Abstract: Highlights•Providing a background for components, network standards, and services used for IoV.•Categorizing security breaches in the IoV with their impact and the security targets.•Delivering a solid review on previous studies in ML-based intrusion detection system.•Proposing a mechanism assessing the components to develop intrusion detection system.•Discussing all the open research problems for intrusion detection systems.
Loading