You are currently viewing a new version of our website. To view the old version click .
Future Internet
  • Review
  • Open Access

19 July 2025

Ensemble Learning Approaches for Multi-Class Intrusion Detection Systems for the Internet of Vehicles (IoV): A Comprehensive Survey

,
and
1
School of Computing and Creative Technology, University of The West of England, Bristol BS16 1QY, UK
2
Department of Computer Science, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Intrusion Detection and Resiliency in Cyber-Physical Systems and Networks

Abstract

The emergence of the Internet of Vehicles (IoV) has revolutionized intelligent transportation and communication systems. However, IoV presents many complex and ever-changing security challenges and thus requires robust cybersecurity protocols. This paper comprehensively describes and evaluates ensemble learning approaches for multi-class intrusion detection systems in the IoV environment. The study evaluates several approaches, such as stacking, voting, boosting, and bagging. A comprehensive review of the literature spanning 2020 to 2025 reveals important trends and topics that require further investigation and the relative merits of different ensemble approaches. The NSL-KDD, CICIDS2017, and UNSW-NB15 datasets are widely used to evaluate the performance of Ensemble Learning-Based Intrusion Detection Systems (ELIDS). ELIDS evaluation is usually carried out using some popular performance metrics, including Precision, Accuracy, Recall, F1-score, and Area Under Receiver Operating Characteristic Curve (AUC-ROC), which were used to evaluate and measure the effectiveness of different ensemble learning methods. Given the increasing complexity and frequency of cyber threats in IoV environments, ensemble learning methods such as bagging, boosting, and stacking enhance adaptability and robustness. These methods aggregate multiple learners to improve detection rates, reduce false positives, and ensure more resilient intrusion detection models that can evolve alongside emerging attack patterns.

1. Introduction

Recent research has focused on intelligent transportation systems (ITSs), which have the potential to provide automated and smart transportation services. ITSs use wireless devices, sensing technologies, and advanced Information and Communication Technologies (ICTs) to address transportation issues such as safety, travel time, and pollution [1,2]. ITSs apply to various modes of transportation, including planes, ships, trains, trucks, buses, and automobiles. ITS deployments require dependable communication systems, like cellular networks [1,2]. There are three types of vehicular communication: vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to-everything (V2E). (i) V2V is a sort of two-way communication in which vehicles exchange data, such as velocity, current location, and destination, with other vehicles. V2V transmissions can also incorporate information about nearby moving cars, enabling the driver to quickly identify vehicles in their blind spot. (ii) V2I is a technology that allows automobiles to communicate with other infrastructures. V2I is a sort of two-way communication that allows vehicles to connect and share data with external entities, including traffic lights, parking spots, bicycles, and speed limits. V2I additionally incorporates radio communications that report on the surrounding environment within a few kilometers of a vehicle’s position [3]. (iii) V2E enables rapid communication for road safety applications such as forward collision alerts, lane change warnings, blind spot warnings, and emergency electric brake light warnings. V2E connects vehicles to external services, such as satellite-based destinations. This service can be one-way, like the Global Positioning System (GPS), or two-way, as requested.
Shortly, there will probably be more cars on the road, which will cause a boom in vehicle communications and associated sensors. In the automotive cyberspace, the current lack of firewalls and gateways to withstand various forms of intrusion will likely result in the emergence of new security vulnerabilities. Cyberattacks, such as the takeover of a vehicle or the dissemination of misleading information to influence the navigation algorithm’s decision, can have serious negative physical effects on individuals. Among other techniques, attackers can replace the vehicle’s current video with a fake stream for image processing, thereby gaining control over most or all of the vehicle’s characteristics [4]. GPS signal attacks fall into two categories: spoofing, false identification, and jamming, intentional interference [5]. To lower the signal-to-noise ratio of GPS broadcasts, jamming attacks usually involve the direct creation of radio waves. Spoofing threats include utilizing a bogus GPS device, posing as an image sensor to steal data, and using an infected GPS to disseminate malware or circumvent access control systems by gathering security data. Both attacks change and deliver bogus GPS signals to puzzled GPS receivers within cars.
Attackers may synchronize (Syn) the signals received from the satellite, weakening them even further. Then they may increase the frequency of the phishing signal, causing the car’s GPS to detect false signals and drive it in the wrong direction. Spoofing attacks, which deceive the system into believing there is a barrier nearby that the car must avoid, can also impair Light Detection and Ranging (LiDAR). The vehicle’s LiDAR system gets millisecond-level signals to carry out the attack. An attacker can disable the device’s ability to detect obstructions by altering the LiDAR signal or structure. Attacks against inter-vehicle communications include denial-of-service (DoS), distributed reflection DoS (DrDoS), and distributed denial-of-service (DDoS). To disrupt the normal operation of automotive systems, such as internal or external communication and navigation, all these attacks rely on infecting the server and flooding it with internet traffic or sending malicious requests to various components and communication networks. A DoS attack is often carried out by a single or small number of attackers to overwhelm the vehicle’s systems and drastically slow it down. These attacks highlight the necessity for additional approaches in resilient sensor systems to ensure accurate sensor data quality [6]. To maintain the security and safety of connected vehicles in their surroundings, it is critical to develop an IDS capable of recognizing these types of attacks. This system can accomplish this by detecting unauthorized access, particularly during data transmission, as well as unauthorized agents using injection attacks to remotely control a vehicle or gain access to the massive amounts of sensitive and personal data generated by the IoVs [7].
IDSs have made some major progress in maintaining security and safety in IoV [5]. Different machine learning (ML) techniques are used nowadays to find unusual behavior in network data. Among these techniques, ensemble learning has become somewhat popular since it can efficiently combine several classifiers to improve prediction durability and accuracy. In several uses, including network intrusion detection, ensemble learning techniques have shown exceptional effectiveness [8]. This is so because they are skilled in handling the complexity and volatility that cybersecurity data naturally carries.
Using ensemble learning for multi-class intrusion detection in IoV brings both special opportunities and challenges. In the framework of IoV, multi-class classification is essential since it distinguishes between several kinds of dangers and benign behavior. Advanced algorithms must be used if one wants great accuracy and low false positive rates [9]. By combining the benefits of numerous models, improving detection capabilities, and adjusting to changing threats, ensemble approaches provide the means.
In this work, we used a comprehensive approach to collect and evaluate relevant data, ensuring a thorough understanding of the status of ensemble learning-based multi-class intrusion detection for IoV. Initially, pertinent keywords have been identified and searched to guarantee comprehensive coverage of ensemble learning techniques for IoV IDS. The search incorporated “Ensemble Learning,” “Intrusion Detection,” “Multi-Class Classification,” “Internet of Vehicles,” “VANETs,” and “Machine Learning.” To enhance search results and exclude irrelevant studies, Boolean operators such as “AND”, “OR”, and “NOT” were employed. The research included the following terms: “Ensemble Learning AND Intrusion Detection AND Internet of Vehicles,” “Multi-class classification AND Intrusion Detection AND VANETs,” “Machine Learning AND Intrusion Detection AND Vehicular Networks,” “Intrusion Detection Systems AND Ensemble Methods AND IoV”, as well as “Security AND Internet of Vehicles AND Machine Learning”.
The current study focused on major credible academic databases where the research was gathered, including IEEE Xplore, ScienceDirect, SpringerLink, Google Scholar, ACM Digital Library, and Wiley Online Library. The vast compilation of conference papers and magazine articles on vehicle networks and security available in IEEE Xplore proved highly valuable. Google Scholar was utilized as an additional resource to ensure that no pertinent work was disregarded. The primary search yielded 87 articles from IEEE Xplore, 102 from SpringerLink, 134 from Scopus, and 42 from Wiley. Upon closer examination, 31 of the IEEE papers, 27 from Springer, 46 from Scopus, and 9 from Wiley were identified as uniquely relevant to the scope of this study. Notably, the Wiley Online Library, despite contributing a smaller number of papers overall, provided several distinctive studies not indexed in the other databases. This cross-platform inclusion helped ensure a diverse representation of current research trends. Moreover, to ensure the relevance and timeliness of the data, only conference papers and peer-reviewed articles published between 2020 and 2025 were considered. Figure 1 presents the survey methodology and the overall framework diagram. A list of all acronyms in this paper can be found in Abbreviations (i.e., at the end of the paper).
Figure 1. Survey Methodology Flow Diagram.

1.1. Contributions

  • Providing a comprehensive evaluation of ensemble learning methods (bagging, boosting, stacking, voting, hybrid) for multi-class intrusion detection in IoV.
  • Proposing a taxonomy that analyzes and compares ensemble-based IDSs and datasets for IoV security context.
  • Identifying recent research trends and gaps, recommending future directions for adaptive, scalable, and real-time IDS solutions in IoV.

1.2. Paper Organization

The rest of this paper is organized as follows: Section 2 introduces IoV architectures and security challenges, as well as an overview and analysis of the existing ensemble learning approaches. Section 3 discusses the related works, highlighting how our survey differs from other surveys in the literature with regard to ensemble learning methods, IoV, and Intrusion Detection Systems (IDSs). Section 4 analyzes research trends and gaps related to ensemble learning based IDSs for IoV. The section introduces a new taxonomy of the works studied. A discussion is performed in Section 5, and conclusions as future research directions are highlighted in Section 6.

2. Background

Today’s smart cars are basically social butterflies on wheels. They are constantly chatting with other cars, traffic lights, and pretty much anything that will listen. Welcome to the “Internet of Vehicles,” where your morning commute has turned into one giant group chat. The more our cars gossip with the world around them, the bigger the target they become for hackers. We would think about it if someone could hack our laptop to steal our photos, and what they could do with access to our car’s brain while we are cruising down the highway at 70 mph. Almehdhar et al. [10] dove deep into how we can use artificial intelligence to protect the secret conversations happening inside our cars. The authors hit a frustrating wall: we don’t have enough real-world data to build our IoV’s security. We cannot collect the data we need without good security, but we cannot build good security without the data. The authors also pointed out the need for some standardized datasets that every security developer can use. Meanwhile, Billah et al. [11] tackled another nightmare scenario: what happens when your car needs to spot a cyber threat in real-time while you’re actually driving? Cars do not have the computing power of a gaming laptop, so traditional cybersecurity approaches are about as useful as a chocolate teapot. The car’s security system needs to adapt faster than radio stations can change.
Almehdhar et al. [10] and Billah et al. [11] are tackling real problems and ensuring the need for a firm IoV security system that can detect and prevent critical breaches of vehicles in a real-time manner.

2.1. IoV Security Challenges

The IoV architecture is a complex framework designed to facilitate seamless communication and interaction among vehicles, infrastructure, and various other entities. It comprises several layers, including perception, network, and application layers, each serving distinct functions to ensure efficient data collection, transmission, and processing. The perception layer is responsible for gathering data from sensors and devices, while the network layer handles data communication through technologies like 5G and edge computing. The application layer processes this data to provide services such as traffic management, navigation, and infotainment [12].
Although IoV has great potential, its design leaves a lot of security flaws. The great interconnectedness and data flow across many companies have, as a result, crucial effects, including their vulnerability to cyberattacks. These attacks can show up as malware infections and data breaches, as well as more sophisticated ones, including DoS and man-in-the-middle attacks. Guaranteeing the availability, confidentiality, and integrity of data will help to maintain the dependability and credibility of IoV systems.
Managing the large volumes of data generated by the IoV in a safe way presents still another challenge. User identities and automobile locations are very important, so it is necessary to protect this data from unauthorized access and keep users’ anonymity. Furthermore, IoV networks’ dynamic and distributed character makes it more difficult to create robust security policies and quickly identify and deal with security concerns [13].
Furthermore, adding to interoperability and compatibility difficulties are the great variety of IoV components, which include several automotive models, communication protocols, and sensor types. These issues might create security flaws that hackers could find useful. Establishing consistent security measures and guaranteeing broad adoption can help one to properly handle these challenges [14]. Table 1 summarizes those challenges.
Table 1. IoV Architecture Challenges.

2.2. Ensemble Learning Approaches Overview

Dietterich [15] defined ensemble learning as an ML method whereby several models are combined to improve predicted accuracy. The ensemble learning working principle is to collect predictions through several models, which contribute to improving accuracy, especially in difficult tasks. Compared to single models, ensemble methods that combine the outputs of numerous base learners have the potential to attain more accuracy and robustness. As shown in Table 2, we classify ensemble learning into five categories: bagging, boosting, stacking, voting, and Hybrid. Indeed, sometimes combinations occur, resulting in hybrid ensemble approaches.

2.2.1. Boosting

It is a sequential ML method in which the next model fixes the errors created by the one before it. Extreme Gradient Boosting (XGBoost), Gradient Boosting (GB), Ada Boosting, LightGBM (LGBM), and Cat Boosting have shown improved performance in recent intrusion detection studies based on empirical evaluations reported in the literature [16,17]. These methods aim at classifying difficult situations [16,18]. Boosting in general may reduce bias, but overfitting could appear due to noisy data [18].
XGBoost
XGBoost improves ML model performance and computing speed by building decision trees (DT) in parallel. XGBoost is an effective implementation of a GBML algorithm where stochastic gradient or tree boosting is used to develop a powerful ML technique that performs well in a wide range of complex situations [19].
Gradient Boosting (GB)
GB evaluates the significance of each attribute after creating the boosted tree, employing a robust metric referred to as feature importance. This scoring approach assesses the significance of each feature in developing DTs for essential decision-making. Feature importance quantifies the significance of each attribute [20]. The relevance is determined by explicitly comparing and evaluating each attribute in the dataset against the others. The relevance of an individual DT is determined by the quantity of each attribute split point, weighted by the total number of observations from that node. This division is employed to improve the algorithm’s efficacy and efficiency.
AdaBoost
AdaBoost is an iterative supervised learning algorithm that combines multiple predictions of weak classifiers [21]. The combination of updates, datasets, and voting is done using a weighted majority. To ensure this is successful, events that are difficult to classify are given priority above those that have already been adequately described.
LightGBM (LGBM)
The gradient hoist supports the LightGBM classification algorithm, known for its minimal processing load. A significant proportion of algorithms within the tree-based boosting family, including xgboost, utilize a presorting step for feature selection and splitting. Despite its significant effort and memory overhead, this presorting method can accurately identify the dividing point [22].
Cat Boosting
CatBoost outperforms in handling categorical variables within heterogeneous datasets compared to other gradient boosting DT implementations, as it utilizes ordered target statistics and ordered boosting. It utilizes symmetric trees to achieve efficient prediction times [17]. In the CatBoost method, each subsequent tree is generated with a reduced loss compared to its previous one. It allows the definition of custom functions, utilizes categorical features directly and efficiently, and reduces the necessity for extensive hyperparameter tuning. A significant discovery from their multidisciplinary research, as stated in a recent paper, is that it is sensitive to hyperparameters, making their adjustment essential. To enhance model performance, researchers may modify the maximum depth of individual DTs, the maximum number of combinations of categorical features, and the maximum number of iterations in CatBoost. The researcher’s selections of these hyperparameters may explain the variances in CatBoost’s performance.

2.2.2. Bagging Classifier

Sometimes referred to as Bootstrap Aggregating, it is the technique of training several base models using different subsets of training data. These models then generate aggregated model forecasts by means of voting or averaging, combining their projections. A popular bagging method is the Random Forests (RF), which are widely used in intrusion detection since they minimize overfitting and can manage huge collections of features. Meanwhile, class bias may exist [23].
Random Forest (RF)
RF is another version of bagging [24]. It builds the tree on a random selection mechanism. The concept of randomness is divided into two models: (1) random training instances are selected in tree construction, and (2) nodes are divided based on the selection of a random subset of features. A (no-pruning) technique in which trees are fully modeled can reduce bias and variance. The accuracy is well improved, and overfitting is combated by merging multiple trees.
Decision Tree (DT)
DT is a tree-like construction approach that includes branches and leaves. The branch displays the findings, and the interior node displays the classification criterion. The class designation corresponds to the leaves. During the training phase, the relevant qualities for primary nodes and branches are determined using the collected data. The information-gain score with the highest value is used to create the decision node. The cycle can be completed by creating a new subtree below the decision node. If all the items in the selected subgroups have the same value, the method will be completed, and the output value determined. When there is only one node left in the subgroup and no identifiable trait has been discovered, the cycle will stop [25].

2.2.3. Stacking

Stacking is the abbreviation for stacked generalization [26]. The method is about combining several ML models. It is a technique of teaching a meta-learner to maximize the output by aggregating predictions from several base models [27]. For difficult applications like multi-class intrusion detection on the IoV [28], this method, which combines the benefits of several algorithms, is ideally fit, even though stacking may suffer from the risk of overfitting due to the complexity of implementation [27,28]. For example, Singh et al. [26] proposed SE-LIDS, a stacking-based network-based IDS for IoV, where they have used LightGBM, XGBoost, and CatBoost in the stacking architecture and XGBoost as the meta-learner model.

2.2.4. Hybrid Methods

Similarly to stacking, hybrid methods combine different ensemble techniques to exploit their advantages. These methods often show superior performance but can be complex to implement and tune [29]. The difference between the two approaches lies in the fact that stacking focuses on combining predictions from multiple models using a meta-model, while a hybrid ensemble leverages different types of models or techniques together for enhanced performance.

2.2.5. Ensemble Voting Method

The voting ensemble technique in machine learning aggregates predictions from many models to enhance accuracy and durability. To arrive at a final decision, it amalgamates the results of multiple fundamental learners, or models. There are two primary styles of voting: hard voting and soft voting.
Hard Voting
Each model casts a vote for a specific class label, and the class with the most votes is chosen as the final prediction. This technique relies on the dominant class label found in each individual forecast [30].
Soft Voting
Each model generates a probabilistic estimation for every class. The final forecast is determined by selecting the class with the highest average likelihood after probability aggregation. This technique accounts for the level of certainty that models possess in their predictions [31]. One of the key advantages of the voting technique is its capacity to enhance accuracy by leveraging the strengths of multiple models, often outperforming individual learners [32]. Furthermore, ensemble methods provide robustness by mitigating the influence of individual model weaknesses, thereby producing more reliable and trustworthy forecasts [33]. Simplicity is another notable benefit, as these methods are generally easy to implement across diverse models without significant complexity [34].
Figure 2 is a pictorial view of the ensemble learning methods, while Table 2 summarizes the five ensemble learning methods with an example of each one, along with their strengths and weaknesses.
Figure 2. Ensemble Learning Methods.
Table 2. Ensemble learning methods’ strengths and weaknesses.
Table 2. Ensemble learning methods’ strengths and weaknesses.
Ensemble Learning TechniqueExamplesStrengthsWeaknesses
BaggingRandom ForestReduces variance, robust against overfitting [23]May not reduce bias [23]
BoostingAdaBoost, Gradient Boost, XGBoost, and Cat BoostReduces bias, improves accuracy [16,17]Can overfit, sensitive to noisy data [17,18]
StackingA stacking ensemble where a Random Forest, Gradient Boosting, and K-Nearest Neighbors classifier serve as base learners, and a Logistic Regression model is used as the meta-learner to combine their predictions for final classificationCombines strengths of multiple models [27,28]Complex to implement, risk of overfitting [27,28]
Hybrid Combination of bagging, boostingSuperior performance leverages multiple approaches [29] Highly complex, challenging to tune [29].
Voting Combining Random Forest, SVM, and KNN, then vote between them Improves prediction accuracy by leveraging diverse classifiers with its
simplicity of implementation and interpretation [30,31,32,33,34].
Depending on the performance of individual models, it may not perform well if models are highly correlated [30,31,32,33,34].

5. Discussion

These studies use a variety of approaches and datasets, but common constraints appear, highlighting the inherent issues of cybersecurity in automotive and IoT networks. These include investigating various real-world circumstances and hardware constraints that may impact the practical implementation and scalability of suggested models. Furthermore, numerous studies failed to mention their limits, highlighting a broader issue in cybersecurity research: the need for transparency and recognition of potential flaws. Another limitation found in various previous studies is the limited use of real data sets, which ensures scalability in the real world. Furthermore, relying on legacy datasets for training may limit generalizability across diverse and dynamic traffic scenarios. Furthermore, the studies lacked comparisons to previous research and novel models for detecting intrusion.
This study aims to evaluate the effectiveness of ensemble learning for intrusion detection in Internet of Vehicles (IoV) environments. The findings provide an accurate overview of the current state of the field and highlight key factors influencing the development and implementation of IDS in IoV systems.
The results of our study indicate that the performance of IDS is greatly influenced by the choice of datasets. Although the KDD Cup 99 dataset is outdated, it remains an important resource due to its comprehensive coverage of many network intrusion types. This supports the argument made in [74] that performance measurements obtained from past data are valuable. Conversely, it can be argued that newer datasets like NSL-KDD offer a more precise representation of the current state of the network by resolving the problems of duplication and imbalance found in KDD Cup 99 [81]. The results indicate that whereas old datasets are valuable for comparing and evaluating performance, contemporary datasets are essential for creating models that can effectively address present attacks.
The study emphasizes the significance of the CICIDS 2017 dataset in evaluating temporal attack trends due to its provision of up-to-date and accurate traffic conditions. The findings in [69] confirm the importance of time-based analytical characteristics in datasets such as CICIDS 2017 for detecting dynamic attack patterns in IoVs. These findings suggest that including such datasets in IDS evaluation can enhance the resilience of the model and improve its ability to detect real-world threats with greater accuracy.
Moreover, the UNSW-NB15 dataset encompasses a diverse array of attack scenarios, which greatly facilitates the creation of dependable IDS models. To enhance the applicability of IDS models, [57,59] highlights the importance of utilizing up-to-date datasets that accurately reflect the prevailing threat scenarios. Our research indicates that incorporating datasets like UNSW-NB15 can enhance the effectiveness of detection systems by enabling them to handle a broader spectrum of attack vectors. This conclusion indicates that for IDS models to remain pertinent and efficient, forthcoming research should give priority to varied and up-to-date datasets.
The Car-Hacking Dataset prioritizes vehicular network security and highlights the significance of certain datasets in research related to IoV. Studies emphasize the significance of accurately replicating actual automotive attacks by utilizing numerous CAN bus signals [75,77]. Our research indicates that datasets designed specifically for automotive networks are highly helpful for the development of IDSs that can effectively protect against threats unique to autos. An important practical consequence is the potential for IDS systems that are more targeted and effective in dealing with the specific difficulties of IoV.
The study’s overall findings underscore the significance of using diverse and reliable information for designing IoV-specific IDS. The results indicate that contemporary, specialized datasets are crucial for enhancing the significance and longevity of IDS models, while conventional datasets offer valuable benchmarking capabilities. These findings highlight the significance of regularly updating datasets and creating tailored datasets to adapt to the changing threat landscape in IoV. This has substantial implications for future research and implementation.
The challenges of getting big, diverse datasets for training and validation, particularly in proprietary or specialist environments like vehicle networks, impede model generalization and efficacy. The reliance on DL and optimization algorithms raises questions about computing overhead, efficiency, and the viability of deployment in resource-constrained contexts. Collectively, these constraints highlight the gap between theoretical model performance and real-world application, indicating a vital area for future study to reconcile theoretical improvements with practical, scalable solutions to cybersecurity concerns in automotive and IoT systems.
We also pointed out that two important options for enhancing scalability and privacy are federated ensemble learning and distributed IDS frameworks. Tu and Shang [46] highlighted the advantages of using federated ensemble learning-assisted IDS to safeguard autonomous cars over mesh satellite networks. They stressed the improved scalability and privacy provided by this approach. However, in their study, they investigated the effectiveness of intricate boosting strategies, highlighting their precision as well as the challenge of managing network traffic in real-time [49]. Qin et al. [53] suggested a collaborative IDS that connects cloud and vehicle systems. They highlighted the significance of achieving greater accuracy in detecting intrusions and the ability to adjust in real-time. Nevertheless, although these solutions exhibit promise, they also illustrate the arduous and resource-demanding nature of developing advanced IDS systems in IoV environments. Further comprehensive research is needed to enhance our understanding and establish connections between experimental results and feasible, scalable solutions for IoV security.
By referring to the studied literature and despite the existence of research gaps that now prevent the complete integration of ensemble learning into IDS for the IoV, this review demonstrates considerable potential in addressing this issue. The scalability of ensemble methods poses a major challenge. While these methods demonstrate efficacy in controlled settings, their effectiveness diminishes when applied to real-world situations, including extensive IoV implementations. Effective scaling is necessary to manage the substantial volumes of data produced by several autos and intricate network architectures.
We find that real-time processing poses another key challenge marked in [78], it is the computational complexity which is inherent in many ensemble learning techniques and may prevent them from effectively processing data in real time, which is crucial for rapid threat detection and response on IoV. To overcome this difficulty, it will be necessary to develop algorithms that are lightweight, efficient, and have a high level of detection accuracy.
Moreover, there is a significant disparity in the incorporation of ensemble learning with future technologies like edge computing, blockchain, and federated learning [84]. While additional research is necessary to comprehensively grasp the advantages of these technologies, they provide the potential to augment the security and resilience of IDS. Besides, in order to address the issue of shifting threats in IoV IDS, it is necessary to design adaptive algorithms that can respond immediately. This is because current ensemble learning techniques often struggle to adjust to these changes in a timely manner.
Regarding privacy and security considerations [45,57,61], pose further obstacles to the application of ensemble learning IDS. It is a delicate task that requires further investigation to find a compromise between privacy concerns and the usefulness and efficiency of IDS. There is a continuous trade-off between the efficient use of resources and the level of precision. Efficiently balancing detection accuracy with little memory and CPU power usage continues to be a major challenge.
An important exclusion is the absence of practical validation. Many research studies like [46,59,75] utilize controlled experiments and simulations, which fail to adequately replicate real-world situations. Field experiments and live deployments are essential for bridging this gap and showcasing the effectiveness of ensemble learning IDS in practical IoV scenarios. Moreover, the process of modifying hyperparameters in ensemble learning methods can be both time-consuming and perhaps unachievable in real-time situations. In order to expedite the procedure, it is necessary to do research on automated and efficient approaches for hyperparameter optimization.
As understood from [59,82], the creation of comprehensive security frameworks is insufficient. Although there has been significant study on individual components of IDS, ensuring adequate protection for the IoV requires complete frameworks that integrate ensemble learning IDS with other security measures. To enhance the practicality and effectiveness of ensemble learning-based IDS in the IoV, it is crucial to address these research gaps. Additionally, this will contribute to the establishment of more dependable and secure automotive networks.
Despite the breadth of this survey, several limitations are acknowledged that open avenues for further research. One key limitation lies in the availability and diversity of benchmark datasets. Many of the reviewed studies rely heavily on datasets such as NSL-KDD and CICIDS2017, which, while popular, may not fully reflect the complexity, heterogeneity, and real-time dynamics of modern IoV environments. This lack of real-world data constrains the generalizability of reported performance metrics and limits the ability to validate models under evolving attack patterns or decentralized vehicular scenarios.
Additionally, while ensemble methods show impressive accuracy and robustness, their computational overhead and scalability remain important concerns—especially in latency-sensitive and resource-constrained IoV deployments. Techniques like boosting and stacking, for instance, can incur training costs or inference delays that hinder real-time application at the edge. Moreover, few studies address adversarial resilience or privacy-preserving training, which are increasingly critical for secure IoV systems. These limitations suggest that future work should not only explore novel architectures but also prioritize lightweight, adaptive, and privacy-aware IDS frameworks that can operate reliably in realistic and distributed vehicular environments.

6. Conclusions and Future Direction

This research examines the effectiveness and practicality of multi-class IDS using ensemble learning for IoV. The study highlights the importance of diverse datasets in enhancing the performance, which represents one future research topic to tackle. Despite ensemble learning techniques’ durability and detection accuracy, issues about computational cost and real-time applicability persist. The study also discusses the advantages and disadvantages of various ensemble learning-based IDS for IoV. Federated learning presents challenges with latency and coordination, but provides privacy and scalability. Furthermore, future research should focus on developing scalable and lightweight IDS models using decentralized learning frameworks and optimization approaches. Speeding up communication in autonomous vehicles is very important and needs more attention from the research community. This can be achieved by exploring IDS in compressed data as suggested by Rakhmanov and Wiseman [85].

Author Contributions

Conceptualization, M.A. and F.M.; methodology, M.A., F.M. and D.D.; validation, M.A., F.M. and D.D.; investigation, M.A.; resources, M.A.; data curation, M.A., F.M.; writing—original draft preparation, M.A.; writing—review and editing, M.A., F.M. and D.D.; visualization, M.A.; supervision, F.M. and D.D.; project administration, F.M. and D.D.; revisions, M.A.; funding acquisition, D.D. All authors have read and agreed to the published version of the manuscript.

Funding

This work is part of a PhD research project at the University of the West of England (UWE), Bristol. This research was funded by Taif University, Taif, Saudi Arabia, through a scholarship program.

Acknowledgments

The authors would like to thank Taif University, Taif, Saudi Arabia, for the administrative and academic support provided through the scholarship program, as well as University of the West of England (UWE) for providing supervision, facilities and environment for this research. We would like to knowledge that we used ChatGPT in a limited capacity during the preparation of the manuscript, specifically for summarising and refining the language of certain sections. We used Manus and Grammarly for spelling check and in restructuring some weak grammatical sentences. We also used Deep Seek to search for some free image resolution enhancement to improve the quality of some images. The AI tools were not used for generating original content or conducting analysis. All conceptual work, research, data analysis, and critical interpretation were carried out by the authors.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

AdaBoostAdaptive Boosting
APTsAdvanced Persistent Threats
APIApplication Programming Interface
AUCArea Under the Curve
BOBayesian Optimizer
CANController Area Network
CNNConvolutional Neural Network
CPUCentral Processing Unit
DEDifferential Evolution
DEAData Envelopment Analysis
DLDeep Learning
DDoSDistributed Denial of Service
DNNDeep Neural Network
DOSDenial of Service
DRLDeep Reinforcement Learning
DrDoSDistributed Reflective Denial of Service
DTDecision Tree
ELEnsemble Learning
ELIDSEnsemble Learning-Based Intrusion Detection Systems
ETExtra Trees
FA-CNNFeature Augmented Convolutional Neural Network
FLFederated Learning
GAGenetic Algorithm
GANsGenerative Adversarial Networks
GBGradient Boosting
GBMGradient Boosting Machine
GPSGlobal Positioning System
GPUGraphics Processing Unit
HIDSHost-based Intrusion Detection System
ICTsInformation and Communication Technologies
IoTInternet of Things
IoVInternet of Vehicles
IRFCImproved Random Forest Classifier
ISACIntegrated Sensing and Communication
ITSIntelligent Transportation Systems
KNNK-Nearest Neighbours
LGBMLightGBM
LiDARLight Detection and Ranging
LSTMLong Short-Term Memory
MLMachine Learning
NIDSNetwork-based Intrusion Detection System
NNNeural Network
PCAPrincipal Component Analysis
PSOParticle Swarm Optimization
RBFRadial Basis Function
RFERecursive Feature Elimination
RFRandom Forest
RFRRandom Forest Regression
RNNRecurrent Neural Network
ROCReceiver Operating Characteristic
SE-LIDSStacking Enabled Ensemble Learning Based Intrusion Detection Scheme
SVMSupport Vector Machine
SMOTESynthetic Minority Oversampling Technique
UAVUnmanned Aerial Vehicle
V2IVehicle to Infrastructure
V2VVehicle to Vehicle
VANETVehicular Ad Hoc Network
VTEVehicle-to-Everything
XAIExplainable Artificial Intelligence
XGBoostExtreme Gradient Boosting

References

  1. Aradhana, B.; Kumar, A.; Jain, P.K. A comparative performance analysis of vehicular routing protocols in intelligent transportation systems. Telecommun. Syst. 2025, 88, 26. [Google Scholar] [CrossRef]
  2. Ji, B.; Chen, Z.; Mumtaz, S.; Han, C.; Li, C.; Wen, H.; Wang, D. A Vision of IoV in 5G HetNets: Architecture, Key Technologies, Applications, Challenges, and Trends. IEEE Netw. 2022, 36, 153–161. [Google Scholar] [CrossRef]
  3. Arena, F.; Pau, G. An overview of vehicular communications. Future Internet 2019, 11, 27. [Google Scholar] [CrossRef]
  4. Sarsam, S.M. Cybersecurity Challenges in Autonomous Vehicles: Threats, Vulnerabilities, and Mitigation Strategies. SHIFRA 2023, 2023, 34–42. [Google Scholar] [CrossRef]
  5. El-Rewini, Z.; Sadatsharan, K.; Selvaraj, D.F.; Plathottam, S.J.; Ranganathan, P. Cybersecurity challenges in vehicular communications. Veh. Commun. 2020, 23, 100214. [Google Scholar] [CrossRef]
  6. Nuiaa, R.R.; Manickam, S.; Alsaeedi, A.H. Distributed reflection denial of service attack: A critical review. Int. J. Electr. Comput. Eng. 2021, 11, 5327–5341. [Google Scholar] [CrossRef]
  7. Ivanov, I.; Maple, C.; Watson, T.; Lee, S. Cyber security standards and issues in V2X communications for internet of vehicles. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT—2018, London, UK, 28–29 March 2018; pp. 28–29. [Google Scholar] [CrossRef]
  8. Syarif, I.; Zaluska, E.; Prugel-Bennett, A.; Wills, G. Application of bagging, boosting, and stacking ensemble machine learning methods to network intrusion detection. In Proceedings of the 8th International Conference on Machine Learning and Data Mining (MLDM 2012), Berlin, Germany, 13–20 July 2012; Lecture Notes in Computer Science. Volume 7197, pp. 593–602. [Google Scholar]
  9. Moustafa, N.; Turnbull, B.; Choo, K.K.R. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things. IEEE Internet Things J. 2019, 6, 4815–4830. [Google Scholar] [CrossRef]
  10. Almehdhar, M.; Albaseer, A.; Khan, M.A.; Abdallah, M.; Menouar, H.; Al-Kuwari, S.; Al-Fuqaha, A. Deep learning in the fast lane: A survey on advanced intrusion detection systems for intelligent vehicle networks. IEEE Open J. Veh. Technol. 2024, 5, 869–906. [Google Scholar] [CrossRef]
  11. Billah, M.; Mehedi, S.T.; Anwar, A.; Rahman, Z.; Islam, R. A systematic literature review on blockchain enabled federated learning framework for internet of vehicles. arXiv 2022, arXiv:2203.05192. [Google Scholar]
  12. Zhang, J.; Yu, F.R.; Nekovee, M.; Liu, N. Software-defined vehicular networks: Architectures, algorithms, and applications. IEEE Commun. Surv. Tutor. 2019, 21, 499–548. [Google Scholar] [CrossRef]
  13. Wang, X.; Zhao, L.; Zhang, Y. Sustainable urban development through IoV-enhanced traffic optimization. Sustain. Cities Soc. 2023, 68, 102736. [Google Scholar]
  14. Liu, B.; Wang, Y.; Zhang, H. IoV-based intelligent transportation systems: Opportunities and challenges. IEEE Internet Things J. 2023, 10, 2205–2218. [Google Scholar]
  15. Dietterich, T.G. Ensemble methods in machine learning. In Proceedings of the International Workshop on Multiple Classifier Systems, Cagliari, Italy, 21–23 June 2000; Springer: Berlin/Heidelberg, Germany, 2000; Volume 1857, pp. 1–15. [Google Scholar]
  16. Freund, Y.; Schapire, R.E. A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 1997, 55, 119–139. [Google Scholar] [CrossRef]
  17. Prokhorenkova, L.; Gusev, G.; Vorobev, A.; Dorogush, A.V.; Gulin, A. CatBoost: Unbiased boosting with categorical features. In Advances in Neural Information Processing Systems 31 (NeurIPS 2018); Curran Associates, Inc.: Montréal, QC, Canada, 2018; pp. 6638–6648. [Google Scholar]
  18. Chen, T.; Guestrin, C. XGBoost: A scalable tree boosting system. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13–17 August 2016; pp. 785–794. [Google Scholar]
  19. Dhaliwal, S.S.; Nahid, A.-A.; Abbas, R. Effective intrusion detection system using XGBoost. Information 2018, 9, 149. [Google Scholar] [CrossRef]
  20. Upadhyay, D.; Manero, J.; Zaman, M.; Sampalli, S. Gradient boosting feature selection with machine learning classifiers for intrusion detection on power grids. IEEE Trans. Netw. Serv. Manag. 2021, 18, 1104–1116. [Google Scholar] [CrossRef]
  21. Wu, Y.; Ke, Y.; Chen, Z.; Liang, S.; Zhao, H.; Hong, H. Application of alternating decision tree with AdaBoost and bagging ensembles for landslide susceptibility mapping. Catena 2020, 187, 104396. [Google Scholar] [CrossRef]
  22. Ke, G.; Meng, Q.; Finley, T.; Wang, T.; Chen, W.; Ma, W.; Ye, Q.; Liu, T.-Y. LightGBM: A highly efficient gradient boosting decision tree. In Advances in Neural Information Processing Systems 30 (NeurIPS 2017); Curran Associates, Inc.: Long Beach, CA, USA, 2017; pp. 3146–3154. [Google Scholar]
  23. Breiman, L. Bagging predictors. Mach. Learn. 1996, 24, 123–140. [Google Scholar] [CrossRef]
  24. Jin, Z.; Zhang, J.; Wang, Y.; Li, X. RFRSF: Employee turnover prediction based on random forests and survival analysis. In Proceedings of the International Conference on Neural Information Processing (ICONIP 2020); Springer: Cham, Switzerland, 2020; Volume 12343, pp. 503–515. [Google Scholar] [CrossRef]
  25. Mienye, I.D.; Jere, N. A survey of decision trees: Concepts, algorithms, and applications. IEEE Access 2024, 12, 86716–86727. [Google Scholar] [CrossRef]
  26. Singh, A.P.; Chaurasia, B.K.; Tripathi, A. Stacking Enabled Ensemble Learning Based Intrusion Detection Scheme (SELIDS) for IoV. SN Comput. Sci. 2024, 5, 1000. [Google Scholar] [CrossRef]
  27. Alalwany, E.; Alsharif, B.; Alotaibi, Y.; Alfahaid, A.; Mahgoub, I.; Ilyas, M. Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in IoMT Environments. Sensors 2025, 25, 624. [Google Scholar] [CrossRef] [PubMed]
  28. Sagi, O.; Rokach, L. Ensemble learning: A survey. WIREs Data Min. Knowl. Discov. 2018, 8, e1249. [Google Scholar] [CrossRef]
  29. Zhou, Z.-H. Ensemble Methods: Foundations and Algorithms; Chapman and Hall/CRC: Boca Raton, FL, USA, 2012. [Google Scholar] [CrossRef]
  30. Polikar, R. Ensemble based systems in decision making. IEEE Circ. Syst. Mag. 2006, 6, 21–45. [Google Scholar] [CrossRef]
  31. Seiller, A.; Gaussier, É.; Devijver, E.; Clausel, M.; Alkhoury, S. Ensembles of Probabilistic Regression Trees. arXiv 2024, arXiv:2406.14033. [Google Scholar]
  32. Bhati, N.S.; Khari, M.; Malik, H.; Chaudhary, G.; Srivastava, S. A new ensemble based approach for intrusion detection system using voting. J. Intell. Fuzzy Syst. 2021, 42, 969–979. [Google Scholar] [CrossRef]
  33. Zhu, F.; Sun, Y.; Han, M.; Hou, T.; Zeng, Y.; Lin, M.; Wang, Y.; Zhong, P.A. A robust bayesian multi-machine learning ensemble framework for probabilistic groundwater level forecasting. J. Hydrol. 2025, 650, 132567. [Google Scholar] [CrossRef]
  34. Rebai, Y.; Guesmi, R.; Ayed, H.B. A two-stage voting-boosting technique for concurrent ensemble learning. Entropy 2023, 25, 555. [Google Scholar] [CrossRef]
  35. Ali, E.S.; Hasan, M.K.; Hassan, R.; Saeed, R.A.; Hassan, M.B.; Islam, S.; Bevinakoppa, S. Machine learning technologies for secure vehicular communication in internet of vehicles: Recent advances and applications. Secur. Commun. Netw. 2021, 2021, 8868355. [Google Scholar] [CrossRef]
  36. Chiroma, H.; Abdulhamid, S.I.M.; Hashem, I.A.; Adewole, K.S.; Ezugwu, A.E.; Abubakar, S.; Shuib, L. DL-based big data analytics for internet of vehicles: Taxonomy, challenges, and research directions. Math. Probl. Eng. 2021, 2021, 9022558. [Google Scholar] [CrossRef]
  37. Al-Jarrah, O.Y.; Maple, C.; Dianati, M.; Oxtoby, D.; Mouzakitis, A. Intrusion detection systems for intra-vehicle networks: A review. IEEE Access 2019, 7, 21266–21289. [Google Scholar] [CrossRef]
  38. Talpur, A.; Gurusamy, M. Machine learning for security in vehicular networks: A comprehensive survey. IEEE Commun. Surv. Tutor. 2021, 24, 346–379. [Google Scholar] [CrossRef]
  39. Saheed, Y.K.; Chukwuere, J.E. Xaiensembletl-iov: A new explainable artificial intelligence ensemble transfer learning for zero-day botnet attack detection in the internet of vehicles. Results Eng. 2024, 24, 103171. [Google Scholar] [CrossRef]
  40. Selvakumar, B.; Sivaanandh, M.; Muneeswaran, K.; Lakshmanan, B. Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks. Sci. Rep. 2025, 15, 4267. [Google Scholar] [CrossRef] [PubMed]
  41. Nassreddine, G.; Nassereddine, M.; Al-Khatib, O. Ensemble learning for network intrusion detection based on correlation and embedded feature selection techniques. Computers 2025, 14, 82. [Google Scholar] [CrossRef]
  42. Limouchi, E.; Chan, F. Optimized Machine Learning-Based Intrusion Detection System for Internet of Vehicles. In Proceedings of the 2023 IEEE Symposium Series on Computational Intelligence (SSCI), Mexico City, Mexico, 5–8 December 2023; pp. 1151–1157. [Google Scholar] [CrossRef]
  43. Anthony, C.; Elgenaidi, W.; Rao, M. Intrusion Detection System for Autonomous Vehicles Using Non-Tree-Based Machine Learning Algorithms. Electronics 2024, 13, 809. [Google Scholar] [CrossRef]
  44. Shahriar, M.H.; Xiao, Y.; Moriano, P.; Lou, W.; Hou, Y.T. CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level. IEEE Internet Things J. 2023, 10, 22111–22127. [Google Scholar] [CrossRef]
  45. Al-Hawawreh, M.; Hossain, M.S. Federated Learning-Assisted Distributed Intrusion Detection Using Mesh Satellite Nets for Autonomous Vehicle Protection. IEEE Trans. Consum. Electron. 2024, 70, 854–862. [Google Scholar] [CrossRef]
  46. Tu, J.; Shang, W. Enhancing Intrusion Detection in the Internet of Vehicles: An Ensemble and Optimized Machine Learning Approach. In Proceedings of the 2023 2nd International Conference on Sensing, Measurement, Communication and Internet of Things Technologies (SMC-IoT), Chengdu, China, 15–17 December 2023; pp. 207–211. [Google Scholar] [CrossRef]
  47. Hong, Y.-W.; Yoo, D.-Y. Multiple Intrusion Detection Using Shapley Additive Explanations and a Heterogeneous Ensemble Model in an Unmanned Aerial Vehicle’s Controller Area Network. Appl. Sci. 2024, 14, 5487. [Google Scholar] [CrossRef]
  48. Ahsan, S.I.; Legg, P.; Alam, S.M. A Stacked Ensemble Learning IDS Model for Software-Defined VANET. arXiv 2023, arXiv:2312.04956v4. [Google Scholar]
  49. Korium, M.S.; Saber, M.; Beattie, A.; Narayanan, A.; Sahoo, S.; Nardelli, P.H. Intrusion Detection System for Cyberattacks in the Internet of Vehicles Environment. Ad Hoc Netw. 2024, 153, 103330. [Google Scholar] [CrossRef]
  50. Zhang, K.; Yang, J.; Shao, Y.; Hu, L.; Ou, W.; Han, W.; Zhang, Q. Intrusion Detection Model for Internet of Vehicles Using GRIPCA and OWELM. IEEE Access 2024, 11, 321–332. [Google Scholar] [CrossRef]
  51. Yang, L.; Shami, A.; Stevens, G.; de Rusett, S. LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles. In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 3545–3550. [Google Scholar] [CrossRef]
  52. Kim, T.H.; Ojo, S.; Krichen, M.; Alamro, M.A. Single and Mixed Sensory Anomaly Detection in Connected and Automated Vehicle Sensor Networks. Electronics 2024, 13, 1885. [Google Scholar] [CrossRef]
  53. Qin, J.; Xun, Y.; Liu, J. CVMIDS: Cloud-Vehicle Collaborative Intrusion Detection System for Internet of Vehicles. IEEE Internet Things J. 2024, 11, 321–332. [Google Scholar] [CrossRef]
  54. Jasim, M.S.; Zaghden, N.; Bouhlel, M.S. Improving Detection and Prediction of Traffic Congestion in VANETs: An Examination of Machine Learning. Int. J. Comput. Digit. Syst. 2024, 15, 947–960. [Google Scholar] [CrossRef]
  55. Yang, L.; Shami, A. A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 2774–2779. [Google Scholar] [CrossRef]
  56. Jin, Z.; Zhou, J.; Li, B.; Wu, X.; Duan, C. FL-IIDS: A novel federated learning-based incremental intrusion detection system. Future Gener. Comput. Syst. 2024, 151, 57–70. [Google Scholar] [CrossRef]
  57. Ghaleb, F.A.; Saeed, F.; Al-Sarem, M.; Al-rimy, B.A.S.; Boulila, W.; Eljialy, A.E.M.; Aloufi, K.; Alazab, M. Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET. Electronics 2020, 9, 1411. [Google Scholar] [CrossRef]
  58. Aggarwal, K.; Kaddoum, G. LSTM-Based Hybrid Intrusion Detection System for Internet of Vehicles. In Proceedings of the GLOBECOM 2023—2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 4–8 December 2023; pp. 3831–3836. [Google Scholar] [CrossRef]
  59. Anyanwu, G.O.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Novel Hyper-Tuned Ensemble Random Forest Algorithm for Detecting False Basic Safety Messages in the Internet of Vehicles. ICT Express 2023, 9, 122–129. [Google Scholar] [CrossRef]
  60. Gou, W.; Zhang, H.; Zhang, R. Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles. Sensors 2023, 23, 8788. [Google Scholar] [CrossRef] [PubMed]
  61. Sani, A.R.; Hassan, M.U.; Chen, J. Privacy-preserving machine learning for electric vehicles: A survey. arXiv 2022, arXiv:2205.08462. [Google Scholar]
  62. Zhao, Y.; Xun, Y.; Liu, J. ClockIDS: A Real-Time Vehicle Intrusion Detection System Based on Clock Skew. IEEE Internet Things J. 2022, 9, 15593–15606. [Google Scholar] [CrossRef]
  63. Ali, M.N.; Imran, M.; Ullah, I.; Raza, G.M.; Kim, H.-Y.; Kim, B.-S. Ensemble and Gossip Learning-Based Framework for Intrusion Detection System in Vehicle-to-Everything Communication Environment. Sensors 2024, 24, 6528. [Google Scholar] [CrossRef] [PubMed]
  64. Wang, Y.; Qin, G.; Zou, M.; Liang, Y.; Wang, G.; Wang, K.; Feng, Y.; Zhang, Z. A lightweight intrusion detection system for internet of vehicles based on transfer learning and MobileNetV2 with hyper-parameter optimization. Multimed. Tools Appl. 2024, 83, 22347–22369. [Google Scholar] [CrossRef]
  65. Sebastian, A.; Pragna, R.; Sudhakaran, G.; Renjith, P.N.; Leela Karthikeyan, H. Enhancing Intrusion Detection in Internet of Vehicles Through Federated Learning. arXiv 2023. [Google Scholar] [CrossRef]
  66. Dasari, D.R.; Bindu, G.H. An Intelligent Intrusion Detection System in IoV Using Machine Learning and Deep Learning Models. Int. J. Commun. Syst. 2025, 38, e70131. [Google Scholar] [CrossRef]
  67. Alani, M.M.; Awad, A.I.; Barka, E. A Hybrid Ensemble Learning-Based Intrusion Detection System for the Internet of Things. In Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience, CSR 2024, London, UK, 2–4 September 2024; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2024; pp. 1–8. [Google Scholar] [CrossRef]
  68. Bhardwaj, A.; Singh, A.; Kaur, A. A Review on Machine Learning Algorithms for Intrusion Detection Systems in IoT Networks. Comput. Secur. 2021, 102, 102139. [Google Scholar] [CrossRef]
  69. Boualouache, A.; Engel, T. A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks. IEEE Commun. Surv. Tutor. 2023, 25, 1128–1172. [Google Scholar] [CrossRef]
  70. Alsarhan, A.; Alauthman, M.; Alshdaifat, E.; Alghuwairi, A.; Al-Dubai, A. Machine Learning-Driven Optimization for SVM-Based Intrusion Detection System in Vehicular Ad Hoc Networks. J. Ambient Intell. Humaniz. Comput. 2023, 14, 6113–6122. [Google Scholar] [CrossRef]
  71. Banafshehvaragh, S.T.; Rahmani, A.M. Intrusion, Anomaly, and Attack Detection in Smart Vehicles. Microprocess. Microsyst. 2023, 96, 104726. [Google Scholar] [CrossRef]
  72. Yang, L.; Moubayed, A.; Shami, A. MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles. IEEE Internet Things J. 2022, 9, 616–632. [Google Scholar] [CrossRef]
  73. Anand, M.; Kumar, S.P.; Selvi, M.; SVN, S.K.; Ram, G.D.; Kannan, A. Deep Learning Model-Based IDS for Detecting Cyber Attacks in IoT-Based Smart Vehicle Networks. In Proceedings of the 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), Chennai, India, 23–25 March 2023; pp. 281–286. [Google Scholar]
  74. Lampe, B.E.; Meng, W. Intrusion Detection in the Automotive Domain: A Comprehensive Review. IEEE Commun. Surv. Tutor. 2023, 25, 2356–2426. [Google Scholar] [CrossRef]
  75. Haddaji, A.; Ayed, S.; Chaari Fourati, L.; Merghem Boulahia, L. Investigation of Security Threat Datasets for Intra- and Inter-Vehicular Environments. Sensors 2024, 24, 3431. [Google Scholar] [CrossRef] [PubMed]
  76. Gu, X.; Wu, Q.; Fan, P.; Cheng, N.; Chen, W.; Letaief, K.B. DRL-based federated self-supervised learning for task offloading and resource allocation in ISAC-enabled vehicle edge computing. Digit. Commun. Netw. 2024; in press. [Google Scholar] [CrossRef]
  77. Tran, A.T.; Luong, T.D.; Huynh, V.N. A Comprehensive Survey and Taxonomy on Privacy-Preserving Deep Learning. Neurocomputing 2024, 576, 127345. [Google Scholar] [CrossRef]
  78. Alalwany, E.; Mahgoub, I. An Effective Ensemble Learning-Based Real-Time Intrusion Detection Scheme for an In-Vehicle Network. Electronics 2024, 13, 919. [Google Scholar] [CrossRef]
  79. Xiao, J.; Chen, H.; Zhong, F. A Novel Feature Extraction Framework Using Graph Node Attention Network for In-Vehicle Networks Intrusion Detection. IEEE Syst. J. 2024, 18, 150–161. [Google Scholar] [CrossRef]
  80. Hussein, N.H.; Yaw, C.T.; Koh, S.P.; Tiong, S.K.; Chong, K.H. A Comprehensive Survey on Vehicular Networking: Communications, Applications, Challenges, and Upcoming Research Directions. IEEE Access 2022, 10, 86127–86180. [Google Scholar] [CrossRef]
  81. Kandali, K.; Bennis, L.; Bannay, O.E.; Bennis, H. An Intelligent Machine Learning Based Routing Scheme for VANET. IEEE Access 2022, 10, 74318–74333. [Google Scholar] [CrossRef]
  82. Alalwany, E.; Mahgoub, I. Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions. Sensors 2024, 24, 368. [Google Scholar] [CrossRef] [PubMed]
  83. Mchergui, A.; Moulahi, T.; Zeadally, S. Survey on Artificial Intelligence (AI) Techniques for Vehicular Ad-hoc Networks (VANETs). Veh. Commun. 2022, 34, 100403. [Google Scholar] [CrossRef]
  84. Albogami, N.N. Intelligent Deep Federated Learning Model for Enhancing Security in Internet of Things Enabled Edge Computing Environment. Sci. Rep. 2025, 15, 4041. [Google Scholar] [CrossRef] [PubMed]
  85. Rakhmanov, A.; Wiseman, Y. Compression of GNSS Data with the Aim of Speeding up Communication to Autonomous Vehicles. Remote Sens. 2023, 15, 2165. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.