Table 24 Comparative analysis of security mechanisms in VANETs.
From: A hybrid deep learning model for detection and mitigation of DDoS attacks in VANETs
Security Mechanism | Strengths | Weaknesses | Ideal Use Cases | Limitations in VANETs |
|---|---|---|---|---|
Blockchain-based security | - Decentralized trust - Immutable logs - Tamper resistance - Distributed consensus | - High latency - Scalability issues - High resource demand | - Secure logging and distributed trust updates - Mitigation of Sybil and replay attacks | - Less effective in low-latency environments - Requires careful consensus optimization |
Public Key Infrastructure (PKI) | - Established standard - Efficient for authentication - Low computational cost | - Centralized Certificate Authorities - Vulnerable to CA compromise | - Authentication in controlled environments | - Ineffective in decentralized or infrastructure-less settings |
Trust-based models | - Lightweight - Fast decision-making - Adaptive to behavior changes | - Vulnerable to trust poisoning - Difficult to scale securely | - Quick detection of misbehaving nodes in small or medium networks | - Prone to malicious trust manipulation |
AI-based IDS | - Capable of detecting unknown attacks - Adaptive with training - High detection rate | - Requires large datasets - Needs constant retraining - Black-box behavior | - Real-time anomaly detection - Behavioral-based attack recognition | - Less transparent; explainability and trust issues in critical systems |