期刊
INTERNET OF THINGS
卷 22, 期 -, 页码 -出版社
ELSEVIER
DOI: 10.1016/j.iot.2023.100809
关键词
Internet of Vehicle (IoV); Intrusion Detection System (IDS); IoV attacks; IoV security
Nowadays, connected vehicles play a major role in enhancing the driving experience by sharing information through the Internet of Vehicles (IoV) network. However, this connectivity also raises risks such as privacy concerns and network security vulnerabilities.
Nowadays, connected vehicles have a major role in enhancing the driving experience. Connected vehicles in the network share their knowledge with the help of the network known as the Internet of Vehicles (IoV). However, connection through the network comes with risks ranging from privacy concerns to security vulnerabilities in the network. Inside vehicles, many sensors and Electronic Control Units (ECUs) are connected via specific network protocols, known as Intra-Vehicle communications, to assist the driver in tasks such as autonomous driving. Communicating through different protocols results in security openness for attackers to disturb the normal functioning of sensors and ECUs, which sometimes has detrimental effects. Moreover, in IoV, there is active communication between vehicles and other vehicles or road infrastructures alongside the network, known as Inter-Vehicle communications. InterVehicle communications can also be an open vulnerability to intruders. Motivated by the mentioned security problems, many research initiatives have elaborated on building Intrusion Detection Systems (IDS) to detect malicious behavior threatening the confidentiality, integrity, availability, and authenticity of IoV. In this survey, we first provide a structured classification of IoV environment, its components, and the vulnerabilities of inter/intra-vehicle networks. Then, we provide a comprehensive literature review regarding numerous proposed IDS for IoV networks. Further, we discuss IDS criteria with a focus on essential areas that should be taken into account while assessing IoV network security, which can be related to IDS implementation constraints or further privacy requirements.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据