Sensors, Vol. 25, Pages 4793: Machine Learning-Based Blockchain Technology for Secure V2X Communication: Open Challenges and Solutions


Sensors, Vol. 25, Pages 4793: Machine Learning-Based Blockchain Technology for Secure V2X Communication: Open Challenges and Solutions

Sensors doi: 10.3390/s25154793

Authors:
Yonas Teweldemedhin Gebrezgiher
Sekione Reward Jeremiah
Xianjun Deng
Jong Hyuk Park

Vehicle-to-everything (V2X) communication is a fundamental technology in the development of intelligent transportation systems, encompassing vehicle-to-vehicle (V2V), infrastructure (V2I), and pedestrian (V2P) communications. This technology enables connected and autonomous vehicles (CAVs) to interact with their surroundings, significantly enhancing road safety, traffic efficiency, and driving comfort. However, as V2X communication becomes more widespread, it becomes a prime target for adversarial and persistent cyberattacks, posing significant threats to the security and privacy of CAVs. These challenges are compounded by the dynamic nature of vehicular networks and the stringent requirements for real-time data processing and decision-making. Much research is on using novel technologies such as machine learning, blockchain, and cryptography to secure V2X communications. Our survey highlights the security challenges faced by V2X communications and assesses current ML and blockchain-based solutions, revealing significant gaps and opportunities for improvement. Specifically, our survey focuses on studies integrating ML, blockchain, and multi-access edge computing (MEC) for low latency, robust, and dynamic security in V2X networks. Based on our findings, we outline a conceptual framework that synergizes ML, blockchain, and MEC to address some of the identified security challenges. This integrated framework demonstrates the potential for real-time anomaly detection, decentralized data sharing, and enhanced system scalability. The survey concludes by identifying future research directions and outlining the remaining challenges for securing V2X communications in the face of evolving threats.



Source link

Yonas Teweldemedhin Gebrezgiher www.mdpi.com