AI-Driven Security Framework for Internet of Mobility Things: A Mixed-Methods Analysis of Machine Learning Applications in Connected Vehicle Networks

Authors

  • Tamara Saad Mohamed Engineering of Computer Techniques Department, University of Kut, Kut, Iraq. Author

DOI:

https://doi.org/10.59675/E323

Keywords:

Internet of Mobility Things, AI security, federated learning, intrusion detection, vehicular networks, cybersecurity.

Abstract

Internet of Mobility Things (IoMT) is the future of transport in a nutshell. It is a car mash-up that combines chat, self-driving technology, and intelligent road technology, utilizing high-tech communications. This article combines two methods to understand how AI can be used to make IoMT safe: a systematic literature review and hands-on experiments. We filtered 45 papers in 202025 and also tested machine-learning models on typical car information. The review featured such AI giants as deep neural networks, federated learning, and adversarial training. At the end of the data, campus area networks CAN bus attack data was proven to yield our convolution neural networks CNNs a 99.2% detection rate and a 0.58% false positive result. Fed-learning models made 97.8% correct with data confidentiality. Altogether, artificial intelligence AI introduces numerous benefits in terms of security; yet we continue to encounter limitations due to the limitations of computer power and the necessity to operate in real-time. We consider that the hybrid AI-plus-traditional model is the most suitable solution to IoMT security. This paper will help establish standard AI security systems for next generation connected mobility. 

References

Musa AA, Malami SI, Alanazi F, Ounaies W, Alshammari M, Haruna SI. Sustainable traffic management for smart cities using internet-of-things-oriented intelligent transportation systems (ITS): challenges and recommendations. Sustainability. 2023;15(13):9859.

Elassy M, Al-Hattab M, Takruri M, Badawi S. Intelligent transportation systems for sustainable smart cities. Transp Eng. 2024;16:100252.

Ahmad K, Khujamatov H, Lazarev A, Usmanova N, Alduailij M, Alduailij M. Internet of things‐aided intelligent transport systems in smart cities: Challenges, opportunities, and future. Wirel Commun Mob Comput. 2023;2023(1):7989079.

Bedulli, F., Leite, R., Freitas, F., Murari T et al. Optimizing Automotive Product Development: Integration of Electronic Control Units and Virtual Prototypes Using Virtual Reality. Conf SAE Bras 2023 Congr. 2023;

AlAbidy A, Zaben A, Abu-Sharkh OMF, Noman HA. A survey on AI-based detection methods of GPS spoofing attacks on UAVs. In: 2024 IEEE 12th International Conference on Intelligent Systems (IS). IEEE; 2024. p. 1–13.

Chu K-F, Guo W. Passenger spoofing attack for artificial intelligence-based mobility-as-a-service. In: 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC). IEEE; 2023. p. 4874–80.

Vajrobol V, Saxena GJ, Pundir A, Singh S, B. Gupta B, Gaurav A, et al. Identify spoofing attacks in Internet of Things (IoT) environments using machine learning algorithms. J High Speed Networks. 2025;31(1):61–70.

Li W, Wang N, Ma C, Xiang T, Zeng K. DroneMA: Drone Mobility Alignment Countering AI-Based Spoofing Attacks. In: IEEE INFOCOM 2025-IEEE Conference on Computer Communications. IEEE; 2025. p. 1–10.

Imtiaz N, Wahid A, Ul Abideen SZ, Muhammad Kamal M, Sehito N, Khan S, et al. A deep learning-based approach for the detection of various internet of things intrusion attacks through optical networks. In: Photonics. MDPI; 2025. p. 35.

Tahsien SM, Karimipour H, Spachos P. Machine learning based solutions for security of Internet of Things (IoT): A survey. J Netw Comput Appl. 2020;161.

Qaddoura R, M. Al-Zoubi A, Faris H, Almomani I. A multi-layer classification approach for intrusion detection in iot networks based on deep learning. Sensors. 2021;21(9):2987.

Reis MJCS. Internet of Things and Artificial Intelligence for Secure and Sustainable Green Mobility: A Multimodal Data Fusion Approach to Enhance Efficiency and Security. Multimodal Technol Interact. 2025;9(5):39.

Malempati M, Balakrishnan P, Naveenkumar A, Kumar RS, Yadav OP, Koilraj T. Intelligent Mobility Solutions Utilizing Internet of Things and Artificial Intelligence for Sustainable Smart Transportation Networks. In: International Conference on Sustainability Innovation in Computing and Engineering (ICSICE 2024). Atlantis Press; 2025. p. 767–78.

Yousseef A, Lin Y-Z, Satam S, Latibari BS, Pacheco J, Salehi S, et al. Autonomous vehicle security: Hybrid threat modeling approach. IEEE Open J Veh Technol. 2025;

Shah UM, Minhas DM, Kifayat K, Shah KA, Frey G. Threat Modeling and Attacks on Digital Twins of Vehicles: A Systematic Literature Review. Smart Cities. 2025;

Yousseef A, Satam S, Latibari BS, Pacheco J, Salehi S, Hariri S, et al. Autonomous Vehicle Security: A Deep Dive into Threat Modeling. arXiv Prepr arXiv241215348. 2024;

Jnr BA. Artificial intelligence of things and distributed technologies as enablers for intelligent mobility services in smart cities-A survey. Internet of Things. 2024;28:101399.

Jagatheesaperumal SK, Bibri SE, Huang J, Rajapandian J, Parthiban B. Artificial intelligence of things for smart cities: advanced solutions for enhancing transportation safety. Comput Urban Sci. 2024;4(1):10.

Micheal D. Secure and Intelligent Digital Environments: Leveraging APIs, IoT, Drones, and Machine Learning to Protect Critical Systems and Information Flows. 2025;

Ibitoye JS. Securing Smart Grid and Critical Infrastructure through AI-Enhanced Cloud Networking.

Qureshi KN, Din S, Jeon G, Piccialli F. Internet of vehicles: Key technologies, network model, solutions and challenges with future aspects. IEEE Trans Intell Transp Syst. 2020;22(3):1777–86.

Bagga P, Das AK, Wazid M, Rodrigues JJPC, Park Y. Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges. Ieee Access. 2020;8:54314–44.

Huang W, Shi Y, Cai Z, Suzuki T. Understanding convergence and generalization in federated learning through feature learning theory. In: The Twelfth International Conference on Learning Representations. 2023.

Wang S, Lee M, Hosseinalipour S, Morabito R, Chiang M, Brinton CG. Device sampling for heterogeneous federated learning: Theory, algorithms, and implementation. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications. IEEE; 2021. p. 1–10.

Menon UV, Kumaravelu VB, Kumar CV, Rammohan A, Chinnadurai S, Venkatesan R, et al. AI-powered IoT: A survey on integrating artificial intelligence with IoT for enhanced security, efficiency, and smart applications. IEEE Access. 2025;

Alakkari K, Ali B. Artificial Intelligence of Things: A Review. Babylonian J Internet Things. 2025;2025:113–20.

Singh V. AI-Driven Data Analytics for IoT-Based Urban Mobility Solutions. Comput Eng Technol Innov. 2024;1(2):114–21.

Anyonyi YI, Katambi J. The Role of AI in IoT Systems: A Semi-Systematic Literature Review. 2023;

Baptiste RA. Improving Security in the IoT Ecosystem of Autonomous Driving Vehicles. Bowie State University; 2025.

Sehwag A, Sahoo S, Pokhriyal A, Bhandari V, Agarwal A. Leveraging AI and ML Applications for Robust EV Information Security: A Review. Libr Progress-Library Sci Inf Technol Comput. 2024;44(3).

Alsadie D. Artificial intelligence techniques for securing fog computing environments: trends, challenges, and future directions. IEEE Access. 2024;

Sebestyen H, Popescu DE, Zmaranda RD. A literature review on security in the Internet of Things: Identifying and analysing critical categories. Computers. 2025;14(2):61.

Abreu R, Branco F, Reis MJCS, Serôdio C. Cybersecurity in Connected and Autonomous Vehicles: A Systematic Review of Automotive Security. IEEE Access. 2025;

Gad AR, Nashat AA, Barkat TM. Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset. IEEE access. 2021;9:142206–17.

Arroyo Á, Granados D, De Miguel F, Velasco N, Herrero Á. Dimensionality Reduction and Outlier Analysis for the NF-ToN-IoT Cybersecurity Dataset. In: International Work-Conference on Artificial Neural Networks. Springer; 2025. p. 392–401.

Bari BS, Puthal D, Yelamarthi K. Datasets in Vehicular Communication Systems: A Review of Current Trends and Future Prospects. SN Comput Sci. 2025;6(3):1–25.

Lampe B, Meng W. can-train-and-test: A new can intrusion detection dataset. In: 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall). IEEE; 2023. p. 1–7.

Raza U, Kulkarni P, Sooriyabandara M. Low power wide area networks: An overview. ieee Commun Surv tutorials. 2017;19(2):855–73.

Ismail D, Rahman M, Saifullah A. Low-power wide-area networks: opportunities, challenges, and directions. In: Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking. 2018. p. 1–6.

Chilamkurthy NS, Pandey OJ, Ghosh A, Cenkeramaddi LR, Dai H-N. Low-power wide-area networks: A broad overview of its different aspects. Ieee Access. 2022;10:81926–59.

Thakkar A, Lohiya R. A review on machine learning and deep learning perspectives of IDS for IoT: Recent updates, security issues, and challenges. Arch Comput methods Eng. 2021;28(4).

Mohamed TS, Aydin S. IoT-Based Intrusion Detection Systems: A Review. Smart Sci [Internet]. 2022 Oct 2;10(4):265–82. Available from: https://doi.org/10.1080/23080477.2021.1972914

Tamara Saad Mohamed, Saad Mohammed Khalifah. Intrusion Detection Systems: A Revisit of Performance Evaluation Parameters. Acad Int J Eng Sci. 2024;2(01):15–21.

Shan H, He K, Wang B, Fang X. Road vehicles Cybersecurity system evaluation method. In: Journal of Physics: Conference Series. IOP Publishing; 2020. p. 12054.

Steiro M-H. Personal data and the concept of consent under the EU General Data Protection Regulation With focus on data processing in and from vehicles. UiT Norges arktiske universitet; 2021.

Aldhyani THH, Alkahtani H. Attacks to automatous vehicles: A deep learning algorithm for cybersecurity. Sensors. 2022;22(1):360.

Awad AI, Babu A, Barka E, Shuaib K. AI-powered biometrics for Internet of Things security: A review and future vision. J Inf Secur Appl [Internet]. 2024;82(March):103748. Available from: https://doi.org/10.1016/j.jisa.2024.103748

Khan AR, Kashif M, Jhaveri RH, Raut R, Saba T, Bahaj SA. Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions. Secur Commun Networks. 2022;2022.

Gecer M, Garbinato B. Federated learning for mobility applications. ACM Comput Surv. 2024;56(5):1–28.

Du Z, Wu C, Yoshinaga T, Yau K-LA, Ji Y, Li J. Federated learning for vehicular internet of things: Recent advances and open issues. IEEE Open J Comput Soc. 2020;1:45–61.

Belal Y, Ben Mokhtar S, Haddadi H, Wang J, Mashhadi A. Survey of federated learning models for spatial-temporal mobility applications. ACM Trans Spat Algorithms Syst. 2024;10(3):1–39.

Ali W, Din IU, Almogren A, Rodrigues JJPC. Federated learning-based privacy-aware location prediction model for internet of vehicular things. IEEE Trans Veh Technol. 2024;74(2):1968–78.

Alsadie D. Artificial Intelligence Techniques for Securing Fog Computing Environments: Trends, Challenges, and Future Directions. IEEE Access. 2024;12(September):151598–648.

Tyagi AK, Mishra AK, Kukreja S. Role of Artificial Intelligence Enabled Internet of Things (IoT) in the Automobile Industry: Opportunities and Challenges for Society. In: International Conference on Cognitive Computing and Cyber Physical Systems. Springer; 2023. p. 379–97.

Agbo O, Hefeida M, El-Wakeel AS. Hybrid-CNN Intrusion Detection Framework for CAN Networks in Connected and Autonomous Vehicles. IEEE Internet Things J. 2025;

Alfahaid A, Alalwany E, Almars AM, Alharbi F, Atlam E, Mahgoub I. Machine Learning-Based Security Solutions for IoT Networks: A Comprehensive Survey. Sensors. 2025;25(11):3341.

Published

2025-10-20

Issue

Section

Articles

How to Cite

Tamara Saad Mohamed. (2025). AI-Driven Security Framework for Internet of Mobility Things: A Mixed-Methods Analysis of Machine Learning Applications in Connected Vehicle Networks. Academic International Journal of Engineering Science, 3(02), 36-50. https://doi.org/10.59675/E323

Most read articles by the same author(s)

Similar Articles

1-10 of 27

You may also start an advanced similarity search for this article.