Table 24 Comparative analysis of security mechanisms in VANETs.

From: A hybrid deep learning model for detection and mitigation of DDoS attacks in VANETs

Security Mechanism

Strengths

Weaknesses

Ideal Use Cases

Limitations in VANETs

Blockchain-based security

- Decentralized trust

- Immutable logs

- Tamper resistance

- Distributed consensus

- High latency

- Scalability issues

- High resource demand

- Secure logging and distributed trust updates

- Mitigation of Sybil and replay attacks

- Less effective in low-latency environments

- Requires careful consensus optimization

Public Key Infrastructure (PKI)

- Established standard

- Efficient for authentication

- Low computational cost

- Centralized Certificate Authorities

- Vulnerable to CA compromise

- Authentication in controlled environments

- Ineffective in decentralized or infrastructure-less settings

Trust-based models

- Lightweight

- Fast decision-making

- Adaptive to behavior changes

- Vulnerable to trust poisoning

- Difficult to scale securely

- Quick detection of misbehaving nodes in small or medium networks

- Prone to malicious trust manipulation

AI-based IDS

- Capable of detecting unknown attacks

- Adaptive with training

- High detection rate

- Requires large datasets

- Needs constant retraining

- Black-box behavior

- Real-time anomaly detection

- Behavioral-based attack recognition

- Less transparent; explainability and trust issues in critical systems