Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
3 views4 pages

Summar

Uploaded by

Kanu Priya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views4 pages

Summar

Uploaded by

Kanu Priya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1. Internet of Vehicles: Challenges and Issues (2015, Int. J. Applied Eng.

Research)

Challenges:

 Lack of a global unique ID system to identify vehicles reliably.

 Interoperability issues between IoV and existing VANET-based ITS.

 Real-time data reliability and synchronization across systems.

 Need for a scalable IoV ecosystem with standardization.

Solutions:

 Research on dynamic unique ID assignment mechanisms.

 Interoperability frameworks to integrate IoV with VANETs.

 Cloud-based service platforms for storing and sharing IoV data.

 Combining IoV with external domains (e.g., weather, parking services) for richer ITS
services.

2. A Survey on IoV: Applications, Security Issues & Solutions (2019, Vehicular


Communications)

Challenges:

 Security vulnerabilities in IoV applications and communication.

 Issues of scalability and standardization in IoV deployments.

 High risk of cyberattacks compromising safety-critical systems.

Solutions:

 Proposed secure IoV frameworks integrating authentication and cryptographic


protocols.

 Discussion of intrusion detection and trust management systems.

 Suggested architectures for secure communication between vehicles and


infrastructure.

3. IoV Security & IDS Survey (2023, Docx file)

Challenges:

 Vulnerabilities in intra-vehicle networks (sensors, ECUs) and inter-vehicle


communication.
 Risk of malicious intrusions affecting autonomous driving (e.g., Tesla autopilot
attack).

 Privacy concerns due to massive AI-driven data collection.

 Lack of well-structured Intrusion Detection Systems (IDS) tailored for IoV.

Solutions:

 Use of Intrusion Detection Systems (IDS) for anomaly detection in IoV.

 Integration of AI/ML/DL models (CNN, LSTM, GANs, etc.) for detecting malicious
activity.

 IDS design criteria include: detection accuracy, low latency, scalability, privacy
protection.

 Proposed weight-based mechanisms to prioritize IDS components and improve


detection efficiency.

4. Adaptive Attack Mitigation for IoV Flood Attacks (2025, IEEE IoT Journal)

Challenges:

 Flood attacks overwhelm IoV gateway servers, causing congestion, high delays, and
packet loss.

 Attack Detection (AD) systems themselves can be disrupted during heavy packet
floods.

 Maintaining QoS (low latency, reliability) during ongoing attacks is very difficult.

Solutions:

 Introduced a Smart Quasi-deterministic Forwarder (SQF) to regulate incoming


traffic.

 Proposed Adaptive Attack Mitigation (AAM) system that dynamically samples


incoming packets and drops malicious batches while minimizing loss of benign data.

 Optimized mitigation by minimizing cost functions (overhead vs. false drops).

 Validated experimentally that Optimum AAM reduces attack impact and maintains
AD functionality.

5. Security Challenges in IoV for ITS: A Survey (Aug 2025, Tsinghua Science & Tech.)
Challenges:

 Vulnerability to attacks: interference, eavesdropping, spoofing, Sybil, DoS, wormhole,


blackhole, grayhole.

 Privacy issues: protecting real identity and location of drivers while allowing lawful
traceability.

 Dynamic topology and intermittent connectivity in VANETs.

 Ensuring secure routing over open wireless channels.

Solutions:

 Use of secure routing protocols to verify authenticity of routing messages.

 Deployment of trusted authorities (TAs) for authentication.

 Cryptographic techniques for confidentiality, authentication, integrity, and non-


repudiation.

 Auxiliary nodes to handle disconnections and ensure availability.

6. Securing the Road Ahead: IoV Security with Blockchain-based IDS (2025, Wiley)

Challenges:

 Data integrity, privacy, and authentication issues in smart city IoV systems.

 Vulnerability to large-scale attacks with potential fatal consequences.

 Latency issues in real-time IoV communications.

 Lack of robust, unified frameworks for IoV security.

Solutions:

 Proposed a Blockchain-based Intrusion Detection System (IDS) with AI and Smart


Contracts.

 Hybrid fog + edge computing architecture for faster detection and reduced latency.

 Mathematical models and threat analysis to validate framework resilience.

 Automated real-time responses to detected threats via smart contracts.

 Multi-layered security ensuring scalability and robustness in smart cities.


✅ In summary:

 2015 paper: focused on foundational challenges (IDs, interoperability, ecosystem).

 2019 paper: reviewed security threats and general solutions.

 2023 paper: highlighted IDS and AI-based detection.

 2025 Aug paper: covered privacy, secure routing, VANET issues.

 2025 IEEE paper: proposed adaptive mitigation against flood attacks.

 2025 Wiley paper: proposed blockchain + AI-based IDS for smart cities.

You might also like