In Proceedings of the 2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, Portugal, 21–24 June 2016; pp. 1–6. [Google Scholar]
- Yang, F.; Li, J.; Lei, T.; Wang, S. Architecture and key technologies for Internet of Vehicles: A survey. J. Commun. Inf. Networks 2017, 2, 1–17. [Google Scholar] [CrossRef]
- Li, J.-L.; Liu, Z.-H.; Yang, F.-C. Internet of vehicles: The framework and key technology. J. Beijing Univ. Posts Telecommun. 2014, 37, 95. [Google Scholar]
- Yang, F.; Wang, S.; Li, J.; Liu, Z.; Sun, Q. An overview of internet of vehicles. China Commun. 2014, 11, 1–15. [Google Scholar] [CrossRef]
- Jiang, C.; Zhang, H.; Ren, Y.; Han, Z.; Chen, K.C.; Hanzo, L. Machine learning paradigms for next-generation wireless networks. IEEE Wirel. Commun. 2016, 24, 98–105. [Google Scholar] [CrossRef]
- Sun, Y.; Peng, M.; Zhou, Y.; Huang, Y.; Mao, S. Application of machine learning in wireless networks: Key techniques and open issues. IEEE Commun. Surv. Tutor. 2019, 21, 3072–3108. [Google Scholar] [CrossRef]
- Qayyum, A.; Usama, M.; Qadir, J.; Al-Fuqaha, A. Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward. IEEE Commun. Surv. Tutor. 2020, 22, 998–1026. [Google Scholar]
- Ghafari, S.M.; Beheshti, A.; Joshi, A.; Paris, C.; Mahmood, A.; Yakhchi, S.; Orgun, M.A. A survey on trust prediction in online social networks. IEEE Access 2020, 8, 144292–144309. [Google Scholar] [CrossRef]
- Jøsang, A.; Ismail, R.; Boyd, C. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 2007, 43, 618–644. [Google Scholar] [CrossRef]
- Håkansson, P.; Witmer, H. Social media and trust: A systematic literature review. J. Bus. Econ. 2015, 6, 517–524. [Google Scholar] [CrossRef]
- Truong, N.B.; Um, T.W.; Zhou, B.; Lee, G.M. From personal experience to global reputation for trust evaluation in the social internet of things. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–7. [Google Scholar]
- Soleymani, S.A.; Abdullah, A.H.; Hassan, W.H.; Anisi, M.H.; Goudarzi, S.; Rezazadeh Baee, M.A.; Mandala, S. Trust management in vehicular ad hoc network: A systematic review. EURASIP J. Wirel. Commun. Netw. 2015, 2015, 146. [Google Scholar] [CrossRef]
- Yu, Y.; Li, K.; Zhou, W.; Li, P. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. J. Netw. Comput. Appl. 2012, 35, 867–880. [Google Scholar] [CrossRef]
- Mohammadi, V.; Rahmani, A.M.; Darwesh, A.M.; Sahafi, A. Trust-based recommendation systems in Internet of Things: A systematic literature review. Hum. Centric Comput. Inf. Sci. 2019, 9, 1–61. [Google Scholar] [CrossRef]
- Yan, Z.; Zhang, P.; Vasilakos, A.V. A security and trust framework for virtualized networks and software-defined networking. Secur. Commun. Netw. 2016, 9, 3059–3069. [Google Scholar] [CrossRef]
- Wang, Y.-H. A trust management model for internet of vehicles. In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, 10–12 January 2020; pp. 136–140. [Google Scholar]
- Jayasinghe, U.; Otebolaku, A.; Um, T.W.; Lee, G.M. Data centric trust evaluation and prediction framework for IOT. In Proceedings of the 2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K), Nanjing, China, 27–29 November 2017; pp. 1–7. [Google Scholar]
- Mahmood, A.; Zhang, W.E.; Sheng, Q.Z.; Siddiqui, S.A.; Aljubairy, A. Trust management for software-defined heterogeneous vehicular ad hoc networks. In Security, Privacy and Trust in the IoT Environment; Springer: Cham, Switzerland, 2019; pp. 203–226. [Google Scholar]
- Mahmood, A.; Siddiqui, S.A.; Zhang, W.E.; Sheng, Q.Z. A Hybrid Trust Management Model for Secure and Resource Efficient Vehicular Ad hoc Networks. In Proceedings of the 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Gold Coast, QLD, Australia, 5–7 December 2019; pp. 154–159. [Google Scholar]
- Huang, X.; Yu, R.; Kang, J.; Zhang, Y. Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 2017, 5, 25408–25420. [Google Scholar] [CrossRef]
- Jayasinghe, U.; Lee, G.M.; Um, T.W.; Shi, Q. Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 2018, 4, 39–52. [Google Scholar] [CrossRef]
- Xia, H.; Xiao, F.; Zhang, S.s.; Hu, C.q.; Cheng, X.z. Trustworthiness inference framework in the social Internet of Things: A context-aware approach. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 838–846. [Google Scholar]
- Lim, J.; Keum, D.; Ko, Y.B. A stepwise and hybrid trust evaluation scheme for tactical wireless sensor networks. Sensors 2020, 20, 1108. [Google Scholar] [CrossRef] [PubMed]
- Suo, D.; Sarma, S.E. Real-time trust-building schemes for mitigating malicious behaviors in connected and automated vehicles. In Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference (ITSC), Auckland, New Zealand, 27–30 October 2019; pp. 1142–1149. [Google Scholar]
- Al Falasi, H.; Mohamed, N. Similarity-based trust management system for detecting fake safety messages in vanets. In Proceedings of the Internet of Vehicles-Safe and Intelligent Mobility: Second International Conference, IOV 2015, Chengdu, China, 19–21 December 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 273–284. [Google Scholar]
- Minhas, U.F.; Zhang, J.; Tran, T.; Cohen, R. Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J. Comput. Intell. Theory Pract. 2010, 5, 3–15. [Google Scholar]
- Li, X.; Liu, J.; Li, X.; Sun, W. RGTE: A reputation-based global trust establishment in VANETs. In Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi’an, China, 9–11 September 2013; pp. 210–214. [Google Scholar]
- Hu, H.; Lu, R.; Zhang, Z.; Shao, J. REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans. Veh. Technol. 2016, 66, 1786–1797. [Google Scholar] [CrossRef]
- Jordan, M.I.; Mitchell, T.M. Machine learning: Trends, perspectives, and prospects. Science 2015, 349, 255–260. [Google Scholar] [CrossRef]
- Huang, Y.; Chen, M. Improve reputation evaluation of crowdsourcing participants using multidimensional index and machine learning techniques. IEEE Access 2019, 7, 118055–118067. [Google Scholar] [CrossRef]
- Han, G.; He, Y.; Jiang, J.; Wang, N.; Guizani, M.; Ansere, J.A. A synergetic trust model based on SVM in underwater acoustic sensor networks. IEEE Trans. Veh. Technol. 2019, 68, 11239–11247. [Google Scholar] [CrossRef]
- Cherif, A.; Badhib, A.; Ammar, H.; Alshehri, S.; Kalkatawi, M.; Imine, A. Credit card fraud detection in the era of disruptive technologies: A systematic review. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 145–174. [Google Scholar] [CrossRef]
- Alsharif, B.; Altaher, A.S.; Altaher, A.; Ilyas, M.; Alalwany, E. Deep Learning Technology to Recognize American Sign Language Alphabet. Sensors 2023, 23, 7970. [Google Scholar] [CrossRef]
- Karimzadeh, M.; Vakanski, A.; Xian, M.; Zhang, B. Post-Hoc Explainability of BI-RADS Descriptors in a Multi-Task Framework for Breast Cancer Detection and Segmentation. In Proceedings of the 2023 IEEE 33rd International Workshop on Machine Learning for Signal Processing (MLSP), Rome, Italy, 17–20 September 2023; pp. 1–6. [Google Scholar]
- Rolnick, D.; Donti, P.L.; Kaack, L.H.; Kochanski, K.; Lacoste, A.; Sankaran, K.; Ross, A.S.; Milojevic-Dupont, N.; Jaques, N.; Waldman-Brown, A.; et al. Tackling climate change with machine learning. ACM Comput. Surv. (CSUR) 2022, 55, 1–96. [Google Scholar] [CrossRef]
- Ye, H.; Liang, L.; Li, G.Y.; Kim, J.; Lu, L.; Wu, M. Machine learning for vehicular networks: Recent advances and application examples. IEEE Veh. Technol. Mag. 2018, 13, 94–101. [Google Scholar] [CrossRef]
- Tan, K.; Bremner, D.; Le Kernec, J.; Zhang, L.; Imran, M. Machine learning in vehicular networking: An overview. Digit. Commun. Netw. 2022, 8, 18–24. [Google Scholar] [CrossRef]
- Tang, Y.; Cheng, N.; Wu, W.; Wang, M.; Dai, Y.; Shen, X. Delay-minimization routing for heterogeneous VANETs with machine learning based mobility prediction. IEEE Trans. Veh. Technol. 2019, 68, 3967–3979. [Google Scholar] [CrossRef]
- Li, F.; Song, X.; Chen, H.; Li, X.; Wang, Y. Hierarchical routing for vehicular ad hoc networks via reinforcement learning. IEEE Trans. Veh. Technol. 2018, 68, 1852–1865. [Google Scholar] [CrossRef]
- Yuan, T.; Da Rocha Neto, W.; Rothenberg, C.E.; Obraczka, K.; Barakat, C.; Turletti, T. Machine learning for next-generation intelligent transportation systems: A survey. Trans. Emerg. Telecommun. Technol. 2022, 33, e4427. [Google Scholar] [CrossRef]
- Kim, I.H.; Bong, J.H.; Park, J.; Park, S. Prediction of driver’s intention of lane change by augmenting sensor information using machine learning techniques. Sensors 2017, 17, 1350. [Google Scholar] [CrossRef]
- Caruana, R.; Niculescu-Mizil, A. An empirical comparison of supervised learning algorithms. In Proceedings of the 23rd International Conference on Machine Learning, Pittsburgh, PA, USA, 25–29 June 2006; pp. 161–168. [Google Scholar]
- Alotaibi, Y.; Ilyas, M. Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things’ Devices Security. Sensors 2023, 23, 5568. [Google Scholar] [CrossRef]
- Alloghani, M.; Al-Jumeily, D.; Mustafina, J.; Hussain, A.; Aljaaf, A.J. A systematic review on supervised and unsupervised machine learning algorithms for data science. In Supervised and Unsupervised Learning for Data Science; Springer: Cham, Switzerland, 2020; pp. 3–21. [Google Scholar]
- Akanksha, E.; Sharma, N.; Gulati, K. Review on reinforcement learning, research evolution and scope of application. In Proceedings of the 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 8–10 April 2021; pp. 1416–1423. [Google Scholar]
- Zhou, Z.; Oguz, O.S.; Leibold, M.; Buss, M. A general framework to increase safety of learning algorithms for dynamical systems based on region of attraction estimation. IEEE Trans. Robot. 2020, 36, 1472–1490. [Google Scholar] [CrossRef]
- Talpur, A.; Gurusamy, M. Machine learning for security in vehicular networks: A comprehensive survey. IEEE Commun. Surv. Tutor. 2021, 24, 346–379. [Google Scholar] [CrossRef]
- Sun, Y.; Wu, L.; Wu, S.; Li, S.; Zhang, T.; Zhang, L.; Xu, J.; Xiong, Y. Security and Privacy in the Internet of Vehicles. In Proceedings of the 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), Beijing, China, 22–23 October 2015; pp. 116–121. [Google Scholar]
- Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.J.; Park, Y. Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges. IEEE Access 2020, 8, 54314–54344. [Google Scholar] [CrossRef]
- Samad, A.; Alam, S.; Mohammed, S.; Bhukhari, M. Internet of vehicles (IoV) requirements, attacks and countermeasures. In Proceedings of the 12th INDIACom—5th International Conference on Computing for Sustainable Global Development, New Delhi, India, 14–16 March 2018; pp. 1–4. [Google Scholar]
- Daeinabi, A.; Rahbar, A.G. Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks. Multimed. Tools Appl. 2013, 66, 325–338. [Google Scholar] [CrossRef]
- Mokhtar, B.; Azab, M. Survey on security issues in vehicular ad hoc networks. Alex. Eng. J. 2015, 54, 1115–1126. [Google Scholar] [CrossRef]
- Sun, Y.; Wu, L.; Wu, S.; Li, S.; Zhang, T.; Zhang, L.; Xu, J.; Xiong, Y.; Cui, X. Attacks and countermeasures in the internet of vehicles. Ann. Telecommun. 2017, 72, 283–295. [Google Scholar] [CrossRef]
- Lu, Z.; Qu, G.; Liu, Z. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst. 2018, 20, 760–776. [Google Scholar] [CrossRef]
- Sharma, S.; Kaushik, B. A survey on internet of vehicles: Applications, security issues & solutions. Veh. Commun. 2019, 20, 100182. [Google Scholar]
- Wang, J.; Jing, X.; Yan, Z.; Fu, Y.; Pedrycz, W.; Yang, L.T. A survey on trust evaluation based on machine learning. ACM Comput. Surv. (CSUR) 2020, 53, 1–36. [Google Scholar] [CrossRef]
- Garg, T.; Kagalwalla, N.; Churi, P.; Pawar, A.; Deshmukh, S. A survey on security and privacy issues in IoV. Int. J. Electr. Comput. Eng. (2088-8708) 2020, 10, 5409–5419. [Google Scholar] [CrossRef]
- Rehman, A.; Hassan, M.F.; Yew, K.H.; Paputungan, I.; Tran, D.C. State-of-the-art IoV trust management a meta-synthesis systematic literature review (SLR). PeerJ Comput. Sci. 2020, 6, e334. [Google Scholar] [CrossRef]
- Sharma, S.; Kaushik, B. A survey on nature-inspired algorithms and its applications in the Internet of Vehicles. Int. J. Commun. Syst. 2021, 34, e4895. [Google Scholar] [CrossRef]
- Mchergui, A.; Moulahi, T.; Zeadally, S. Survey on artificial intelligence (AI) techniques for vehicular ad-hoc networks (VANETs). Veh. Commun. 2022, 34, 100403. [Google Scholar] [CrossRef]
- Guo, J.; Bilal, M.; Qiu, Y.; Qian, C.; Xu, X.; Choo, K.K.R. Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities. Digit. Commun. Netw. 2022. [Google Scholar] [CrossRef]
- Abuarqoub, A.; Alzu’bi, A.; Hammoudeh, M.; Ahmad, A.; Al-Shargabi, B. A Survey on Vehicular Ad hoc Networks Security Attacks and Countermeasures. In Proceedings of the 6th International Conference on Future Networks & Distributed Systems, Tashkent, Uzbekistan, 15 December 2022; pp. 701–707. [Google Scholar]
- Garg, A.; Chauhan, A.; Shambharkar, P.G. Security Threats & Attacks in IoV Environment: Open Research Issues and Challenges. In Proceedings of the 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT), Kannur, India, 11–12 August 2022; pp. 803–810. [Google Scholar]
- Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet security challenges and solutions: A survey. Veh. Commun. 2017, 7, 7–20. [Google Scholar] [CrossRef]
- Fadhil, J.A.; Sarhan, Q.I. Internet of Vehicles (IoV): A survey of challenges and solutions. In Proceedings of the 2020 21st International Arab Conference on Information Technology (ACIT), Giza, Egypt, 28–30 November 2020; pp. 1–10. [Google Scholar]
- Uprety, A.; Rawat, D.B. Reinforcement learning for iot security: A comprehensive survey. IEEE Internet Things J. 2020, 8, 8693–8706. [Google Scholar] [CrossRef]
- Tanwar, S.; Vora, J.; Tyagi, S.; Kumar, N.; Obaidat, M.S. A systematic review on security issues in vehicular ad hoc network. Secur. Priv. 2018, 1, e39. [Google Scholar] [CrossRef]
- Shahid, M.A.; Jaekel, A.; Ezeife, C.; Al-Ajmi, Q.; Saini, I. Review of potential security attacks in VANET. In Proceedings of the 2018 Majan International Conference (MIC), Muscat, Oman, 19–20 March 2018; pp. 1–4. [Google Scholar]
- Cheng, X.; Zhang, R.; Yang, L. Wireless toward the era of intelligent vehicles. IEEE Internet Things J. 2018, 6, 188–202. [Google Scholar] [CrossRef]
- Zhang, W.; Xi, X. The innovation and development of Internet of Vehicles. China Commun. 2016, 13, 122–127. [Google Scholar] [CrossRef]
- Zheng, K.; Zheng, Q.; Chatzimisios, P.; Xiang, W.; Zhou, Y. Heterogeneous vehicular networking: A survey on architecture, challenges, and solutions. IEEE Commun. Surv. Tutor. 2015, 17, 2377–2396. [Google Scholar] [CrossRef]
- Contreras-Castillo, J.; Zeadally, S.; Guerrero Ibáñez, J.A. A seven-layered model architecture for Internet of Vehicles. J. Inf. Telecommun. 2017, 1, 4–22. [Google Scholar] [CrossRef]
- Darwish, T.S.; Bakar, K.A. Fog based intelligent transportation big data analytics in the internet of vehicles environment: Motivations, architecture, challenges, and critical issues. IEEE Access 2018, 6, 15679–15701. [Google Scholar] [CrossRef]
- Lopez, H.J.D.; Siller, M.; Huerta, I. Internet of vehicles: Cloud and fog computing approaches. In Proceedings of the 2017 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Bari, Italy, 18–20 September 2017; pp. 211–216. [Google Scholar]
- Liu, N. Internet of Vehicles: Your next connection. Huawei WinWin 2011, 11, 23–28. [Google Scholar]
- Gandotra, P.; Jha, R.K.; Jain, S. A survey on device-to-device (D2D) communication: Architecture and security issues. J. Netw. Comput. Appl. 2017, 78, 9–29. [Google Scholar] [CrossRef]
- Liu, K.; Xu, X.; Chen, M.; Liu, B.; Wu, L.; Lee, V.C. A hierarchical architecture for the future internet of vehicles. IEEE Commun. Mag. 2019, 57, 41–47. [Google Scholar] [CrossRef]
- Wu, W.; Yang, Z.; Li, K. Internet of Vehicles and applications. In Internet of Things; Elsevier: Amsterdam, The Netherlands, 2016; pp. 299–317. [Google Scholar]
- Wan, J.; Zhang, D.; Zhao, S.; Yang, L.T.; Lloret, J. Context-aware vehicular cyber-physical systems with cloud support: Architecture, challenges, and solutions. IEEE Commun. Mag. 2014, 52, 106–113. [Google Scholar] [CrossRef]
- Mahmood, Z. Connected vehicles in the IoV: Concepts, technologies and architectures. In Connected Vehicles in the Internet of Things: Concepts, Technologies and Frameworks for the IoV; Springer: Berlin/Heidelberg, Germany, 2020; pp. 3–18. [Google Scholar]
- Peng, H. Connected and automated vehicles: The roles of dynamics and control. Mech. Eng. 2016, 138, S4. [Google Scholar] [CrossRef]
- Qureshi, K.N.; Din, S.; Jeon, G.; Piccialli, F. Internet of vehicles: Key technologies, network model, solutions and challenges with future aspects. IEEE Trans. Intell. Transp. Syst. 2020, 22, 1777–1786. [Google Scholar] [CrossRef]
- Thakur, A.; Malekian, R. Fog computing for detecting vehicular congestion, an internet of vehicles based approach: A review. IEEE Intell. Transp. Syst. Mag. 2019, 11, 8–16. [Google Scholar] [CrossRef]
- Huang, C.; Lu, R.; Choo, K.K.R. Vehicular fog computing: Architecture, use case, and security and forensic challenges. IEEE Commun. Mag. 2017, 55, 105–111. [Google Scholar] [CrossRef]
- Wazid, M.; Bagga, P.; Das, A.K.; Shetty, S.; Rodrigues, J.J.; Park, Y. AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment. IEEE Internet Things J. 2019, 6, 8804–8817. [Google Scholar] [CrossRef]
- Vishwanath, A.; Peruri, R.; He, J.S. Security in Fog Computing through Encryption; DigitalCommons@ Kennesaw State University: Kennesaw, GA, USA, 2016. [Google Scholar]
- Khan, S.; Parkinson, S.; Qin, Y. Fog computing security: A review of current applications and security solutions. J. Cloud Comput. 2017, 6, 1–22. [Google Scholar] [CrossRef]
- Lin, C.C.; Deng, D.J.; Yao, C.C. Resource allocation in vehicular cloud computing systems with heterogeneous vehicles and roadside units. IEEE Internet Things J. 2017, 5, 3692–3700. [Google Scholar] [CrossRef]
- Xu, W.; Shi, W.; Lyu, F.; Zhou, H.; Cheng, N.; Shen, X. Throughput analysis of vehicular internet access via roadside WiFi hotspot. IEEE Trans. Veh. Technol. 2019, 68, 3980–3991. [Google Scholar] [CrossRef]
- Gür, G.; Bahtiyar, Ş.; Alagöz, F. Security analysis of computer networks: Key concepts and methodologies. In Modeling and Simulation of Computer Networks and Systems; Elsevier: Amsterdam, The Netherlands, 2015; pp. 861–898. [Google Scholar]
- Kim, S. Blockchain for a trust network among intelligent vehicles. In Advances in Computers; Elsevier: Amsterdam, The Netherlands, 2018; Volume 111, pp. 43–68. [Google Scholar]
- Tangade, S.S.; Manvi, S.S. A survey on attacks, security and trust management solutions in VANETs. In Proceedings of the 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, 4–6 July 2013; pp. 1–6. [Google Scholar]
- Manvi, S.S.; Tangade, S. A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 2017, 9, 19–30. [Google Scholar] [CrossRef]
- Sharma, N.; Chauhan, N.; Chand, N. Security challenges in Internet of Vehicles (IoV) environment. In Proceedings of the 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, 15–17 December 2018; pp. 203–207. [Google Scholar]
- La, V.H.; Cavalli, A.R. Security attacks and solutions in vehicular ad hoc networks: A survey. Int. J. AdHoc Netw. Syst. (IJANS) 2014, 4, 1–20. [Google Scholar] [CrossRef]
- Rawat, A.; Sharma, S.; Sushil, R. VANET: Security attacks and its possible solutions. J. Inf. Oper. Manag. 2012, 3, 301–304. [Google Scholar]
- Kim, Y.; Kim, I.; Shim, C.Y. A taxonomy for DOS attacks in VANET. In Proceedings of the 2014 14th International Symposium on Communications and Information Technologies (ISCIT), Incheon, Republic of Korea, 24–26 September 2014; pp. 26–27. [Google Scholar]
- Bariah, L.; Shehada, D.; Salahat, E.; Yeun, C.Y. Recent advances in VANET security: A survey. In Proceedings of the 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), Boston, MA, USA, 6–9 September 2015; pp. 1–7. [Google Scholar]
- Gai, F.; Zhang, J.; Zhu, P.; Jiang, X. Ratee-based trust management system for internet of vehicles. In Proceedings of the Wireless Algorithms, Systems, and Applications: 12th International Conference, WASA 2017, Guilin, China, 19–21 June 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 344–355. [Google Scholar]
- Ahmad, F.; Kurugollu, F.; Adnane, A.; Hussain, R.; Hussain, F. MARINE: Man-in-the-middle attack resistant trust model in connected vehicles. IEEE Internet Things J. 2020, 7, 3310–3322. [Google Scholar] [CrossRef]
- Arellano, W.; Mahgoub, I. TrafficModeler extensions: A case for rapid VANET simulation using, OMNET++, SUMO, and VEINS. In Proceedings of the 2013 High Capacity Optical Networks and Emerging/Enabling Technologies, Magosa, Cyprus, 11–13 December 2013; pp. 109–115. [Google Scholar]
- Krajzewicz, D.; Erdmann, J.; Behrisch, M.; Bieker, L. Recent development and applications of SUMO-Simulation of Urban MObility. Int. J. Adv. Syst. Meas. 2012, 5, 128–138. [Google Scholar]
- Sommer, C.; Eckhoff, D.; Brummer, A.; Buse, D.S.; Hagenauer, F.; Joerer, S.; Segata, M. Veins: The open source vehicular network simulation framework. In Recent Advances in Network Simulation: The OMNeT++ Environment and Its Ecosystem; Springer: Cham, Switzerland, 2019; pp. 215–252. [Google Scholar]
- Zhang, J.; Zheng, K.; Zhang, D.; Yan, B. AATMS: An anti-attack trust management scheme in VANET. IEEE Access 2020, 8, 21077–21090. [Google Scholar] [CrossRef]
- Guleng, S.; Wu, C.; Chen, X.; Wang, X.; Yoshinaga, T.; Ji, Y. Decentralized trust evaluation in vehicular Internet of Things. IEEE Access 2019, 7, 15980–15988. [Google Scholar] [CrossRef]
- Rehmani, M.H.; Saleem, Y. Network simulator NS-2. In Encyclopedia of Information Science and Technology, 3rd ed.; IGI Global: Hershey, PA, USA, 2015; pp. 6249–6258. [Google Scholar]
- Joy, J.; Rabsatt, V.; Gerla, M. Internet of Vehicles: Enabling safe, secure, and private vehicular crowdsourcing. Internet Technol. Lett. 2018, 1, e16. [Google Scholar] [CrossRef]
- Yao, Y.; Xiao, B.; Wu, G.; Liu, X.; Yu, Z.; Zhang, K.; Zhou, X. Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI. IEEE Trans. Mob. Comput. 2018, 18, 362–375. [Google Scholar] [CrossRef]
- Tayeb, S.; Pirouz, M.; Esguerra, G.; Ghobadi, K.; Huang, J.; Hill, R.; Lawson, D.; Li, S.; Zhan, T.; Zhan, J.; et al. Securing the positioning signals of autonomous vehicles. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017; pp. 4522–4528. [Google Scholar]
- Abbas, S.; Faisal, M.; Rahman, H.U.; Khan, M.Z.; Merabti, M. Masquerading attacks detection in mobile ad hoc networks. IEEE Access 2018, 6, 55013–55025. [Google Scholar] [CrossRef]
- Rawat, D.B.; Garuba, M.; Chen, L.; Yang, Q. On the security of information dissemination in the Internet-of-Vehicles. Tsinghua Sci. Technol. 2017, 22, 437–445. [Google Scholar] [CrossRef]
- Wang, C.; Zhao, Z.; Gong, L.; Zhu, L.; Liu, Z.; Cheng, X. A distributed anomaly detection system for in-vehicle network using HTM. IEEE Access 2018, 6, 9091–9098. [Google Scholar] [CrossRef]
- Dua, A.; Kumar, N.; Das, A.K.; Susilo, W. Secure message communication protocol among vehicles in smart city. IEEE Trans. Veh. Technol. 2017, 67, 4359–4373. [Google Scholar] [CrossRef]
- Osibo, B.K.; Zhang, C.; Xia, C.; Zhao, G.; Jin, Z. Security and privacy in 5G internet of vehicles (IoV) environment. J. Internet Things 2021, 3, 77. [Google Scholar] [CrossRef]
- Kumar, S.; Mann, K.S. Prevention of DoS attacks by detection of multiple malicious nodes in VANETs. In Proceedings of the 2019 International Conference on Automation, Computational and Technology Management (ICACTM), London, UK, 24–26 April 2019; pp. 89–94. [Google Scholar]
- Ahmad, F.; Adnane, A.; Franqueira, V.N.; Kurugollu, F.; Liu, L. Man-in-the-middle attacks in vehicular ad-hoc networks: Evaluating the impact of attackers’ strategies. Sensors 2018, 18, 4040. [Google Scholar] [CrossRef]
- Huang, X.; Yu, R.; Pan, M.; Shu, L. Secure roadside unit hotspot against eavesdropping based traffic analysis in edge computing based internet of vehicles. IEEE Access 2018, 6, 62371–62383. [Google Scholar] [CrossRef]
- Baruah, B.; Dhal, S. A Secure and privacy-preserved road condition monitoring system. In Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), Bengaluru, India, 7–11 January 2020; pp. 594–597. [Google Scholar]
- Vadhana Kumari, S.; Paramasivan, B. Defense against Sybil attacks and authentication for anonymous location-based routing in MANET. Wirel. Netw. 2017, 23, 715–726. [Google Scholar] [CrossRef]
- Andrea, I.; Chrysostomou, C.; Hadjichristofi, G. Internet of Things: Security vulnerabilities and challenges. In Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 180–187. [Google Scholar]
- Feltus, C. Current and future RL’s contribution to emerging network security. Procedia Comput. Sci. 2020, 177, 516–521. [Google Scholar] [CrossRef]
- Biswas, S.K. Intrusion detection using machine learning: A comparison study. Int. J. Pure Appl. Math. 2018, 118, 101–114. [Google Scholar]
- Wu, M.; Song, Z.; Moon, Y.B. Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. J. Intell. Manuf. 2019, 30, 1111–1123. [Google Scholar] [CrossRef]
- Nguyen, T.T.; Reddi, V.J. Deep reinforcement learning for cyber security. IEEE Trans. Neural Netw. Learn. Syst. 2021, 34, 3779–3795. [Google Scholar] [CrossRef] [PubMed]
- Gyawali, S.; Qian, Y. Misbehavior detection using machine learning in vehicular communication networks. In Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Singh, P.K.; Gupta, R.R.; Nandi, S.K.; Nandi, S. Machine learning based approach to detect wormhole attack in VANETs. In Web, Artificial Intelligence and Network Applications: Proceedings of the Workshops of the 33rd International Conference on Advanced Information Networking and Applications (WAINA-2019), Matsue, Japan, 27–29 March 2019; Springer: Cham, Switzerland, 2019; pp. 651–661. [Google Scholar]
- Kumar, S.; Singh, K.; Kumar, S.; Kaiwartya, O.; Cao, Y.; Zhou, H. Delimitated anti jammer scheme for Internet of vehicle: Machine learning based security approach. IEEE Access 2019, 7, 113311–113323. [Google Scholar] [CrossRef]
- Sharma, P.; Liu, H. A machine-learning-based data-centric misbehavior detection model for internet of vehicles. IEEE Internet Things J. 2020, 8, 4991–4999. [Google Scholar] [CrossRef]
- Sharma, A.; Babbar, H.; Sharma, A. Ton-iot: Detection of attacks on internet of things in vehicular networks. In Proceedings of the 2022 6th International Conference on Electronics, Communication and Aerospace Technology, Coimbatore, India, 1–3 December 2022; pp. 539–545. [Google Scholar]
- Alalwany, E.; Mahgoub, I. Classification of Normal and Malicious Traffic Based on an Ensemble of Machine Learning for a Vehicle CAN-Network. Sensors 2022, 22, 9195. [Google Scholar] [CrossRef]
- Anyanwu, G.O.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Falsification Detection System for IoV Using Randomized Search Optimization Ensemble Algorithm. IEEE Trans. Intell. Transp. Syst. 2023, 24, 4158–4172. [Google Scholar] [CrossRef]
- Lokman, S.F.; Othman, A.T.; Musa, S.; Abu Bakar, M.H. Deep contractive autoencoder-based anomaly detection for in-vehicle controller area network (CAN). In Progress in Engineering Technology: Automotive, Energy Generation, Quality Control and Efficiency; Springer: Cham, Switzerland, 2019; pp. 195–205. [Google Scholar]
- D’Angelo, G.; Castiglione, A.; Palmieri, F. A cluster-based multidimensional approach for detecting attacks on connected vehicles. IEEE Internet Things J. 2020, 8, 12518–12527. [Google Scholar] [CrossRef]
- El Attar, A.; Fadlallah, A.; Chbib, F.; Khatoun, R. Unsupervised Learning Algorithms for Denial of Service Detection in Vehicular Networks. In Proceedings of the 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Maldives, 16–18 November 2022; pp. 1–7. [Google Scholar]
- Valentini, E.P.; Rocha Filho, G.P.; De Grande, R.E.; Ranieri, C.M.; Pereira, L.A.; Meneguette, R.I. A Novel Mechanism for Misbehaviour Detection in Vehicular Networks. IEEE Access 2023, 11, 68113–68126. [Google Scholar] [CrossRef]
- Lu, X.; Wan, X.; Xiao, L.; Tang, Y.; Zhuang, W. Learning-based rogue edge detection in VANETs with ambient radio signals. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
- Gu, T.; Abhishek, A.; Fu, H.; Zhang, H.; Basu, D.; Mohapatra, P. Towards learning-automation IoT attack detection through reinforcement learning. In Proceedings of the 2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Cork, Ireland, 31 August–3 September 2020; pp. 88–97. [Google Scholar]
- Chinchali, S.; Hu, P.; Chu, T.; Sharma, M.; Bansal, M.; Misra, R.; Pavone, M.; Katti, S. Cellular network traffic scheduling with deep reinforcement learning. In Proceedings of the AAAI Conference on Artificial Intelligence, New Orleans, LA, USA, 2–7 February 2018; Volume 32. [Google Scholar]
- Ferdowsi, A.; Saad, W. Deep learning for signal authentication and security in massive internet-of-things systems. IEEE Trans. Commun. 2018, 67, 1371–1387. [Google Scholar] [CrossRef]
- Lopez-Martin, M.; Carro, B.; Sanchez-Esguevillas, A. Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst. Appl. 2020, 141, 112963. [Google Scholar] [CrossRef]
- Sherazi, H.H.R.; Iqbal, R.; Ahmad, F.; Khan, Z.A.; Chaudary, M.H. DDoS attack detection: A key enabler for sustainable communication in internet of vehicles. Sustain. Comput. Informatics Syst. 2019, 23, 13–20. [Google Scholar] [CrossRef]
- Xu, Y.; Lei, M.; Li, M.; Zhao, M.; Hu, B. A new anti-jamming strategy based on deep reinforcement learning for MANET. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–5. [Google Scholar]
- Sedar, R.; Kalalas, C.; Vázquez-Gallego, F.; Alonso-Zarate, J. Reinforcement learning based misbehavior detection in vehicular networks. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 3550–3555. [Google Scholar]
- Talpur, A.; Gurusamy, M. On Attack-Resilient Service Placement and Availability in Edge-Enabled IoV Networks. IEEE Trans. Intell. Transp. Syst. 2023, 24, 6244–6256. [Google Scholar] [CrossRef]
- Eziama, E.; Tepe, K.; Balador, A.; Nwizege, K.S.; Jaimes, L.M. Malicious node detection in vehicular ad-hoc network using machine learning and deep learning. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
- Eziama, E.; Ahmed, S.; Ahmed, S.; Awin, F.; Tepe, K. Detection of adversary nodes in machine-to-machine communication using machine learning based trust model. In Proceedings of the 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Ajman, United Arab Emirates, 10–12 December 2019; pp. 1–6. [Google Scholar]
- Montenegro, J.; Iza, C.; Aguilar Igartua, M. Detection of position falsification attacks in VANETs applying trust model and machine learning. In Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc Sensor, & Ubiquitous Networks, Alicante, Spain, 16–20 November 2020; pp. 9–16. [Google Scholar]
- Ghaleb, A.F.; Saeed, F.; Al-Sarem, M.; Ali Saleh Al-rimy, B.; Boulila, W.; Eljialy, A.E.M.; Aloufi, K.; Alazab, M. Misbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning for VANET. Electronics 2020, 9, 1411. [Google Scholar] [CrossRef]
- Manogaran, G.; Rawal, B.S. Machine learning based trust model for secure internet of vehicle data exchange. In Proceedings of the 2020 IEEE Globecom Workshops (GC Wkshps), Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
- Faisal, S.M.; Gupta, B.K.; Zaidi, T. A hybrid framework to prevent VANET from Sybil Attack. In Proceedings of the 2022 5th International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), Aligarh, India, 26–27 November 2022; pp. 1–6. [Google Scholar]
- Siddiqui, S.A.; Mahmood, A.; Sheng, Q.Z.; Suzuki, H.; Ni, W. Towards a Machine Learning Driven Trust Management Heuristic for the Internet of Vehicles. Sensors 2023, 23, 2325. [Google Scholar] [CrossRef] [PubMed]
- Kamel, J.; Haidar, F.; Jemaa, I.B.; Kaiser, A.; Lonc, B.; Urien, P. A misbehavior authority system for sybil attack detection in c-its. In Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 10–12 October 2019; pp. 1117–1123. [Google Scholar]
- Tangade, S.; Manvi, S.S.; Hassan, S. A deep learning based driver classification and trust computation in VANETs. In Proceedings of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA, 22–25 September 2019; pp. 1–6. [Google Scholar]
- Siddiqui, S.A.; Mahmood, A.; Zhang, W.E.; Sheng, Q.Z. Machine learning based trust model for misbehaviour detection in internet-of-vehicles. In Neural Information Processing: 26th International Conference, ICONIP 2019, Sydney, NSW, Australia, 12–15 December 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 512–520. [Google Scholar]
- Huang, F.; Li, Q.; Zhao, J. Trust Management Model of VANETs Based on Machine Learning and Active Detection Technology. In Proceedings of the 2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops), Foshan, China, 11–13 August 2022; pp. 412–416. [Google Scholar]
- Aref, A.; Tran, T. A hybrid trust model using reinforcement learning and fuzzy logic. Comput. Intell. 2018, 34, 515–541. [Google Scholar] [CrossRef]
- Wang, W.; Min, M.; Xiao, L.; Chen, Y.; Dai, H. Protecting semantic trajectory privacy for VANET with reinforcement learning. In Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–5. [Google Scholar]
- Guo, J.; Li, X.; Liu, Z.; Ma, J.; Yang, C.; Zhang, J.; Wu, D. TROVE: A context-awareness trust model for VANETs using reinforcement learning. IEEE Internet Things J. 2020, 7, 6647–6662. [Google Scholar] [CrossRef]
- Zhang, B.; Wang, X.; Xie, R.; Li, C.; Zhang, H.; Jiang, F. A reputation mechanism based Deep Reinforcement Learning and blockchain to suppress selfish node attack motivation in Vehicular Ad-Hoc Network. Future Gener. Comput. Syst. 2023, 139, 17–28. [Google Scholar] [CrossRef]
- Kachalsky, I.; Zakirzyanov, I.; Ulyantsev, V. Applying reinforcement learning and supervised learning techniques to play hearthstone. In Proceedings of the 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Mexico, 18–21 December 2017; pp. 1145–1148. [Google Scholar]
- García, J.; Majadas, R.; Fernández, F. Learning adversarial attack policies through multi-objective reinforcement learning. Eng. Appl. Artif. Intell. 2020, 96, 104021. [Google Scholar] [CrossRef]
- Qu, X.; Sun, Z.; Ong, Y.S.; Gupta, A.; Wei, P. Minimalistic attacks: How little it takes to fool deep reinforcement learning policies. IEEE Trans. Cogn. Dev. Syst. 2020, 13, 806–817. [Google Scholar] [CrossRef]
Trust Properties | Description |
---|---|
Direct | This attribute calculates trust value based on trustor–trustee relationships. |
Indirect | Trust value is calculated from the suggestions and opinions of the trustor’s various neighbors. |
Subjective | Trust value is calculated from the personal views of the trustor. |
Objective | The parameters of the observed trustee entity are what determine the value of trust, which is derived from those parameters. |
Local | The value of trust is exclusively accessible to the trustor and trustee and cannot be accessed by other users in the network. |
Global | Each entity that is part of the network has its own trust value that is known by every other entity. |
Asymmetric | This is when one entity gives trust to a second entity but the second entity does not give trust to the first entity. |
History-dependent | Trust value is given depending on the previous behaviors of the entity under observation. |
Context-dependent | The importance of trust depends on the surrounding circumstances. |
Composite | Trust value is based upon various parameters. |
Dynamic | If the initial trust value was generated with certain parameters and those values later change, the trust value will also change. |
Citation | Year | IoV Security | IoV Trust | Machine Learning | Comparison |
---|---|---|---|---|---|
[12] | 2017 | + | The survey does not explore ML techniques and the trust scheme. | ||
[74] | 2017 | + | The survey discusses only security challenges and the trust and ML-based solutions are not explored. | ||
[64] | 2018 | + | + | Only three types of trust models are considered. The survey does not discuss ML-based solutions. | |
[77] | 2018 | + | + | The survey does not provide a number of solutions based on ML techniques for security or trust in IoV. | |
[78] | 2018 | + | + | The authors present cryptographical solutions and ML-based solutions are missing. | |
[65] | 2019 | + | The authors present many security solutions but detailed information on trust and ML techniques are missing. | ||
[66] | 2020 | + | + | There is no security challenge discussed in this survey. | |
[76] | 2020 | + | + | The survey discussed ML-based solutions for security but not for trust. | |
[67] | 2020 | + | The survey discusses only security protection but the trust and ML-based solutions are not presented. | ||
[75] | 2020 | + | The survey is missing the trust scheme and ML-based solutions in IoV. | ||
[68] | 2020 | + | + | The survey does not discuss ML-based solutions for security and trust. | |
[69] | 2021 | + | The survey is missing the trust scheme and ML-based solutions in IoV. | ||
[70] | 2021 | + | + | Details about using ML-based solutions in the trust problem are missing. | |
[50] | 2022 | + | + | The authors do not explore the trust challenge and its solutions. | |
[71] | 2022 | + | The survey does not explore ML and trust. | ||
[72] | 2022 | + | The survey does not mention ML or trust. | ||
[73] | 2022 | + | The authors present the security challenges of IoV environments, but ML-based solutions and trust are missing. | ||
Our Survey | 2023 | + | + | + | Our survey focuses on the areas of security, trust, and ML approaches. |
Citation | Year | Focused Area | Solution Technique | ML Type | Algorithm | Attack Type | Object |
---|---|---|---|---|---|---|---|
[135] | 2019 | Security | Machine Learning | SL | Decision-tree classifier | Vehicle misbehavior | Detect vehicle misbehavior |
[136] | 2019 | SL | KNN and SVM | Malicious node attacks | Detect malicious node | ||
[137] | 2019 | SL | CatBoost | Jamming attacks | Detect jamming attacks | ||
[138] | 2020 | SL | Plausibility checks and traditional SL | A data-centric misbehavior | Misbehavior detection system for IoVs | ||
[139] | 2022 | SL | RF, NB, and KNN | Backdoor, DDoS, and MITM attacks | To detect and mitigate various IoV attacks using ML algorithms | ||
[140] | 2022 | SL | Eight SL models | Malicious messages | Classification of normal and malicious messages in vehicle network | ||
[141] | 2023 | SL | RF | Falsification attacks | To protect IoV data, identify and prevent falsification attacks. | ||
[142] | 2019 | UL | DCAEs | DoS attacks | Defend against DoS attacks | ||
[143] | 2020 | UL | UL | Four types of attacks | Detect DoS attacks and three other types of attacks | ||
[144] | 2022 | UL | K-Means, Gaussian Mixture, and Dbscan Clustering | DoS attack | To identify and mitigate DoS attacks that compromise connected vehicle function and safety | ||
[145] | 2023 | UL | Median Absolute Deviation | Anomalies in V2V communication | To detect malicious nodes with low false-positive rates | ||
[146] | 2018 | RL | Q-learning | Spoofing attack | Find spoofing data | ||
[149] | 2019 | RL | DRL | Malicious node attacks | Signal authentication | ||
[151] | 2019 | RL | Q-learning | DDoS attacks | Detect DDoS attacks | ||
[152] | 2019 | RL | Q-learning | Jamming attack | Prevent jamming attack | ||
[153] | 2022 | RL | Q-learning | Malicious data transmission in V2X communication | Classifying incoming data as legitimate or malicious improves security | ||
[154] | 2023 | RL | DRL and ILP | Edge attacks | To improve network stability and enhancing security mechanisms |
Citation | Year | Focused Area | Solution Technique | ML Type | Algorithm | Attack Type | Object |
---|---|---|---|---|---|---|---|
[155] | 2018 | Trust | Machine Learning | SL | Bayesian neural network | Malicious node attacks | Extract relevant features from the vehicular network for a trust model |
[156] | 2019 | SL | XGBoost and RF | Suspicious activity | Detect suspicious activity | ||
[157] | 2020 | SL | KNN | Fake position attacks | Detect misbehaving nodes | ||
[158] | 2020 | SL | RF | Four types of attacks | Generated the trust factor | ||
[159] | 2020 | SL | NB | Malicious node attacks | Indicate the vehicles as trusted or untrusted | ||
[160] | 2022 | SL | Metaheuristic | Sybil attacks | To identify Sybil nodes and protect messages from Sybil attacks. | ||
[161] | 2023 | SL | KNN and SVM | Insider attacks in IoV | By computing parameters and identifying dishonest vehicles, the aim is to accurately evaluate trust | ||
[162] | 2019 | UL | RNN-based | Sybil attacks | The global detection of Sybil attacks | ||
[163] | 2019 | UL | DNN | Dishonest vehicle | Classify communications as either honest or dishonest | ||
[164] | 2019 | UL | Various UL models | Dishonest vehicle | Classify the cars as either honest or dishonest | ||
[165] | 2022 | UL | Bayesian and active detection methods | Malicious nodes | Enhance the reliability of communication through the evaluation of the trustworthiness of vehicles and events. | ||
[166] | 2018 | RL | Q-learning | Dishonest vehicle | Capable of resisting attacks and enhancing trust | ||
[167] | 2019 | RL | Q-learning | Malicious node attacks | Minimize the vehicle’s privacy gain | ||
[168] | 2020 | RL | Q-learning | Dishonest vehicle | Evaluate the trust value of the sender | ||
[169] | 2023 | RL | DRL | OBU attacks | Reduce attack motives and make informed decisions to improve OBU collaboration. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alalwany, E.; Mahgoub, I. Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions. Sensors 2024, 24, 368. https://doi.org/10.3390/s24020368
Alalwany E, Mahgoub I. Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions. Sensors. 2024; 24(2):368. https://doi.org/10.3390/s24020368
Chicago/Turabian StyleAlalwany, Easa, and Imad Mahgoub. 2024. "Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions" Sensors 24, no. 2: 368. https://doi.org/10.3390/s24020368
APA StyleAlalwany, E., & Mahgoub, I. (2024). Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions. Sensors, 24(2), 368. https://doi.org/10.3390/s24020368