Systematic Review on Cybersecurity in the Internet of Vehicles (IoV)

Authors

  • Nishu Kumari Department of Computer Science and Engineering, Meerut Institute of Technology, Meerut, India Author
  • Shashank Jha Computer Science and Application, COER University, Roorkee, Uttarakhand, India Author
  • Beer Singh Department of Information Technology,Shree Ramswaroop Memorial College of Engineering and Management Lucknow Author
  • Pawan Kumar Computer Science and Application, COER University, Roorkee, Uttarakhand, India Author
  • Prashant Computer Science and Application, COER University, Roorkee, Uttarakhand, India Author

DOI:

https://doi.org/10.70454/JRIST.2025.10104

Keywords:

Cybersecurity, Internet of Vehicles, Internet of Things , Vehicular Ad Hoc Networks

Abstract

The Internet of Vehicles (IoV) represents a critical evolution in intelligent transportation systems. It is a key advancement in intelligent transportation systems, where vehicles connect and communicate effectively with each other, utilizing great infrastructure that enables real-time data exchange and various advanced features. The paper spells out the attack vectors—such as MITM, DoS, spoofing and malware-based intrusions. However, it also poses some serious cybersecurity threats. This systematic literature review investigates the key security challenges in the IoV landscape and their countermeasures in VANETs through a comprehensive analysis of research conducted from 2015-2024. The review explores a range of security solutions that are currently being studied. Emphasis is focused on cryptographic protocols, machine learning based intrusion detection systems, and blockchain technologies, given their effectiveness, limitations, and suitability for resource-constrained vehicular environments. Even with the substantial progress, challenges remain in achieving real-time threat detection, ensuring interoperability, and developing lightweight yet effective security solutions. This review highlights these gaps and outlines future research directions, advocating for an integrated and adaptive cybersecurity framework according to the dynamic and heterogeneous nature of IoV networks.

References

[1] Petit, J., & Shladover, S. E. (2014). Potential cyberattacks on automated vehicles. IEEE Transactions on Intelligent Transportation Systems, 16(2), 546–556. https://doi.org/10.1109/TITS.2014.2342137

[2] Lu, N., Cheng, N., Zhang, N., Shen, X. S., & Mark, J. W. (2014). Connected vehicles: Solutions and challenges. IEEE Internet of Things Journal, 1(4), 289–299. https://doi.org/10.1109/JIOT.2014.2327587

[3] Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411. https://doi.org/10.1016/j.future.2017.11.022

[4] Ghosh, S. K., et al. (2019). Security of connected and autonomous vehicles: Challenges and opportunities. Internet of Things, 5, 1–20. hass

[5] Petit, J., & Simões, E. B. (2019). Security and privacy in vehicular communications. In Handbook of Smart Vehicles (pp. xx-xx). Springer.

[6] Faisal, A., Abbas, H., & Khan, S. U. (2020). A survey of data privacy and security issues in the Internet of Vehicles. IEEE Communications Surveys & Tutorials, 22(2), 1026–1059. https://doi.org/10.1109/COMST.2019.2953364

[7] Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2020). Internet of Vehicles security: Challenges and solutions. Journal of Network and Computer Applications, 133, 1–16. https://doi.org/10.1016/j.jnca.2019.05.016

[8] Hussain, R., & Zeadally, S. (2020). Autonomous cars: Research results, issues, and future challenges. IEEE Communications Surveys & Tutorials, 22(2), 1275–1313. https://doi.org/10.1109/COMST.2020.2970297

[9] Wang, T., et al. (2021). Machine learning for cybersecurity in IoV: Challenges and future directions. IEEE Network, 35(2), 248–254. https://doi.org/10.1109/MNET.011.2000416

[10] Zhao, L., Li, J., & Li, H. (2022). Security and privacy in the Internet of Vehicles: Architecture, challenges and solutions. Computer Networks, 210, 108973. https://doi.org/10.1016/j.comnet.2022.108973

[11] Mohamed, A., Alrawais, A., & Shi, W. (2023). A comprehensive survey on blockchain for the Internet of Vehicles. IEEE Internet of Things Journal, 10(3), 2345–2364. https://doi.org/10.1109/JIOT.2022.3167891

[12] Saharkhiz, A. H., & Farhadi, M. (2024). Review on cybersecurity frameworks in IoV with AI integration. Future Internet, 16(1), Article 7. https://doi.org/10.3390/fi16010007

[13] A. Khezri, H. Gomez-Mourelo, M. Khan, and R. Ibrahim, “Security Challenges in Internet of Vehicles (IoV) for ITS: A Survey,” Tsinghua Science and Technology, vol. 29, no. 4, pp. 637–658, 2024, doi: 10.26599/TST.2024.9010083.

[14] S. Singh and A. Sharma, “IoV security and privacy survey: issues, countermeasures, and challenges,” The Journal of Supercomputing, vol. 80, no. 18, pp. 19980–20025, 2024, doi: 10.1007/s11227-024-06269-5.

[15] S. Rony, M. R. Ahmed, and R. H. Khan, “Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions,” Sensors, vol. 24, no. 2, p. 368, 2024, doi: 10.3390/s24020368.

[16] M. R. Ahmed et al., “Security for the Internet of Vehicles with Integration of Sensing and Computing,” Sensors, vol. 25, no. 16, p. 5119, 2025, doi: 10.3390/s25165119.

[17] A. Rahman, S. S. Islam, and S. Khan, “Security issues in Internet of Vehicles (IoV): A comprehensive survey,” Array, vol. 20, p. 100325, 2023, doi: 10.1016/j.array.2023.100325.

[18] K. Salah, I. Yaqoob, and R. Jayaraman, “A comprehensive review on blockchains for Internet of Vehicles,” Computer Networks, vol. 226, p. 109574, 2023, doi: 10.1016/j.comnet.2023.109574.

[19] A. Alzubaidi and A. Elnashar, “A Systematic Literature Review on Internet of Vehicles Security,” arXiv preprint arXiv:2212.08754, 2022.

[20] A. Alzubaidi and A. Elnashar, “A Systematic Literature Review on Internet of Vehicles Security,” arXiv preprint arXiv:2212.08754, 2022.

[21] Z. Li, J. Wang, and Y. Chen, “Intrusion Detection Method for Internet of Vehicles Based on Parallel Analysis of Spatio-Temporal Features,” Sensors, vol. 23, no. 9, p. 4399, 2023, doi: 10.3390/s23094399.

[22] P. K. Das and S. P. Mohanty, “Privacy-Preserving Intrusion Detection System for Internet of Vehicles,” in Proc. ICCCN, 2024, pp. 1–6, doi: 10.1145/3632366.3632388.

[23] A. Shukla, N. Gupta, and R. Kumar, “Machine Learning-Driven Distributed Intrusion Detection System for the Internet of Vehicles,” in Proc. CEUR Workshop, vol. 3935, pp. 25–32, 2024.

[24] L. Yang and A. Shami, “A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles,” arXiv preprint arXiv:2201.11812, 2022.

[25] L. Yang, A. Shami, G. Stevens, and S. De Rusett, “LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in the Internet of Vehicles,” arXiv preprint arXiv:2208.03399, 2022.

[26] M. A. Ferrag and L. Maglaras, “Blockchain-Based Authentication in Internet of Vehicles: A Survey,” Sensors, vol. 21, no. 24, p. 8164, 2021, doi: 10.3390/s21248164.

[27] H. A. Laghari and S. H. Ahmed, “Machine Learning Technologies for Secure Vehicular Communications: A Survey,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 8868355, 2021, doi: 10.1155/2021/8868355.

[28] N. Das, S. Roy, and A. K. Das, “An Integrated IDS for the Internet of Vehicles using a Large Language Model,” Array, vol. 26, p. 100452, 2025, doi: 10.1016/j.array.2025.100452.

[29] A. Sebastian et al., “Enhancing Intrusion Detection in Internet of Vehicles through Federated Learning,” arXiv preprint arXiv:2311.13800, 2023.

[30] N. Shabbir, M. S. Khan, and A. A. Khan, “A Survey on Data Dissemination in Internet of Vehicles Networks,” Journal of Information and Telecommunication, vol. 7, no. 2, pp. 257–287, 2023, doi: 10.1080/24751839.2022.2151658.

[31] S. A. Rehman, H. Abbas, and R. Buyya, “CIA Security for Internet of Vehicles and Blockchain-AI Integration,” Journal of Grid Computing, vol. 22, no. 2, p. 36, 2024, doi: 10.1007/s10723-024-09757-3.

[32] M. Hasan, S. Mohan, T. Shimizu, and H. Lu, “Securing Vehicle-to-Everything (V2X) Communication Platforms,” arXiv preprint arXiv:2003.07191, 2020.

[33] E. Aliwa, O. Rana, C. Perera, and P. Burnap, “Cyberattacks and Countermeasures for In-Vehicle Networks,” arXiv preprint arXiv:2004.10781, 2020.

[34] Seth, Ashish. "Attack and Anomaly Detection in IoT Sensors Using Machine Learning Approaches." Journal of Recent Innovations in Computer Science and Technology 2.1 (2025): 16-27. https://doi.org/10.70454/JRICST.2025.20108

Downloads

Published

2025-09-20

Issue

Section

Articles

How to Cite

Systematic Review on Cybersecurity in the Internet of Vehicles (IoV). (2025). Journal of Recent Innovation in Science and Technology , 1(1), 38-52. https://doi.org/10.70454/JRIST.2025.10104