Review Article

Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications

Table 3

Summary for secure IoV communications.

YearSourceApproachesFeaturesAdvantagesChallengesCitations

2020IEEEFog-based identity authentication (FBIA)Fog-based identity authentication scheme and deep learningIoV real-time security monitoringDual authentication levels for access authentication and vehicles’ timing detectionSong et al. [86]
2020IEEESVM-based classifierAuthentication scheme based on SVMSecure access frequencies and progressive protection of trusted communicationsFast authentication mechanism for large-scale IoVHasan et al. [83]
2018IEEECertificateless Short Signature Scheme (CLSS) and MLAnonymous authentication scheme-based MLSecure communication between vehicles and roadside unitsSecurity under adaptively chosen message and ID attacksLiu et al. [80]
2017IEEEAggregate privacy-preserving authentication protocol; Multiplicative Secret Sharing (MSS) techniqueDistributed aggregate signature mechanismSecure vehicular network authentication and trusted authorityTrade-off between security and storage resource managementMemon et al. [81]
2016ElsevierSmart Adaptive Data Aggregation (SADA); machine learning-based data fusion and analysisAdaptive data aggregation-based MLSecure data exchange between vehiclesFully automated switching to unknown vehicleIslam et al. [82]