sensors-24-00368-v2
sensors-24-00368-v2
sensors-24-00368-v2
Review
Security and Trust Management in the Internet of Vehicles (IoV):
Challenges and Machine Learning Solutions
Easa Alalwany 1 and Imad Mahgoub 2, *
1 College of Computer Science and Engineering, Taibah University, Yanbu 46421, Saudi Arabia;
ealalwany2020@fau.edu
2 Electrical Engineering & Computer Science, Florida Atlantic University, 777 Glades Road,
Boca Raton, FL 33431, USA
* Correspondence: mahgoubi@fau.edu
Abstract: The Internet of Vehicles (IoV) is a technology that is connected to the public internet and is
a subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a mobile
and wireless network. Numerous vehicles, users, things, and networks allow nodes to communicate
information with their surroundings via various communication channels. IoV aims to enhance
the comfort of driving, improve energy management, secure data transmission, and prevent road
accidents. Despite IoV’s advantages, it comes with its own set of challenges, particularly in the
highly important aspects of security and trust. Trust management is one of the potential security
mechanisms aimed at increasing reliability in IoV environments. Protecting IoV environments from
diverse attacks poses significant challenges, prompting researchers to explore various technologies
for security solutions and trust evaluation methods. Traditional approaches have been employed, but
innovative solutions are imperative. Amid these challenges, machine learning (ML) has emerged
as a potent solution, leveraging its remarkable advancements to effectively address IoV’s security
and trust concerns. ML can potentially be utilized as a powerful technology to address security
and trust issues in IoV environments. In this survey, we delve into an overview of IoV and trust
management, discussing security requirements, challenges, and attacks. Additionally, we introduce
a classification scheme for ML techniques and survey ML-based security and trust management
schemes. This research provides an overview for understanding IoV and the potential of ML in
improving its security framework. Additionally, it provides insights into the future of trust and
Citation: Alalwany, E.; Mahgoub, I. security enhancement.
Security and Trust Management in the
Internet of Vehicles (IoV): Challenges
Keywords: Internet of Vehicles; Internet of Things; machine learning; security; trust
and Machine Learning Solutions.
Sensors 2024, 24, 368. https://
doi.org/10.3390/s24020368
intelligent and secure, they are being equipped with external and internal sensors. External
sensors are attached outside of the vehicle and include cameras and parking sensors, while
internal sensors include automotive sensors such as brake sensors, fuel sensors, and tire
pressure sensors. Vehicles equipped with sensors that communicate through a mobile
and wireless network are considered part of the IoT and are referred to as the Internet
of Vehicles (IoV). IoV integrates two technologies, vehicular ad hoc networks (VANETs)
and the IoT, to take steps toward intelligent transportation [4–8]. The IoT mobilizes IoV
to produce a revolution in the field. IoV is an open, integrated network system with
significant controllability, manageability, and credibility that has evolved from the IoT.
Numerous vehicles, users, things, and networks allow nodes to communicate information
with their surroundings via various communication channels. IoV is considered one of the
most significant IoT applications in the area of automobiles [9–14]. Driving safety is the
main goal of many applications of IoV environments. IoV has its own set of challenges,
particularly in terms of security and trust, since it has to provide highly important security
functions. As with other technologies, IoV has many security vulnerabilities. Hackers
could control vehicles if vulnerabilities in IoV are exposed, which could lead to traffic
accidents. The security of IoVs is a critical issue for the safety of drivers and anyone using
the roadways. The need for data security will increase as the number of vehicles connected
to the public Internet increases.
A trusted environment is a method of achieving security in IoV networks; hence, trust
is an essential component of security. Messages exchanged between vehicles and their
surroundings must be legitimate since trust must be established between vehicles. The de-
tection and revocation of malicious vehicles, as well as their communications, is critical to
providing a safe IoV environment. Before accepting and sending a message received by a
legitimate vehicle, the vehicle should examine its trustworthiness and legitimacy. Some
aspects of the V2X paradigm have been known to prompt major security concerns as well
as lead to road accidents and traffic congestion. Users of vehicular networks aim to avoid
any infringement on their privacy and any disclosure of private information. It is critical
that users can also ensure that the data they receive are accurate. Traditional methods
may not be able to address all these concerns or safeguard current IoV scenarios. It is
important for security requirements such as integrity, confidentiality, and availability to
be carefully considered by organizations. During an interaction between nodes, we define
trust management as a collection of steps whereby a node attempts to establish trust with
another node. Trust factor is a property measured as a quantifiable belief by a trustor node
and trustee node and ensures that the negative impacts of malicious and selfish nodes are
significantly minimized. The categories of trust properties are subjective and objective trust,
local and global trust, context-based trust and history-based trust as well as direct and
indirect trust. For the safety of their users, IoV systems must be protected from any form of
cyberattacks that may interfere with any operation. To boost IoV security, certain steps are
undertaken, the main one being trust management; therefore, many research works have fo-
cused on integrating trust management in the vehicular environment. Nowadays, the most
promising technology in the wireless network field is machine learning (ML), and ML
techniques are being used in a wide range of applications in wireless networks [15,16].
Recently, many solutions based on ML technologies in security for wireless networks have
been proposed [17].
IoV networks aim to improve traffic safety and efficiency. A secure and trusted envi-
ronment is essential for vehicles to be able to exchange data with each other. Modeling trust
and security in IoV networks has been a challenge because these networks are dynamic, de-
pend on sensitive communication, and are naturally open. In IoV environments, dishonest
vehicles and attacks endanger the lives of drivers, passengers, and pedestrians. Security
solutions and trust management have been employed to make sure that vehicular networks
are safe and reliable. The use of ML techniques in IoV environments is rapidly increasing,
yet the security implications of their integration with IoV have received little attention.
ML techniques are gaining increased attention in trust and security research, and it would
Sensors 2024, 24, 368 3 of 37
be interesting to investigate the relevant aspects of this research to create a secure and
trusting IoV environment. ML techniques, such as supervised learning, unsupervised
learning, and reinforcement learning, are reviewed in this survey to enhance security and
trust management in vehicular networks. Our contributions are:
• We provide a detailed description of the concept of IoV that provides an overview and
covers the architectures and types of connections in IoV.
• We explain the fundamentals of trust evaluation and its features in IoV.
• Security is a significant factor in an IoV environment, and serious security concerns of
IoV are discussed in this survey.
• An IoV environment requires various security requirements to ensure constant safety
and security.
• The survey discusses and identifies various security attacks including attacks on
authentication, confidentiality, availability, integrity, secrecy, and routing.
• We present possible trust and security solutions for IoV environments by mainly
focusing on classification using three types of ML models (supervised learning, unsu-
pervised learning, and reinforcement learning).
This paper is organized into the following sections. Section 2 provides background
information. Section 3 discusses related surveys. Section 4 describes the concept of IoV.
Section 5 examines solutions based on ML and traditional approaches for security and trust
in IoV. Section 6 concludes the paper.
2. Search Methodology
A structured methodology was utilized to conduct a comprehensive review of the
literature on the Internet of Vehicles (IoV), with a focus on security, trust, and the poten-
tial role of machine learning (ML). The method started with a search for keywords that
accurately describe the key concepts of the study, such as “Internet of Vehicles”, “IoV
security”, “IoV trust”, “machine learning”, “ML-based security”, “ML-based trust”, and
“IoV challenges”. Google Scholar, IEEE Xplore, Springer, MDPI, and the ACM Digital
Library were the academic search engines used to ensure that our researchers had access
to the most recent and significant literature in their respective fields. In order to ensure
the timeliness of the review, a certain publishing date range was delineated, covering 2017
to 2023. This range was chosen due to the notable advancements observed in the fields
of IoV and machine learning throughout this period. The selection criteria for this survey
were designed to ensure the survey’s concentration and applicability. This study only
incorporates research specifically focused on ML-based approaches for addressing security
and trust concerns within an IoV environment. Any study that was outdated and no longer
relevant to the current state of security and trust in IoV utilizing ML was excluded from the
survey. This ensured that the survey accurately represented the most recent advancements
in this field of study. Furthermore, in order to ensure the precision and effectiveness of
the survey, works that lack substantial relevance or significance for developing the current
landscape of ML in IoV were also excluded. After implementing these exclusion criteria, 50
publications related to the classification of security and trust solutions for IoV were selected
for this review.
3. Background
3.1. Trust Management in IoV
Trust is described as the probability that an individual will anticipate the behavior of
another peer based on the behavior of the peer and the individual’s well-being. This defini-
tion comes from the field of psychology [18]. It is worth noting that trust is significantly
influenced by the subject’s viewpoint. As a result, trust indicates the trustor’s confidence
that the trustee will act in his or her best interests [19]. According to sociological research,
reciprocity and cooperation among persons in social interactions are believed to build trust
among individuals [20]. In the computer science field, trust is defined as a trustor’s convic-
tion in the reliability of the target node, with the goal of achieving a trust objective under
Sensors 2024, 24, 368 4 of 37
particular conditions [21]. Trust can also be viewed as an assessment made by an evaluator,
which is influenced by past experiences with a particular entity and the perspectives of
other trustworthy sources [22]. Trust management strategies are commonly employed to
secure many network environments. To comprehend trust management approaches, it is
also important to understand the basic definition of the trust concept. There is a distinction
between trust and trustworthiness, which is a trait that describes reliability. Trust and
reputation can be used interchangeably and at times can cause confusion. The reputation
of a specific node in the network environment is defined as the opinion of that node that
has been built based on recommendations of other network nodes that are either direct or
indirect neighbors of the node in question. Trust concepts demonstrate the relationship
existing between a trustor and trustee and that the trustor believes the trustee will fulfill
its obligations. The success of trust relationships result in security and optimistic feelings,
while their failure result in mistrust and insecurities. In the computer science community,
the trust concept has been proven to be ideal for the protection of networks [23–25].
of the created event compared to other actions in the same context, and it is an essential
factor in determining data content worthiness. The proximity time, the type of incident that
occurred, and the role of the vehicular node are some of the major trust elements considered
in data utility assessments. Information-oriented methods and event-oriented methods are
two types of data-driven approaches. Similarity is a term that describes how the contents of
shared data are similar in terms of time and proximity criteria, and it is used to determine
the value of data trust. Similarity aids in reducing the amount of data disseminated,
ensuring that only meaningful information is broadcast. The primary principle of the
combined trust management technique relies on entity and data-sharing trustworthiness.
This module is more efficient when it comes to trust computation. The assessment of data
trust value is aided by entity trustworthiness.
An example was provided to address the issue of injecting inaccurate information into
safety-related events in VANETs, in which a similarity-based solution was proposed [35].
The calculation of a similarity rating is based on periodic beacons that contain position
and speed information. An Echo procedure was also used to acquire a trust rating and to
validate the reports by observing the vehicle’s normal and expected behavior in relation to
the reported occurrence. In a VANET presented in [36], a multidimensional trust system
was created for the agents. In order to require further feedback from trustworthy nodes,
the system’s trust values must be maintained. When determining trustworthiness, authors
take into account variables including experience, majority opinion, and priority criteria.
These schemes classify nodes as having an authority role, an expert role, a seniority role,
or an ordinary role. It is also worth noting that the experience factor is calculated as a
result of the number of encounters. To deal with behavioral changes, the forgetting factor
is introduced. Each node communicates its trustworthiness to other entities through trust
messages sent to an authentic infrastructure, which later becomes a component of the
reputation management center, where node trust is collected [37]. Authentic infrastructure
filters trust communications based on statistical regularity, and each node then has access
to updated trust data from the reputation center. Historical trust can be determined with
the use of authentic center recommendations [38]. Platoon head vehicles are ranked using
the reputation criteria. The system model includes servers that are used to assess the trust
of vehicles, and reputation values are calculated using feedback from user vehicles. The use
of iterative filtering eliminates any malicious user vehicle feedback. The server node then
suggests a safe platoon leader vehicle.
artificial intelligence models and human behavior simulations using computers provide
an almost perfect process for emulating human thinking patterns. The ML-based trust
evaluation process is concise and instructive. There is usually a high degree of certainty in
using ML-based trust evaluation to solve basic processes. Data processing, model selection,
and final model determination are the three rough division steps of ML’s general process.
The data processing step involves transforming available raw data into useful features
or turning dirty raw data into meaningful features. It involves the use of, among many
other methods, data cleansing, feature selection, and data fusion; these are methods that
appropriately minimize high dimensions, missing values, noise, and values that are re-
peated. In the model selection step, the most appropriate trust evaluation model-building
algorithm is selected from the many available ML algorithms. The final model selection step
involves adjusting parameters and selecting the best performance achievement enabling
parameters for the selected algorithm. The performance of the selected algorithm is usually
significantly affected by the availed parameters’ configurations, as the algorithm has a
set of parameters that should be set for its run to deliver expected results for the given
input. Existing experience-based decision-making or human decision-making processes
are what the ML-based trust evaluation process simulates. In addition to this process
being easily understandable, implementing it is highly effective and easy. ML has a wide
range of applications, including fraud detection in finance [42], personalized learning in
education [43], disease diagnosis in healthcare [44], and climate modeling in environmental
research [45]. ML helps solve challenges related to IoV, especially traffic flow prediction
and optimization. The authors in [46] highlighted the importance of timely and reliable
traffic flow information for ITS deployment. Traffic flow predictions are accurate using ML
algorithms and historical and real-time traffic data. This predictive capability, which is diffi-
cult to acquire using traditional approaches, is useful for a variety of IoV applications, such
as traffic congestion mitigation, fuel consumption reduction, and location-based services.
In addition, the authors in [47] demonstrated how machine learning techniques can im-
prove routing strategies in vehicular networks, including implementing a software-defined
networking (SDN) architecture that incorporates a neural network (NN)-based mobility
prediction. This approach guarantees uninterrupted connectivity and reduces latency [48],
as well as using Q-learning-based hierarchical routing instead of traditional routing tables.
This uses self-constructed adaptive Q-value tables that are based on local traffic flow. This
approach enables them to achieve high delivery rates and balance network load [49]. These
examples demonstrate how machine learning can effectively handle the many forms of
communication and Quality of Service (QoS) needs in automotive networks, beyond the
performance limitations of conventional networking systems. Moreover, the authors in [50]
demonstrated the effectiveness of machine learning in predicting traffic flows, a typical
time-series challenge. Because traffic flows are stochastic and nonlinear, conventional
methods that rely on autoregressive moving averages frequently fail to account for these
characteristics. Effectively enhancing the accuracy of predictions has been accomplished
with the help of ML techniques such as kNN and support vector regression (SVR). A fun-
damental endeavor in intelligent transportation systems, behavior prediction is another
area in which ML performs well. The authors in [51] showed that SVMs can predict lane
changes. Overall, machine learning in the environment of IoV has shown its adaptability
and efficacy in solving a wide range of challenges associated with predicting traffic patterns,
optimizing routes, and forecasting behavior in vehicular networks.
3.3.1. Authentication
The system should not allow any form of imitation of a vehicle or vehicles trying
to send information. The sensor that sends the data must be the vehicle it claims to be.
The receiving sensor should also be able to differentiate between the true sender and a fake
sender by scanning the ID of the sender. The chances of a masquerading node acting in the
same way as a legitimate node are extremely high. As such, communication between nodes
must be authenticated. Every sender must have a unique ID that can be verified through
keys or passwords [61].
3.3.2. Confidentiality
Sensitive information passes through the communication channels in IoV networks.
This information can have serious effects if it gets into the wrong hands. As such, an efficient
system should ensure that sensitive information is secure and only the intended users can
access it. Confidential information should be protected at all costs. Encryption has proven
to be an effective solution in this endeavor.
3.3.3. Availability
The number of vehicle owners has increased in the past ten years. As such, there is
a high likelihood of a high number of IoV users within a particular region at the same
time. For this reason, network breakdowns cannot be ruled out, especially during peak
hours when everyone is rushing to go home or to work. Hence, an effective system
will be available at all times to all legitimate users. The entire IoT system is based on
information dissemination. For this reason, information should be made available when
needed; otherwise, if there are delays, it might be of no help. It is for this reason that group
signature was developed to solve the availability issue.
Sensors 2024, 24, 368 11 of 37
3.3.5. Nonrepudiation
Nonrepudiation not only detects compromised nodes but also prevents the sender
or receiver from denying the transmitted message. Coordination and cooperation among
users of an IoT network within a particular range are crucial. For instance, information
on an emergency or an accident should be communicated promptly to identify the person
responsible. As such, if a user denies a sent message, the user can jeopardize the lives of
other users.
3.3.7. Privacy
A driver’s daily routine is one of the types of private information that should not be
made public. No unauthorized access to the network should be allowed since it may put
people’s lives at risk [63].
4. Related Surveys
The authors in [64] reported different trust management schemes based on three types
of models: entity-centric trust models, data-centric trust models, and combined trust mod-
els: a multifaceted trust, a trust and reputation infrastructure-based proposal, a distributed
trust, a deterministic approach, a trust model based on various factors of a message, a vot-
ing system based on distance from the event, categorized decentralized trust management,
an evaluation scheme, and an attack-resistant trust management scheme. They did not,
however, present an ML scheme to enhance trust. In the survey in [65], security aspects
of IoV, including security requirements and challenges, were considered. Various security
threats and existing security solutions for each threat were explored. However, neither
ML-based solutions nor trust management were examined in this analysis.
ML-based trust evaluations are free from the inadequacies of traditional trust eval-
uation methods, as they can carry out trust evaluation to establish a trust model using
data about other available trust-related features. ML-based trust evaluations are capable
of finding substitute data for the unavailable indirect recommendation and direct histori-
cal interaction information in newcomer trustees. ML methods aim to improve the trust
evaluation’s accuracy compared with traditional trust evaluation methods [66]. Based on
IoV’s security requirements, such as authentication and availability, the authors of [67]
classified various security attacks and suggested possible solutions. ML-based solutions
were not demonstrated.
Sensors 2024, 24, 368 12 of 37
Many different trust management models were examined in the survey in [68], and the
authors specifically focused on IoVs. One of the intelligent solutions suggested for trust
management is the use of context awareness. The authors attempted to demonstrate
the potential benefits of context awareness in vehicular networks; however, the authors
did not consider ML as a potential solution to the problems of trust and security in IoV.
The observation of genetic algorithms (GA), one type of optimization technique, is the
focus of reference [69], which aimed to improve the security of IoV networks through
the observation of GA. According to the survey, GA is frequently utilized to improve the
security of IoV comparisons via various swarm intelligence optimizations. The utilization
of the GA in an IoV security system was carried out to improve the accuracy of the network
as well as the detection of malicious nodes. However, this survey omitted the use of ML
and the improvement in IoV trust.
In [70], the authors discussed the use of ML solutions in VANET such as applica-
tions, routing, security, resource allocation and access technologies, mobility management,
and integrated architectures. The challenge of trust in the VANET environment was not
discussed. In [50], the authors focused on the proposed ML method for ITS challenges.
Security and trust were not addressed, but they addressed ML-based works from the point
of view of vision-based perception, infrastructure, and resource management as well as
the prediction of traffic flow, the behavior of vehicles and users, and the road occupancy of
ITS. In [71], the authors investigated the potential integration of Digital Twins (DTs) into
IoV, focusing on improving the system design without mentioning machine learning or
trust. In [72], the security challenges within vehicular networks are discussed primarily,
with an emphasis on attacks and preventive measures, but without explicit mentions of
machine learning or trust. In [73], the author examined the security challenges of IoV
environments, emphasizing various attack types and the need for privacy preservation
and strong authentication, thereby contributing to discussions on security but without
ML techniques.
We provide a comprehensive discussion of related surveys, the difference between
our survey and these related surveys, as well as the survey’s main focus, which is shown in
Figure 2. Despite the fact that there are several surveys on IoV security [12,65,67,69,71–75],
few surveys have covered ML-based solutions in security or in trust schemes in this
environment. For example, the surveys in [50,70,76] addressed the use of ML-based trust
evaluation in IoV focusing on the trust scheme. In contrast, the surveys in [64,68,77,78]
addressed trust in IoV, but ML-based research was not conducted. In the survey in [66],
the security aspect was not covered by the authors. In Table 2, we compare previous survey
studies in terms of the focused areas of security, trust, and ML approaches as a solution.
Table 2. Comparison of surveys in terms of the focused areas of security, trust, and ML approaches.
the process of converting vehicles from normal mobile nodes to intelligent vehicles. This
discovery also brought stiff competition among renowned software-producing companies
such as Apple, Google and Huawei [79].
The emergence of IoV technology made it more convenient to own and drive a vehicle.
In addition to improving traffic monitoring, the technology aimed to enhance comfort-
able driving, improve energy management, secure data transmission, and prevent road
accidents. While this was good news, the new technology came with many challenges
and opportunities. Some of the issues that have still not been addressed are achieving
large-scale coverage, exchanging data in a secure environment, managing diverse network
connections, and dealing with vehicles with a dynamic topology [80].
curity services provided on these architectures will not be sufficient for securing IoV, which
will lead to different vulnerabilities that might affect the entire system. Accordingly, there is
a requirement for effective security mechanisms to improve the security of any architecture.
encryption can be utilized to prevent such attacks [101]. With malicious attacks, rather
than attackers benefiting from the attacks, they are instead initiated with the intent of
harming participating nodes. These attacks are dangerous and can cause significant damage.
Malicious attackers can even transmit false safety-critical information that puts drivers,
passengers, and pedestrians in danger [59,78,102–104]. Below is a detailed explanation of
some of the attacks to be expected in an IoV environment.
Figure 5. Classification of security and trust solutions based on traditional and machine learning
(ML)-based approaches.
Sensors 2024, 24, 368 20 of 37
paradigm, cookies in the requester’s record are used to calculate direct trust, which is based
on previous encounters. Indirect trust, on the other hand, is calculated using the service
provider’s shared cookies. VANETism was used to run simulations of this model. The most
common authentication attacks include wormhole attacks, GPS deception, secrecy attacks,
and routing attacks [67]. As presented in [58], for an IoV architecture to be considered
secure, it must have low error tolerance, high mobility of IoV entities, private routing
of data, and key distribution management. Common countermeasures for the above-
mentioned attacks include honeypot, threat modeling, and intrusion detection systems.
In the honeypot approach, the system deceives attackers and identifies malicious actions in
architecture. In threat modeling, Petri net modeling is used to authenticate, control, and
model complex vehicular networks. Crowdsourced data must be authenticated to deal
with malicious attacks that often mislead the vehicle and force it to take a different route
than the desired one. These messages must be detected in time so they can be eliminated
before causing any damage. In [117], the authors emphasize the importance of authorizing
and verifying information. By doing so, the collected information will be under supervi-
sion, thus preventing the vehicle from being misled. The other commonly used method
is scalable privacy. An individual’s privacy is protected, and the individual is given the
alternative to control the flow of information. In this case, privacy is sacrificed for privacy.
Scalable privacy ensures that data are extracted from a big group, thus making it difficult
for the owner’s data to be distorted. Sybil attacks violate the safety of passengers. These
attacks introduce nodes that assume multiple identities, thus disseminating false messages
in the network. The authors provide insights into the mechanism of understanding by
proposing a comprehensive heterogeneous communication technology architecture for
secure and private vehicular clouds that serve IoVs. This type of attack can cause confusion
and is responsible for most of the accidents in IoVs [67]. The authors in [118] created a
Sybil detection method known as Voiceprint that is based on signal strength indicators.
Voiceprint compares all the received time series, which is unlike the other common methods
used to prevent Sybil attacks. Moreover, Voiceprint can be enhanced to carry out detection
on service channels. This enhancement decreases the false positive rate. GPS Spoofing is a
type of attack that focuses on Global Positioning System signals. It misleads these signals,
which places passengers in danger. In [119], it is shown that the best way to address this
type of attack is to use a two-factor authentication system that uses digital signatures and
time synchronization to prevent spoofing. The hash signals are encrypted to further protect
the system. Detecting masquerading attacks is not an easy task. The authors effectively
address VANET vulnerabilities and highlight the complex difficulty of preventing mas-
querading attacks in autonomous navigation systems. In [120], to address this problem,
network specialists recommend an anomaly detection model that detects attacks using
signal strength fluctuations. The malicious nodes are detected by factoring in the maximum
speed of the nodes and the time of reception. Data falsification attack detection mechanisms
have received increasing attention from security analysts. The authors present a hardware-
independent technique for detecting masquerade attacks that is based on an adaptive
anomaly detection model that takes signal strength variations into account. Furthermore,
this methodology emphasizes the criticality of employing adaptive and efficient threat
detection systems. In [121], the main idea behind these mechanisms is to improve IoV
network throughput and ensure accurate information relay to the neighbors. At the same
time [122], hierarchical temporal memory can be employed to mitigate inconsistencies in
the communication medium. In [123], to improve the security of smart vehicles, a two-level
cryptography authentication technique is used.
The methods used to address common attacks can be categorized in terms of avail-
ability, data integrity, authentication, and confidentiality [124]. Availability, which refers
to the overall network uptime, is a crucial element in IoV. Given that vehicles depend
on traffic to make certain decisions, availability must be considered when selecting the
best solution to common threats. A lack of availability can lead to the total shutdown
of an IoV environment. Some of the most common attacks against availability are DoS,
Sensors 2024, 24, 368 22 of 37
jamming, and DDoS attacks. In [125], to detect malicious nodes that affect the availability
of vehicular networks, an algorithm for DoS attacks is proposed by detecting the sending
of irrelevant packets by malicious nodes. Data integrity refers to the incorruptible nature
of the information distributed in an IoV environment. In other words, the data received
and sent should be the same. The most common type of attack against data integrity is
the man-in-the-middle attack [126]. In [110], the use of trust models to identify malicious
nodes is recommended. Once the malicious nodes have been identified, their credentials
are revoked, thereby stopping the man-in-the-middle attack in its tracks. Confidentiality
refers to the nondisclosure of private information pertaining to the vehicle as well as the
user. Hackers are always on the lookout for loopholes they can exploit to access confidential
information and use it for sinister motives. For this reason, measures are put in place to
ensure that unauthorized individuals cannot access critical information such as the location
and routes of the vehicle. The most recognized type of attack against IoV is known as
eavesdropping. In [127], network specialists use models that generate false traffic packets
to mislead attackers. The false data packets shield roadside unit (RSU) hotspots from
unwarranted intrusions. Additionally, a real-time monitoring system for road conditions
can be used to prevent collision attacks, thus protecting confidential information from
potential attackers [128]. Lastly, authentication refers to the verification of user identities
or system identities in an IoV environment. The most common type of attack against
authentication is the Sybil attack. This type of attack can be addressed by grouping nodes
into various zones and eliminating the malicious nodes [129].
node attacks in VANET. By adapting KNN models to attack detectors, network features such
as IP addresses, delays, jitters, dropped packets, and throughput are learned. The authors
used an NS-3 network simulator to generate a multihop communication scenario, and the
result showed 99% accuracy. In [137], the authors proposed a scheme to detect jamming
attacks in a vehicular network. Recent work developed a data-centric misbehavior detection
system for IoVs. This research is unique in that it combines plausibility tests with traditional
supervised ML algorithms to improve detection accuracy. The authors evaluated the
performance of six supervised ML algorithms using location and movement plausibility
checks. With the added plausibility checks, the findings reveal a 5% and 2% gain in precision
and recall, respectively [138]. In IoV networks, real-time data integrity is dependent upon
the detection of data falsification. The IoT and ML are used to address vehicular network
(VN) security challenges in [139]. The study addresses backdoor, DDoS, and MITM attacks
and uses TON-IoT dataset ML algorithms for intrusion detection. Intrusion detection uses
RF, NB, and KNN machine learning. KNN has the highest accuracy, demonstrating ML’s
ability to detect VN attacks. In [140], the authors proposed an IDS scheme to classify normal
and malicious traffic messages in vehicle networks using eight supervised models. Their
scheme demonstrated high performance. The authors in [141] proposed a Randomized
Search Optimization Ensemble-based Falsification Detection Scheme (RSO-FDS) that uses
Random Forest (RF) as its primary model. This scheme’s efficacy in detecting falsification
attacks is demonstrated by the performance evaluation and addresses the detection of
falsification, which is necessary to maintain trust in the data shared between vehicles and
IoV services. These studies provided a foundation for enhancing the security of vehicular
networks and IoV with supervised machine learning. Future research should concentrate
on addressing all of these obstacles and expanding the applicability of these techniques to
situations in the real world.
learning signifies a significant advance in enhancing the integrity and safety of current
transportation systems.
Focused Solution ML
Citation Year Algorithm Attack Type Object
Area Technique Type
[136] 2019 SL KNN and SVM Malicious node attacks Detect malicious node
proposed in [158]. Intrusion detection system (IDS) classifiers are used for each vehicle
depending on a random forest algorithm, and each vehicle shares its knowledge with other
vehicles. The value of this algorithm is generated by the trust factor of the received classifier.
Over four types of attacks are classified with an F1 score of 97% and a 4% false-positive
rate by using a network security laboratory-knowledge discovery data mining (NSL-KDD)
dataset. In [159], the authors proposed a classification-based trust model (CTM) for IoV
to improve the security of the communication environment. They used an ML model to
indicate the vehicles as trusted or untrusted, which is a Naïve Bayes model. The model
gave a good answer for both the different kinds of vehicles and the trust factor. The authors
in [160] focused on identifying potential Sybil vehicles and protecting messages from Sybil
attacks. The proposed strategy integrates metaheuristic methods during the establishment
of communication to identify possible Sybil nodes and employs trust certification mecha-
nisms to guarantee the integrity of messages. The importance of employing a variety of
methods to properly prevent Sybil attacks is highlighted. The author in [161] investigated
the expanding field of IoV and the need for trust assessment schemes to defeat insider
assailants. For accurate trust assessment, precise weight assignment and the definition of
a minimum acceptable trust threshold are essential. The paper employs an IoT dataset,
adapted from CRAWDAD to an IoV format, comprising information on 18,226 interactions
among 76 nodes, both honest and dishonest. It computes important parameters, includ-
ing packet delivery ratio, familiarity, timeliness, and interaction frequency. Two feature
matrices are generated: FM1, which takes individual parameters into account as features,
and FM2, which averages pairwise computations for each parameter. Once the truth has
been established by unsupervised learning, supervised machine learning can be employed
for categorization. The results demonstrate that FM2 is superior at accurately classifying
dishonest vehicles. These references enhance trust and security techniques in vehicular
communication networks, addressing important difficulties and making VANETs and IoV
systems safer and more reliable. These research will likely develop and enhance these
models to address evolving threats.
Focused Solution ML
Citation Year Algorithm Attack Type Object
Area Technique Type
Various researchers have proposed numerous security solutions and trust schemes
for securing and establishing trust in IoV. Figure 6 shows that ML-based solutions are
more widely used than traditional solutions for detecting malicious nodes and attacks in
IoV networks, and they are widely used to improve trust and security. The percentage
of each ML-type solution is depicted in Figure 7. The objective of supervised learning is
to predict training data dependencies and find the solution to the issue presented in the
data. Unsupervised learning utilizes unlabeled data to recognize patterns. RL improves
efficiency monitoring and provides real-time data on the performance of an advanced
system. RL uses trial and error to test a model in order to learn it. Data collection in certain
IoT contexts can be a problem. RL is able to produce its own dataset [76,170]. ML plays a
critical role in helping autonomous vehicles make informed decisions. Despite its strengths,
ML faces a range of challenges such as failure in the detection of attacks, wrongly classified
Sensors 2024, 24, 368 29 of 37
objects, the recognition of driver monitoring patterns, vehicle theft, and compromised
functional safety [57,76,171,172].
6.4.3. Blockchains
In most IoV scenarios, blockchains can offer a wide variety of novel solutions. The ma-
jority of IoV scenarios involve the generation and interchange of a significant amount
of data, and the majority of conventional technologies are not suited for efficient utiliza-
tion in these types of scenarios. As blockchain research is still in its infancy, however,
the blockchain could enhance IoV’s trust, security, and privacy [165]. The use of blockchain
technology in IoV has great potential for protecting privacy. This is due to its privacy-
focused characteristics and the decentralized management of data. Future research should
focus on resolving issues with scalability, performance, and privacy to fully utilize these
advantages. It is essential to overcome these challenges to develop a secure and reliable
IoV environment.
7. Conclusions
The Internet of Vehicles presents a promising technology aimed at enhancing driving
comfort, improving energy management, securing data transmission, and preventing
road accidents. However, these advantages are accompanied by significant challenges,
particularly in the domains of security and trust. This survey discusses the critical role
of ML as a potent solution to address security concerns and trust management in an IoV
environment. We presented an overview of IoV and trust management, discussing security
requirements, challenges, and attacks. Additionally, we introduced a classification scheme
for ML techniques and surveyed IoV ML-based security and trust management schemes.
This survey highlights the significant role that ML technology can play in providing a secure
environment for the operations of IoV. Through an extensive study of diverse machine
learning methodologies and their practical implementations, such as supervised learning,
unsupervised learning, and reinforcement learning, we demonstrate the capability of
machine learning to effectively address security and trust challenges in IoV. ML technology
is increasingly recognized as an effective method for addressing the challenges posed by
malicious nodes and attacks on an IoV network when compared to conventional methods.
Sensors 2024, 24, 368 31 of 37
In order to protect the safety and security of drivers and users within IoV dynamic and
interconnected environments, it is crucial to adopt modern technologies such as machine
learning. To improve trust and security, future work should focus on real-time testing,
resilience against unknown attacks, blockchain integration, IoV and big data management,
and expanded dataset availability.
Author Contributions: Conceptualization, E.A. and I.M.; methodology, E.A.; software, E.A.; vali-
dation, E.A. and I.M.; formal analysis, E.A. and I.M; investigation, E.A. and I.M; writing—original
draft preparation, E.A.; writing—review and editing, I.M.; visualization, E.A.; supervision, I.M. All
authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Acknowledgments: This work is part of the Smart Drive initiative at Tecore Networks Lab at Florida
Atlantic University.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Zantalis, F.; Koulouras, G.; Karabetsos, S.; Kandris, D. A review of machine learning and IoT in smart transportation. Future
Internet 2019, 11, 94. [CrossRef]
2. Lee, I.; Lee, K. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus. Horizons 2015,
58, 431–440. [CrossRef]
3. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions.
Future Gener. Comput. Syst. 2013, 29, 1645–1660. [CrossRef]
4. Bhardwaj, I.; Khara, S. Research trends in architecture, security, services and applications of internet of vehicles (IOV). In
Proceedings of the 2018 International Conference on Computing, Power and Communication Technologies (GUCON), Greater
Noida, India, 28–29 September 2018; pp. 91–95.
5. Gerla, M.; Lee, E.K.; Pau, G.; Lee, U. Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds.
In Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Republic of Korea, 6–8 March 2014;
pp. 241–246.
6. Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular networking: A survey and tutorial on
requirements, architectures, challenges, standards and solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [CrossRef]
7. Ning, H.; Wang, Z. Future internet of things architecture: Like mankind neural system or social organization framework? IEEE
Commun. Lett. 2011, 15, 461–463. [CrossRef]
8. Nitti, M.; Girau, R.; Floris, A.; Atzori, L. On adding the social dimension to the internet of vehicles: Friendship and middleware.
In Proceedings of the 2014 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Odessa,
Ukraine, 27–30 May 2014; pp. 134–138.
9. Alam, K.M.; Saini, M.; El Saddik, A. Toward social internet of vehicles: Concept, architecture, and applications. IEEE Access 2015,
3, 343–357. [CrossRef]
10. Cheng, J.; Cheng, J.; Zhou, M.; Liu, F.; Gao, S.; Liu, C. Routing in internet of vehicles: A review. IEEE Trans. Intell. Transp. Syst.
2015, 16, 2339–2352. [CrossRef]
11. Datta, S.K.; Da Costa, R.P.F.; Härri, J.; Bonnet, C. Integrating connected vehicles in Internet of Things ecosystems: Challenges
and solutions. In Proceedings of the 2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia
Networks (WoWMoM), Coimbra, Portugal, 21–24 June 2016; pp. 1–6.
12. Yang, F.; Li, J.; Lei, T.; Wang, S. Architecture and key technologies for Internet of Vehicles: A survey. J. Commun. Inf. Networks
2017, 2, 1–17. [CrossRef]
13. Li, J.-L.; Liu, Z.-H.; Yang, F.-C. Internet of vehicles: The framework and key technology. J. Beijing Univ. Posts Telecommun. 2014,
37, 95.
14. Yang, F.; Wang, S.; Li, J.; Liu, Z.; Sun, Q. An overview of internet of vehicles. China Commun. 2014, 11, 1–15. [CrossRef]
15. Jiang, C.; Zhang, H.; Ren, Y.; Han, Z.; Chen, K.C.; Hanzo, L. Machine learning paradigms for next-generation wireless networks.
IEEE Wirel. Commun. 2016, 24, 98–105. [CrossRef]
16. Sun, Y.; Peng, M.; Zhou, Y.; Huang, Y.; Mao, S. Application of machine learning in wireless networks: Key techniques and open
issues. IEEE Commun. Surv. Tutor. 2019, 21, 3072–3108. [CrossRef]
Sensors 2024, 24, 368 32 of 37
17. Qayyum, A.; Usama, M.; Qadir, J.; Al-Fuqaha, A. Securing connected & autonomous vehicles: Challenges posed by adversarial
machine learning and the way forward. IEEE Commun. Surv. Tutor. 2020, 22, 998–1026.
18. Ghafari, S.M.; Beheshti, A.; Joshi, A.; Paris, C.; Mahmood, A.; Yakhchi, S.; Orgun, M.A. A survey on trust prediction in online
social networks. IEEE Access 2020, 8, 144292–144309. [CrossRef]
19. Jøsang, A.; Ismail, R.; Boyd, C. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 2007,
43, 618–644. [CrossRef]
20. Håkansson, P.; Witmer, H. Social media and trust: A systematic literature review. J. Bus. Econ. 2015, 6, 517–524. [CrossRef]
21. Truong, N.B.; Um, T.W.; Zhou, B.; Lee, G.M. From personal experience to global reputation for trust evaluation in the social
internet of things. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8
December 2017; pp. 1–7.
22. Soleymani, S.A.; Abdullah, A.H.; Hassan, W.H.; Anisi, M.H.; Goudarzi, S.; Rezazadeh Baee, M.A.; Mandala, S. Trust management
in vehicular ad hoc network: A systematic review. EURASIP J. Wirel. Commun. Netw. 2015, 2015, 146. [CrossRef]
23. Yu, Y.; Li, K.; Zhou, W.; Li, P. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. J. Netw.
Comput. Appl. 2012, 35, 867–880. [CrossRef]
24. Mohammadi, V.; Rahmani, A.M.; Darwesh, A.M.; Sahafi, A. Trust-based recommendation systems in Internet of Things: A
systematic literature review. Hum.-Centric Comput. Inf. Sci. 2019, 9, 1–61. [CrossRef]
25. Yan, Z.; Zhang, P.; Vasilakos, A.V. A security and trust framework for virtualized networks and software-defined networking.
Secur. Commun. Netw. 2016, 9, 3059–3069. [CrossRef]
26. Wang, Y.-H. A trust management model for internet of vehicles. In Proceedings of the 2020 4th International Conference on
Cryptography, Security and Privacy, Nanjing China, 10–12 January 2020; pp. 136–140.
27. Jayasinghe, U.; Otebolaku, A.; Um, T.W.; Lee, G.M. Data centric trust evaluation and prediction framework for IOT. In Proceedings
of the 2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K), Nanjing, China, 27–29 November 2017; pp. 1–7.
28. Mahmood, A.; Zhang, W.E.; Sheng, Q.Z.; Siddiqui, S.A.; Aljubairy, A. Trust management for software-defined heterogeneous
vehicular ad hoc networks. In Security, Privacy and Trust in the IoT Environment; Springer: Cham, Switzerland, 2019; pp. 203–226.
29. Mahmood, A.; Siddiqui, S.A.; Zhang, W.E.; Sheng, Q.Z. A Hybrid Trust Management Model for Secure and Resource Efficient
Vehicular Ad hoc Networks. In Proceedings of the 2019 20th International Conference on Parallel and Distributed Computing,
Applications and Technologies (PDCAT), Gold Coast, QLD, Australia, 5–7 December 2019; pp. 154–159.
30. Huang, X.; Yu, R.; Kang, J.; Zhang, Y. Distributed reputation management for secure and efficient vehicular edge computing and
networks. IEEE Access 2017, 5, 25408–25420. [CrossRef]
31. Jayasinghe, U.; Lee, G.M.; Um, T.W.; Shi, Q. Machine learning based trust computational model for IoT services. IEEE Trans.
Sustain. Comput. 2018, 4, 39–52. [CrossRef]
32. Xia, H.; Xiao, F.; Zhang, S.s.; Hu, C.q.; Cheng, X.z. Trustworthiness inference framework in the social Internet of Things: A
context-aware approach. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications, Paris,
France, 29 April–2 May 2019; pp. 838–846.
33. Lim, J.; Keum, D.; Ko, Y.B. A stepwise and hybrid trust evaluation scheme for tactical wireless sensor networks. Sensors 2020,
20, 1108. [CrossRef] [PubMed]
34. Suo, D.; Sarma, S.E. Real-time trust-building schemes for mitigating malicious behaviors in connected and automated vehicles.
In Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference (ITSC), Auckland, New Zealand, 27–30 October
2019; pp. 1142–1149.
35. Al Falasi, H.; Mohamed, N. Similarity-based trust management system for detecting fake safety messages in vanets. In
Proceedings of the Internet of Vehicles-Safe and Intelligent Mobility: Second International Conference, IOV 2015, Chengdu, China,
19–21 December 2015; Springer Berlin/Heidelberg, Germany, 2015; pp. 273–284.
36. Minhas, U.F.; Zhang, J.; Tran, T.; Cohen, R. Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J.
Comput. Intell. Theory Pract. 2010, 5, 3–15.
37. Li, X.; Liu, J.; Li, X.; Sun, W. RGTE: A reputation-based global trust establishment in VANETs. In Proceedings of the 2013 5th
International Conference on Intelligent Networking and Collaborative Systems, Xi’an, China, 9–11 September 2013; pp. 210–214.
38. Hu, H.; Lu, R.; Zhang, Z.; Shao, J. REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE
Trans. Veh. Technol. 2016, 66, 1786–1797. [CrossRef]
39. Jordan, M.I.; Mitchell, T.M. Machine learning: Trends, perspectives, and prospects. Science 2015, 349, 255–260. [CrossRef]
40. Huang, Y.; Chen, M. Improve reputation evaluation of crowdsourcing participants using multidimensional index and machine
learning techniques. IEEE Access 2019, 7, 118055–118067. [CrossRef]
41. Han, G.; He, Y.; Jiang, J.; Wang, N.; Guizani, M.; Ansere, J.A. A synergetic trust model based on SVM in underwater acoustic
sensor networks. IEEE Trans. Veh. Technol. 2019, 68, 11239–11247. [CrossRef]
42. Cherif, A.; Badhib, A.; Ammar, H.; Alshehri, S.; Kalkatawi, M.; Imine, A. Credit card fraud detection in the era of disruptive
technologies: A systematic review. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 145–174. [CrossRef]
43. Alsharif, B.; Altaher, A.S.; Altaher, A.; Ilyas, M.; Alalwany, E. Deep Learning Technology to Recognize American Sign Language
Alphabet. Sensors 2023, 23, 7970. [CrossRef]
Sensors 2024, 24, 368 33 of 37
44. Karimzadeh, M.; Vakanski, A.; Xian, M.; Zhang, B. Post-Hoc Explainability of BI-RADS Descriptors in a Multi-Task Framework
for Breast Cancer Detection and Segmentation. In Proceedings of the 2023 IEEE 33rd International Workshop on Machine
Learning for Signal Processing (MLSP), Rome, Italy, 17–20 September 2023; pp. 1–6.
45. Rolnick, D.; Donti, P.L.; Kaack, L.H.; Kochanski, K.; Lacoste, A.; Sankaran, K.; Ross, A.S.; Milojevic-Dupont, N.; Jaques, N.;
Waldman-Brown, A.; et al. Tackling climate change with machine learning. ACM Comput. Surv. (CSUR) 2022, 55, 1–96. [CrossRef]
46. Ye, H.; Liang, L.; Li, G.Y.; Kim, J.; Lu, L.; Wu, M. Machine learning for vehicular networks: Recent advances and application
examples. IEEE Veh. Technol. Mag. 2018, 13, 94–101. [CrossRef]
47. Tan, K.; Bremner, D.; Le Kernec, J.; Zhang, L.; Imran, M. Machine learning in vehicular networking: An overview. Digit. Commun.
Netw. 2022, 8, 18–24. [CrossRef]
48. Tang, Y.; Cheng, N.; Wu, W.; Wang, M.; Dai, Y.; Shen, X. Delay-minimization routing for heterogeneous VANETs with machine
learning based mobility prediction. IEEE Trans. Veh. Technol. 2019, 68, 3967–3979. [CrossRef]
49. Li, F.; Song, X.; Chen, H.; Li, X.; Wang, Y. Hierarchical routing for vehicular ad hoc networks via reinforcement learning. IEEE
Trans. Veh. Technol. 2018, 68, 1852–1865. [CrossRef]
50. Yuan, T.; Da Rocha Neto, W.; Rothenberg, C.E.; Obraczka, K.; Barakat, C.; Turletti, T. Machine learning for next-generation
intelligent transportation systems: A survey. Trans. Emerg. Telecommun. Technol. 2022, 33, e4427. [CrossRef]
51. Kim, I.H.; Bong, J.H.; Park, J.; Park, S. Prediction of driver’s intention of lane change by augmenting sensor information using
machine learning techniques. Sensors 2017, 17, 1350. [CrossRef]
52. Caruana, R.; Niculescu-Mizil, A. An empirical comparison of supervised learning algorithms. In Proceedings of the 23rd
International Conference on Machine Learning, Pittsburgh, PA, USA, 25–29 June 2006; pp. 161–168.
53. Alotaibi, Y.; Ilyas, M. Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things’ Devices Security.
Sensors 2023, 23, 5568. [CrossRef]
54. Alloghani, M.; Al-Jumeily, D.; Mustafina, J.; Hussain, A.; Aljaaf, A.J. A systematic review on supervised and unsupervised
machine learning algorithms for data science. In Supervised and Unsupervised Learning for Data Science; Springer: Cham,
Switzerland, 2020; pp. 3–21.
55. Akanksha, E.; Sharma, N.; Gulati, K. Review on reinforcement learning, research evolution and scope of application. In
Proceedings of the 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India,
8–10 April 2021; pp. 1416–1423.
56. Zhou, Z.; Oguz, O.S.; Leibold, M.; Buss, M. A general framework to increase safety of learning algorithms for dynamical systems
based on region of attraction estimation. IEEE Trans. Robot. 2020, 36, 1472–1490. [CrossRef]
57. Talpur, A.; Gurusamy, M. Machine learning for security in vehicular networks: A comprehensive survey. IEEE Commun. Surv.
Tutor. 2021, 24, 346–379. [CrossRef]
58. Sun, Y.; Wu, L.; Wu, S.; Li, S.; Zhang, T.; Zhang, L.; Xu, J.; Xiong, Y. Security and Privacy in the Internet of Vehicles. In Proceedings
of the 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), Beijing, China,
22–23 October 2015; pp. 116–121.
59. Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.J.; Park, Y. Authentication protocols in internet of vehicles: Taxonomy, analysis, and
challenges. IEEE Access 2020, 8, 54314–54344. [CrossRef]
60. Samad, A.; Alam, S.; Mohammed, S.; Bhukhari, M. Internet of vehicles (IoV) requirements, attacks and countermeasures. In
Proceedings of the 12th INDIACom—5th International Conference on Computing for Sustainable Global Development, New
Delhi, India, 14–16 March 2018; pp. 1–4.
61. Daeinabi, A.; Rahbar, A.G. Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks. Multimed.
Tools Appl. 2013, 66, 325–338. [CrossRef]
62. Mokhtar, B.; Azab, M. Survey on security issues in vehicular ad hoc networks. Alex. Eng. J. 2015, 54, 1115–1126. [CrossRef]
63. Sun, Y.; Wu, L.; Wu, S.; Li, S.; Zhang, T.; Zhang, L.; Xu, J.; Xiong, Y.; Cui, X. Attacks and countermeasures in the internet of
vehicles. Ann. Telecommun. 2017, 72, 283–295. [CrossRef]
64. Lu, Z.; Qu, G.; Liu, Z. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp.
Syst. 2018, 20, 760–776. [CrossRef]
65. Sharma, S.; Kaushik, B. A survey on internet of vehicles: Applications, security issues & solutions. Veh. Commun. 2019, 20, 100182.
66. Wang, J.; Jing, X.; Yan, Z.; Fu, Y.; Pedrycz, W.; Yang, L.T. A survey on trust evaluation based on machine learning. ACM Comput.
Surv. (CSUR) 2020, 53, 1–36. [CrossRef]
67. Garg, T.; Kagalwalla, N.; Churi, P.; Pawar, A.; Deshmukh, S. A survey on security and privacy issues in IoV. Int. J. Electr. Comput.
Eng. (2088-8708) 2020, 10 5409–5419. [CrossRef]
68. Rehman, A.; Hassan, M.F.; Yew, K.H.; Paputungan, I.; Tran, D.C. State-of-the-art IoV trust management a meta-synthesis
systematic literature review (SLR). PeerJ Comput. Sci. 2020, 6, e334. [CrossRef]
69. Sharma, S.; Kaushik, B. A survey on nature-inspired algorithms and its applications in the Internet of Vehicles. Int. J. Commun.
Syst. 2021, 34, e4895. [CrossRef]
70. Mchergui, A.; Moulahi, T.; Zeadally, S. Survey on artificial intelligence (AI) techniques for vehicular ad-hoc networks (VANETs).
Veh. Commun. 2022, 34, 100403. [CrossRef]
71. Guo, J.; Bilal, M.; Qiu, Y.; Qian, C.; Xu, X.; Choo, K.K.R. Survey on digital twins for Internet of Vehicles: Fundamentals, challenges,
and opportunities. Digit. Commun. Netw. 2022. [CrossRef]
Sensors 2024, 24, 368 34 of 37
72. Abuarqoub, A.; Alzu’bi, A.; Hammoudeh, M.; Ahmad, A.; Al-Shargabi, B. A Survey on Vehicular Ad hoc Networks Security
Attacks and Countermeasures. In Proceedings of the 6th International Conference on Future Networks & Distributed Systems,
Tashkent, Uzbekistan, 15 December 2022; pp. 701–707.
73. Garg, A.; Chauhan, A.; Shambharkar, P.G. Security Threats & Attacks in IoV Environment: Open Research Issues and Challenges.
In Proceedings of the 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies
(ICICICT), Kannur, India, 11–12 August 2022; pp. 803–810.
74. Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet security challenges and solutions: A survey. Veh. Commun. 2017, 7, 7–20.
[CrossRef]
75. Fadhil, J.A.; Sarhan, Q.I. Internet of Vehicles (IoV): A survey of challenges and solutions. In Proceedings of the 2020 21st
International Arab Conference on Information Technology (ACIT), Giza, Egypt, 28–30 November 2020; pp. 1–10.
76. Uprety, A.; Rawat, D.B. Reinforcement learning for iot security: A comprehensive survey. IEEE Internet Things J. 2020, 8, 8693–8706.
[CrossRef]
77. Tanwar, S.; Vora, J.; Tyagi, S.; Kumar, N.; Obaidat, M.S. A systematic review on security issues in vehicular ad hoc network. Secur.
Priv. 2018, 1, e39. [CrossRef]
78. Shahid, M.A.; Jaekel, A.; Ezeife, C.; Al-Ajmi, Q.; Saini, I. Review of potential security attacks in VANET. In Proceedings of the
2018 Majan International Conference (MIC), Muscat, Oman, 19–20 March 2018; pp. 1–4.
79. Cheng, X.; Zhang, R.; Yang, L. Wireless toward the era of intelligent vehicles. IEEE Internet Things J. 2018, 6, 188–202. [CrossRef]
80. Zhang, W.; Xi, X. The innovation and development of Internet of Vehicles. China Commun. 2016, 13, 122–127. [CrossRef]
81. Zheng, K.; Zheng, Q.; Chatzimisios, P.; Xiang, W.; Zhou, Y. Heterogeneous vehicular networking: A survey on architecture,
challenges, and solutions. IEEE Commun. Surv. Tutor. 2015, 17, 2377–2396. [CrossRef]
82. Contreras-Castillo, J.; Zeadally, S.; Guerrero Ibáñez, J.A. A seven-layered model architecture for Internet of Vehicles. J. Inf.
Telecommun. 2017, 1, 4–22. [CrossRef]
83. Darwish, T.S.; Bakar, K.A. Fog based intelligent transportation big data analytics in the internet of vehicles environment:
Motivations, architecture, challenges, and critical issues. IEEE Access 2018, 6, 15679–15701. [CrossRef]
84. Lopez, H.J.D.; Siller, M.; Huerta, I. Internet of vehicles: Cloud and fog computing approaches. In Proceedings of the 2017
IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Bari, Italy, 18–20 September 2017;
pp. 211–216.
85. Liu, N. Internet of Vehicles: Your next connection. Huawei WinWin 2011, 11, 23–28.
86. Gandotra, P.; Jha, R.K.; Jain, S. A survey on device-to-device (D2D) communication: Architecture and security issues. J. Netw.
Comput. Appl. 2017, 78, 9–29. [CrossRef]
87. Liu, K.; Xu, X.; Chen, M.; Liu, B.; Wu, L.; Lee, V.C. A hierarchical architecture for the future internet of vehicles. IEEE Commun.
Mag. 2019, 57, 41–47. [CrossRef]
88. Wu, W.; Yang, Z.; Li, K. Internet of Vehicles and applications. In Internet of Things; Elsevier: Amsterdam, The Netherlands, 2016;
pp. 299–317.
89. Wan, J.; Zhang, D.; Zhao, S.; Yang, L.T.; Lloret, J. Context-aware vehicular cyber-physical systems with cloud support: Architecture,
challenges, and solutions. IEEE Commun. Mag. 2014, 52, 106–113. [CrossRef]
90. Mahmood, Z. Connected vehicles in the IoV: Concepts, technologies and architectures. In Connected Vehicles in the Internet of
Things: Concepts, Technologies and Frameworks for the IoV; Springer: Berlin/Heidelberg, Germany, 2020; pp. 3–18.
91. Peng, H. Connected and automated vehicles: The roles of dynamics and control. Mech. Eng. 2016, 138, S4. [CrossRef]
92. Qureshi, K.N.; Din, S.; Jeon, G.; Piccialli, F. Internet of vehicles: Key technologies, network model, solutions and challenges with
future aspects. IEEE Trans. Intell. Transp. Syst. 2020, 22, 1777–1786. [CrossRef]
93. Thakur, A.; Malekian, R. Fog computing for detecting vehicular congestion, an internet of vehicles based approach: A review.
IEEE Intell. Transp. Syst. Mag. 2019, 11, 8–16. [CrossRef]
94. Huang, C.; Lu, R.; Choo, K.K.R. Vehicular fog computing: Architecture, use case, and security and forensic challenges. IEEE
Commun. Mag. 2017, 55, 105–111. [CrossRef]
95. Wazid, M.; Bagga, P.; Das, A.K.; Shetty, S.; Rodrigues, J.J.; Park, Y. AKM-IoV: Authenticated key management protocol in fog
computing-based Internet of vehicles deployment. IEEE Internet Things J. 2019, 6, 8804–8817. [CrossRef]
96. Vishwanath, A.; Peruri, R.; He, J.S. Security in Fog Computing through Encryption; DigitalCommons@ Kennesaw State University:
Kennesaw, GA, USA, 2016.
97. Khan, S.; Parkinson, S.; Qin, Y. Fog computing security: A review of current applications and security solutions. J. Cloud Comput.
2017, 6, 1–22. [CrossRef]
98. Lin, C.C.; Deng, D.J.; Yao, C.C. Resource allocation in vehicular cloud computing systems with heterogeneous vehicles and
roadside units. IEEE Internet Things J. 2017, 5, 3692–3700. [CrossRef]
99. Xu, W.; Shi, W.; Lyu, F.; Zhou, H.; Cheng, N.; Shen, X. Throughput analysis of vehicular internet access via roadside WiFi hotspot.
IEEE Trans. Veh. Technol. 2019, 68, 3980–3991. [CrossRef]
100. Gür, G.; Bahtiyar, Ş.; Alagöz, F. Security analysis of computer networks: Key concepts and methodologies. In Modeling and
Simulation of Computer Networks and Systems; Elsevier: Amsterdam, The Netherlands, 2015; pp. 861–898.
101. Kim, S. Blockchain for a trust network among intelligent vehicles. In Advances in Computers; Elsevier: Amsterdam, The
Netherlands, 2018; Volume 111, pp. 43–68.
Sensors 2024, 24, 368 35 of 37
102. Tangade, S.S.; Manvi, S.S. A survey on attacks, security and trust management solutions in VANETs. In Proceedings of the 2013
Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India,
4–6 July 2013; pp. 1–6.
103. Manvi, S.S.; Tangade, S. A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 2017,
9, 19–30. [CrossRef]
104. Sharma, N.; Chauhan, N.; Chand, N. Security challenges in Internet of Vehicles (IoV) environment. In Proceedings of the 2018
First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, 15–17 December
2018; pp. 203–207.
105. La, V.H.; Cavalli, A.R. Security attacks and solutions in vehicular ad hoc networks: A survey. Int. J. AdHoc Netw. Syst. (IJANS)
2014, 4, 1–20. [CrossRef]
106. Rawat, A.; Sharma, S.; Sushil, R. VANET: Security attacks and its possible solutions. J. Inf. Oper. Manag. 2012, 3, 301–304.
107. Kim, Y.; Kim, I.; Shim, C.Y. A taxonomy for DOS attacks in VANET. In Proceedings of the 2014 14th International Symposium on
Communications and Information Technologies (ISCIT), Incheon, Republic of Korea, 24–26 September 2014; pp. 26–27.
108. Bariah, L.; Shehada, D.; Salahat, E.; Yeun, C.Y. Recent advances in VANET security: A survey. In Proceedings of the 2015 IEEE
82nd Vehicular Technology Conference (VTC2015-fall), Boston, MA, USA, 6–9 September 2015; pp. 1–7.
109. Gai, F.; Zhang, J.; Zhu, P.; Jiang, X. Ratee-based trust management system for internet of vehicles. In Proceedings of the Wireless
Algorithms, Systems, and Applications: 12th International Conference, WASA 2017, Guilin, China, 19–21 June 2017; Springer:
Berlin/Heidelberg, Germany, 2017; pp. 344–355.
110. Ahmad, F.; Kurugollu, F.; Adnane, A.; Hussain, R.; Hussain, F. MARINE: Man-in-the-middle attack resistant trust model in
connected vehicles. IEEE Internet Things J. 2020, 7, 3310–3322. [CrossRef]
111. Arellano, W.; Mahgoub, I. TrafficModeler extensions: A case for rapid VANET simulation using, OMNET++, SUMO, and VEINS.
In Proceedings of the 2013 High Capacity Optical Networks and Emerging/Enabling Technologies, Magosa, Cyprus, 11–13
December 2013; pp. 109–115.
112. Krajzewicz, D.; Erdmann, J.; Behrisch, M.; Bieker, L. Recent development and applications of SUMO-Simulation of Urban
MObility. Int. J. Adv. Syst. Meas. 2012, 5, 128–138.
113. Sommer, C.; Eckhoff, D.; Brummer, A.; Buse, D.S.; Hagenauer, F.; Joerer, S.; Segata, M. Veins: The open source vehicular network
simulation framework. In Recent Advances in Network Simulation: The OMNeT++ Environment and Its Ecosystem; Springer: Cham,
Switzerland, 2019; pp. 215–252.
114. Zhang, J.; Zheng, K.; Zhang, D.; Yan, B. AATMS: An anti-attack trust management scheme in VANET. IEEE Access 2020,
8, 21077–21090. [CrossRef]
115. Guleng, S.; Wu, C.; Chen, X.; Wang, X.; Yoshinaga, T.; Ji, Y. Decentralized trust evaluation in vehicular Internet of Things. IEEE
Access 2019, 7, 15980–15988. [CrossRef]
116. Rehmani, M.H.; Saleem, Y. Network simulator NS-2. In Encyclopedia of Information Science and Technology, 3rd ed.; IGI Global:
Hershey, PA, USA, 2015; pp. 6249–6258.
117. Joy, J.; Rabsatt, V.; Gerla, M. Internet of Vehicles: Enabling safe, secure, and private vehicular crowdsourcing. Internet Technol.
Lett. 2018, 1, e16. [CrossRef]
118. Yao, Y.; Xiao, B.; Wu, G.; Liu, X.; Yu, Z.; Zhang, K.; Zhou, X. Multi-channel based Sybil attack detection in vehicular ad hoc
networks using RSSI. IEEE Trans. Mob. Comput. 2018, 18, 362–375. [CrossRef]
119. Tayeb, S.; Pirouz, M.; Esguerra, G.; Ghobadi, K.; Huang, J.; Hill, R.; Lawson, D.; Li, S.; Zhan, T.; Zhan, J.; et al. Securing the
positioning signals of autonomous vehicles. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data),
Boston, MA, USA, 11–14 December 2017; pp. 4522–4528.
120. Abbas, S.; Faisal, M.; Rahman, H.U.; Khan, M.Z.; Merabti, M. Masquerading attacks detection in mobile ad hoc networks. IEEE
Access 2018, 6, 55013–55025. [CrossRef]
121. Rawat, D.B.; Garuba, M.; Chen, L.; Yang, Q. On the security of information dissemination in the Internet-of-Vehicles. Tsinghua Sci.
Technol. 2017, 22, 437–445. [CrossRef]
122. Wang, C.; Zhao, Z.; Gong, L.; Zhu, L.; Liu, Z.; Cheng, X. A distributed anomaly detection system for in-vehicle network using
HTM. IEEE Access 2018, 6, 9091–9098. [CrossRef]
123. Dua, A.; Kumar, N.; Das, A.K.; Susilo, W. Secure message communication protocol among vehicles in smart city. IEEE Trans. Veh.
Technol. 2017, 67, 4359–4373. [CrossRef]
124. Osibo, B.K.; Zhang, C.; Xia, C.; Zhao, G.; Jin, Z. Security and privacy in 5G internet of vehicles (IoV) environment. J. Internet
Things 2021, 3, 77. [CrossRef]
125. Kumar, S.; Mann, K.S. Prevention of DoS attacks by detection of multiple malicious nodes in VANETs. In Proceedings of the 2019
International Conference on Automation, Computational and Technology Management (ICACTM), London, UK, 24–26 April
2019; pp. 89–94.
126. Ahmad, F.; Adnane, A.; Franqueira, V.N.; Kurugollu, F.; Liu, L. Man-in-the-middle attacks in vehicular ad-hoc networks:
Evaluating the impact of attackers’ strategies. Sensors 2018, 18, 4040. [CrossRef]
127. Huang, X.; Yu, R.; Pan, M.; Shu, L. Secure roadside unit hotspot against eavesdropping based traffic analysis in edge computing
based internet of vehicles. IEEE Access 2018, 6, 62371–62383. [CrossRef]
Sensors 2024, 24, 368 36 of 37
128. Baruah, B.; Dhal, S. A Secure and privacy-preserved road condition monitoring system. In Proceedings of the 2020 International
Conference on COMmunication Systems & NETworkS (COMSNETS), Bengaluru, India, 7–11 January 2020; pp. 594–597.
129. Vadhana Kumari, S.; Paramasivan, B. Defense against Sybil attacks and authentication for anonymous location-based routing in
MANET. Wirel. Netw. 2017, 23, 715–726. [CrossRef]
130. Andrea, I.; Chrysostomou, C.; Hadjichristofi, G. Internet of Things: Security vulnerabilities and challenges. In Proceedings of the
2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 180–187.
131. Feltus, C. Current and future RL’s contribution to emerging network security. Procedia Comput. Sci. 2020, 177, 516–521. [CrossRef]
132. Biswas, S.K. Intrusion detection using machine learning: A comparison study. Int. J. Pure Appl. Math. 2018, 118, 101–114.
133. Wu, M.; Song, Z.; Moon, Y.B. Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods.
J. Intell. Manuf. 2019, 30, 1111–1123. [CrossRef]
134. Nguyen, T.T.; Reddi, V.J. Deep reinforcement learning for cyber security. IEEE Trans. Neural Netw. Learn. Syst. 2021, 34, 3779–3795.
[CrossRef] [PubMed]
135. Gyawali, S.; Qian, Y. Misbehavior detection using machine learning in vehicular communication networks. In Proceedings of the
ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6.
136. Singh, P.K.; Gupta, R.R.; Nandi, S.K.; Nandi, S. Machine learning based approach to detect wormhole attack in VANETs. In Web,
Artificial Intelligence and Network Applications: Proceedings of the Workshops of the 33rd International Conference on Advanced Information
Networking and Applications (WAINA-2019), Matsue, Japan, 27–29 March 2019; Springer: Cham, Switzerland, 2019; pp. 651–661.
137. Kumar, S.; Singh, K.; Kumar, S.; Kaiwartya, O.; Cao, Y.; Zhou, H. Delimitated anti jammer scheme for Internet of vehicle: Machine
learning based security approach. IEEE Access 2019, 7, 113311–113323. [CrossRef]
138. Sharma, P.; Liu, H. A machine-learning-based data-centric misbehavior detection model for internet of vehicles. IEEE Internet
Things J. 2020, 8, 4991–4999. [CrossRef]
139. Sharma, A.; Babbar, H.; Sharma, A. Ton-iot: Detection of attacks on internet of things in vehicular networks. In Proceedings of the
2022 6th International Conference on Electronics, Communication and Aerospace Technology, Coimbatore, India, 1–3 December
2022; pp. 539–545.
140. Alalwany, E.; Mahgoub, I. Classification of Normal and Malicious Traffic Based on an Ensemble of Machine Learning for a Vehicle
CAN-Network. Sensors 2022, 22, 9195. [CrossRef]
141. Anyanwu, G.O.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Falsification Detection System for IoV Using Randomized Search
Optimization Ensemble Algorithm. IEEE Trans. Intell. Transp. Syst. 2023, 24, 4158–4172. [CrossRef]
142. Lokman, S.F.; Othman, A.T.; Musa, S.; Abu Bakar, M.H. Deep contractive autoencoder-based anomaly detection for in-vehicle
controller area network (CAN). In Progress in Engineering Technology: Automotive, Energy Generation, Quality Control and Efficiency;
Springer: Cham, Switzerland, 2019; pp. 195–205.
143. D’Angelo, G.; Castiglione, A.; Palmieri, F. A cluster-based multidimensional approach for detecting attacks on connected vehicles.
IEEE Internet Things J. 2020, 8, 12518–12527. [CrossRef]
144. El Attar, A.; Fadlallah, A.; Chbib, F.; Khatoun, R. Unsupervised Learning Algorithms for Denial of Service Detection in Vehicular
Networks. In Proceedings of the 2022 International Conference on Electrical, Computer, Communications and Mechatronics
Engineering (ICECCME), Maldives, 16–18 November 2022; pp. 1–7.
145. Valentini, E.P.; Rocha Filho, G.P.; De Grande, R.E.; Ranieri, C.M.; Pereira, L.A.; Meneguette, R.I. A Novel Mechanism for
Misbehaviour Detection in Vehicular Networks. IEEE Access 2023, 11, 68113–68126. [CrossRef]
146. Lu, X.; Wan, X.; Xiao, L.; Tang, Y.; Zhuang, W. Learning-based rogue edge detection in VANETs with ambient radio signals.
In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018;
pp. 1–6.
147. Gu, T.; Abhishek, A.; Fu, H.; Zhang, H.; Basu, D.; Mohapatra, P. Towards learning-automation IoT attack detection through
reinforcement learning. In Proceedings of the 2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and
Multimedia Networks” (WoWMoM), Cork, Ireland, 31 August–3 September 2020; pp. 88–97.
148. Chinchali, S.; Hu, P.; Chu, T.; Sharma, M.; Bansal, M.; Misra, R.; Pavone, M.; Katti, S. Cellular network traffic scheduling with
deep reinforcement learning. In Proceedings of the AAAI Conference on Artificial Intelligence, New Orleans, LA, USA, 2–7
February 2018; Volume 32.
149. Ferdowsi, A.; Saad, W. Deep learning for signal authentication and security in massive internet-of-things systems. IEEE Trans.
Commun. 2018, 67, 1371–1387. [CrossRef]
150. Lopez-Martin, M.; Carro, B.; Sanchez-Esguevillas, A. Application of deep reinforcement learning to intrusion detection for
supervised problems. Expert Syst. Appl. 2020, 141, 112963. [CrossRef]
151. Sherazi, H.H.R.; Iqbal, R.; Ahmad, F.; Khan, Z.A.; Chaudary, M.H. DDoS attack detection: A key enabler for sustainable
communication in internet of vehicles. Sustain. Comput. Informatics Syst. 2019, 23, 13–20. [CrossRef]
152. Xu, Y.; Lei, M.; Li, M.; Zhao, M.; Hu, B. A new anti-jamming strategy based on deep reinforcement learning for MANET. In
Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May
2019; pp. 1–5.
153. Sedar, R.; Kalalas, C.; Vázquez-Gallego, F.; Alonso-Zarate, J. Reinforcement learning based misbehavior detection in vehicular
networks. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20
May 2022; pp. 3550–3555.
Sensors 2024, 24, 368 37 of 37
154. Talpur, A.; Gurusamy, M. On Attack-Resilient Service Placement and Availability in Edge-Enabled IoV Networks. IEEE Trans.
Intell. Transp. Syst. 2023, 24, 6244–6256. [CrossRef]
155. Eziama, E.; Tepe, K.; Balador, A.; Nwizege, K.S.; Jaimes, L.M. Malicious node detection in vehicular ad-hoc network using
machine learning and deep learning. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United
Arab Emirates, 9–13 December 2018; pp. 1–6.
156. Eziama, E.; Ahmed, S.; Ahmed, S.; Awin, F.; Tepe, K. Detection of adversary nodes in machine-to-machine communication
using machine learning based trust model. In Proceedings of the 2019 IEEE International Symposium on Signal Processing and
Information Technology (ISSPIT), Ajman, United Arab Emirates, 10–12 December 2019; pp. 1–6.
157. Montenegro, J.; Iza, C.; Aguilar Igartua, M. Detection of position falsification attacks in VANETs applying trust model and
machine learning. In Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, &
Ubiquitous Networks, Alicante, Spain, 16–20 November 2020; pp. 9–16.
158. Ghaleb, A.F.; Saeed, F.; Al-Sarem, M.; Ali Saleh Al-rimy, B.; Boulila, W.; Eljialy, A.E.M.; Aloufi, K.; Alazab, M. Misbehavior-aware
on-demand collaborative intrusion detection system using distributed ensemble learning for VANET. Electronics 2020, 9, 1411.
[CrossRef]
159. Manogaran, G.; Rawal, B.S. Machine learning based trust model for secure internet of vehicle data exchange. In Proceedings of
the 2020 IEEE Globecom Workshops (GC Wkshps), Taipei, Taiwan, 7–11 December 2020; pp. 1–6.
160. Faisal, S.M.; Gupta, B.K.; Zaidi, T. A hybrid framework to prevent VANET from Sybil Attack. In Proceedings of the 2022 5th
International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), Aligarh, India, 26–27
November 2022; pp. 1–6.
161. Siddiqui, S.A.; Mahmood, A.; Sheng, Q.Z.; Suzuki, H.; Ni, W. Towards a Machine Learning Driven Trust Management Heuristic
for the Internet of Vehicles. Sensors 2023, 23, 2325. [CrossRef] [PubMed]
162. Kamel, J.; Haidar, F.; Jemaa, I.B.; Kaiser, A.; Lonc, B.; Urien, P. A misbehavior authority system for sybil attack detection in
c-its. In Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference
(UEMCON), New York, NY, USA, 10–12 October 2019; pp. 1117–1123.
163. Tangade, S.; Manvi, S.S.; Hassan, S. A deep learning based driver classification and trust computation in VANETs. In Proceedings
of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA, 22–25 September 2019; pp. 1–6.
164. Siddiqui, S.A.; Mahmood, A.; Zhang, W.E.; Sheng, Q.Z. Machine learning based trust model for misbehaviour detection in
internet-of-vehicles. In Neural Information Processing: 26th International Conference, ICONIP 2019, Sydney, NSW, Australia, 12–15
December 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 512–520.
165. Huang, F.; Li, Q.; Zhao, J. Trust Management Model of VANETs Based on Machine Learning and Active Detection Technology. In
Proceedings of the 2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops), Foshan, China,
11–13 August 2022; pp. 412–416.
166. Aref, A.; Tran, T. A hybrid trust model using reinforcement learning and fuzzy logic. Comput. Intell. 2018, 34, 515–541. [CrossRef]
167. Wang, W.; Min, M.; Xiao, L.; Chen, Y.; Dai, H. Protecting semantic trajectory privacy for VANET with reinforcement learning. In
Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019;
pp. 1–5.
168. Guo, J.; Li, X.; Liu, Z.; Ma, J.; Yang, C.; Zhang, J.; Wu, D. TROVE: A context-awareness trust model for VANETs using reinforcement
learning. IEEE Internet Things J. 2020, 7, 6647–6662. [CrossRef]
169. Zhang, B.; Wang, X.; Xie, R.; Li, C.; Zhang, H.; Jiang, F. A reputation mechanism based Deep Reinforcement Learning and
blockchain to suppress selfish node attack motivation in Vehicular Ad-Hoc Network. Future Gener. Comput. Syst. 2023, 139, 17–28.
[CrossRef]
170. Kachalsky, I.; Zakirzyanov, I.; Ulyantsev, V. Applying reinforcement learning and supervised learning techniques to play
hearthstone. In Proceedings of the 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA),
Cancun, Mexico, 18–21 December 2017; pp. 1145–1148.
171. García, J.; Majadas, R.; Fernández, F. Learning adversarial attack policies through multi-objective reinforcement learning. Eng.
Appl. Artif. Intell. 2020, 96, 104021. [CrossRef]
172. Qu, X.; Sun, Z.; Ong, Y.S.; Gupta, A.; Wei, P. Minimalistic attacks: How little it takes to fool deep reinforcement learning policies.
IEEE Trans. Cogn. Dev. Syst. 2020, 13, 806–817. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.