Table 1 The comparison of existing methods.

From: Sustainable cyber-physical VANETs with AI-driven anomaly detection and energy-efficient multi-criteria routing using machine learning algorithms

SI No

Methods

Advantages

Limitations

1

Ensemble LSTM-based IDS for ICTS12

Effective in detecting cyber threats in V2V, IVN, and V2I networks

Maximises data flow and enhances security

Increases smart network efficiency

Requires large datasets for training

Might not handle highly dynamic or unpredictable data well

2

AI-Based Anomaly Detection in CAN Systems13

Improves vehicle data security using AI

Identifies complex anomalies in CAN systems

Focus on privacy

Limited by the scalability of the techniques

Performance can vary depending on data quality and availability

4

AI-Based VANET Solutions14

Enhances traffic safety and efficiency

Optimises routing and driver awareness

Improves passenger comfort and road experience

Potential difficulties in implementing AI in real-time traffic conditions

High computational resources may be required for some AI techniques

5

AI-Based Security Solutions for Vehicular Networks15

Identifies and addresses security issues in vehicular networks

Proposes a new taxonomy for comparing AI-based solutions

May face challenges in handling highly dynamic and large-scale vehicular network data

Complexity of integration with existing infrastructure

6

AI-IoT-5G/6G for VANETs16

Combines AI, IoT, and 5G/6G to enhance connectivity and security

Improves routing, mobility prediction, and driver awareness

5G/6G infrastructure is still developing

Potential privacy and security concerns when handling sensitive data across various systems

7

Hybrid CNN-GAN Model for Anomaly Detection17

High detection rates and minimal false positives

Improves network security by generating normal traffic patterns to detect anomalies

Require a large labeled dataset

Complex training process and resource-intensive

8

ML-Based Security for EnFVs20

Enhances safety with predictive maintenance and cyberattack detection

Aims for privacy-preserving and real-time solutions

Real-world implementation challenges

Ethical considerations and the complexity of applying ML techniques in resource-constrained environments

9

Transfer learning BILSTM21

High detection accuracy for IoT botnet attacks

Transfer learning improves generalisation

Potential dataset bias

Computational overhead and resource constraints