4.7 Review

Security issues in Internet of Vehicles (IoV): A comprehensive survey

期刊

INTERNET OF THINGS
卷 22, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.iot.2023.100809

关键词

Internet of Vehicle (IoV); Intrusion Detection System (IDS); IoV attacks; IoV security

向作者/读者索取更多资源

Nowadays, connected vehicles play a major role in enhancing the driving experience by sharing information through the Internet of Vehicles (IoV) network. However, this connectivity also raises risks such as privacy concerns and network security vulnerabilities.
Nowadays, connected vehicles have a major role in enhancing the driving experience. Connected vehicles in the network share their knowledge with the help of the network known as the Internet of Vehicles (IoV). However, connection through the network comes with risks ranging from privacy concerns to security vulnerabilities in the network. Inside vehicles, many sensors and Electronic Control Units (ECUs) are connected via specific network protocols, known as Intra-Vehicle communications, to assist the driver in tasks such as autonomous driving. Communicating through different protocols results in security openness for attackers to disturb the normal functioning of sensors and ECUs, which sometimes has detrimental effects. Moreover, in IoV, there is active communication between vehicles and other vehicles or road infrastructures alongside the network, known as Inter-Vehicle communications. InterVehicle communications can also be an open vulnerability to intruders. Motivated by the mentioned security problems, many research initiatives have elaborated on building Intrusion Detection Systems (IDS) to detect malicious behavior threatening the confidentiality, integrity, availability, and authenticity of IoV. In this survey, we first provide a structured classification of IoV environment, its components, and the vulnerabilities of inter/intra-vehicle networks. Then, we provide a comprehensive literature review regarding numerous proposed IDS for IoV networks. Further, we discuss IDS criteria with a focus on essential areas that should be taken into account while assessing IoV network security, which can be related to IDS implementation constraints or further privacy requirements.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据