Machine learning and blockchain technologies for cybersecurity in connected vehicles

Jameel Ahmad, Muhammad Umer Zia, Ijaz Haider Naqvi, Jawwad Nasar Chattha, Faran Awais Butt, Tao Huang, Wei Xiang*

*Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

22 Scopus citations

Abstract

Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks for their everyday functions on the road so that safety of passengers and vehicles can be ensured. This article presents a holistic review of cybersecurity attacks on sensors and threats regarding multi-modal sensor fusion. A comprehensive review of cyberattacks on intra-vehicle and inter-vehicle communications is presented afterward. Besides the analysis of conventional cybersecurity threats and countermeasures for CAV systems, a detailed review of modern machine learning, federated learning, and blockchain approach is also conducted to safeguard CAVs. Machine learning and data mining-aided intrusion detection systems and other countermeasures dealing with these challenges are elaborated at the end of the related section. In the last section, research challenges and future directions are identified. This article is categorized under: Commercial, Legal, and Ethical Issues > Security and Privacy Technologies > Machine Learning Technologies > Internet of Things.

Original languageEnglish
Article numbere1515
JournalWiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery
Volume14
Issue number1
DOIs
StatePublished - 1 Jan 2024
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2023 The Authors. WIREs Data Mining and Knowledge Discovery published by Wiley Periodicals LLC.

Keywords

  • blockchain
  • connected and autonomous vehicles
  • cybersecurity
  • deep learning
  • federated learning
  • internet of vehicles

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Machine learning and blockchain technologies for cybersecurity in connected vehicles'. Together they form a unique fingerprint.

Cite this