2022
DOI: 10.1109/comst.2021.3129079
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Security in Vehicular Networks: A Comprehensive Survey

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
27
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 46 publications
(28 citation statements)
references
References 185 publications
1
27
0
Order By: Relevance
“…To avoid hacking and car theft, the vehicle must ensure that the driver's identity and profile are valid. A recent study carried out by Talpur and Gurusamy [176] to categorize ML techniques based on their utilization in V2X applications and methodologies, along with the working principles of these ML techniques in solving various security concerns, including attacks, privacy, trust, intrusion detection, and driver identification/fingerprinting, were reviewed. Not long ago, Martinelli et al [177] demonstrated how ML algorithms may help distinguish between genuine automobile owners and reprobates using features from the CAN.…”
Section: G Vehicular Forensicsmentioning
confidence: 99%
“…To avoid hacking and car theft, the vehicle must ensure that the driver's identity and profile are valid. A recent study carried out by Talpur and Gurusamy [176] to categorize ML techniques based on their utilization in V2X applications and methodologies, along with the working principles of these ML techniques in solving various security concerns, including attacks, privacy, trust, intrusion detection, and driver identification/fingerprinting, were reviewed. Not long ago, Martinelli et al [177] demonstrated how ML algorithms may help distinguish between genuine automobile owners and reprobates using features from the CAN.…”
Section: G Vehicular Forensicsmentioning
confidence: 99%
“…The continuous interaction of DRL with the environment makes it more vulnerable than other ML techniques. Data poisoning attacks like label flipping, backdoor attack, and model poisoning attack are very common adversarial attacks on DRL and are explored in the literature for IoV applications [3]. In a recent work, the authors provide a comprehensive survey on various attacks on DRL [6].…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, we propose an attack detection framework against Sybil-based data poisoning attacks in the context of DRL-based mechanisms in IoV applications. Several adversarial data poisoning attacks like adversarial random noises, data flipping and backdoor attacks, are common and explored in the literature for vehicular applications [3], [6]. Different from the existing works, we use Sybil-based adversarial attacks.…”
Section: B Attack Modelmentioning
confidence: 99%
“…Predicting the position of the vehicle is difficult • Rapidly Changing network topology: In VANETs, as vehicles travel at a random pace and in diverse directions, the location of vehicles will vary greatly due to their speed and motion. Within a short amount of time, nodes might leave/join the network and it directly affects the network topology • Unlimited battery power: Vehicles in MANETs travel with their batteries, so the network components don't have to rely on a restricted power source to perform effectively • Unbounded Network size: The size of a network is not restricted to a certain range • Frequent Exchange of Information: Real-time information captured in the network is required to be exchanged among vehicles and Road Side Units (RSUs) on a frequent basis to take important runtime decisions with minimum errors • Wireless communication: Vehicles are wirelessly connected with one another and with the RSUs to facilitate the exchange of information within the network • Time Critical: As vehicle driving is a time-sensitive application, it is required to minimize the delay in data transfer and hence, the information must be provided to the vehicles within a certain time frame • Physical protection: Vehicles are considered network nodes in VANETs and hence, their physical safety is also important for uninterrupted network operations [9]. Adversaries might attempt to make a physical compromise by launching physical attacks on the nodes…”
Section: Characteristics Of Vanetsmentioning
confidence: 99%