Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2023

10-07-2023

Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey

Authors: Jay Nagarajan, Pegah Mansourian, Muhammad Anwar Shahid, Arunita Jaekel, Ikjot Saini, Ning Zhang, Marc Kneppers

Published in: Peer-to-Peer Networking and Applications | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Connected and Autonomous Vehicles (CAVs) expect to dramatically improve road safety and efficiency of the transportation system. However, CAVs can be vulnerable to attacks at different levels, e.g., attacks on intra-vehicle networks and inter-vehicle networks. Those malicious attacks not only result in loss of confidentiality and user privacy but also lead to more serious consequences such as bodily injury and loss of life. An intrusion detection system (IDS) is one of the most effective ways to monitor the operations of vehicles and networks, detect different types of attacks, and provide essential information to mitigate and remedy the effects of attacks. To ensure the safety of CAVs, it is extremely important to detect various attacks accurately in a timely fashion. The purpose of this survey is to provide a comprehensive review of available machine learning (ML) based IDS for intra-vehicle and inter-vehicle networks. Additionally, this paper discusses publicly available datasets for CAV and offers a summary of the many current testbeds and future research trends for connected vehicle environments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ye X, Zhou J, Li Y, Cao M, Chen D, Qin Z (2021) A location privacy protection scheme for convoy driving in autonomous driving era. Peer Peer Netw Appl 14(3):1388–1400 Ye X, Zhou J, Li Y, Cao M, Chen D, Qin Z (2021) A location privacy protection scheme for convoy driving in autonomous driving era. Peer Peer Netw Appl 14(3):1388–1400
2.
go back to reference Yang Q, Fu S, Wang H, Fang H (2021) Machine-learning-enabled cooperative perception for connected autonomous vehicles: challenges and opportunities. IEEE Netw 35(3):96–101 Yang Q, Fu S, Wang H, Fang H (2021) Machine-learning-enabled cooperative perception for connected autonomous vehicles: challenges and opportunities. IEEE Netw 35(3):96–101
3.
go back to reference Taherkhani N, Pierre S (2016) Centralized and localized data congestion control strategy for vehicular ad hoc networks using a machine learning clustering algorithm. IEEE Trans Intell Transp Syst 17(11):3275–3285 Taherkhani N, Pierre S (2016) Centralized and localized data congestion control strategy for vehicular ad hoc networks using a machine learning clustering algorithm. IEEE Trans Intell Transp Syst 17(11):3275–3285
4.
go back to reference Reebadiya D, Rathod T, Gupta R, Tanwar S, Kumar N (2021) Blockchain-based secure and intelligent sensing scheme for autonomous vehicles activity tracking beyond 5G networks. Peer Peer Netw Appl 14(5):2757–2774 Reebadiya D, Rathod T, Gupta R, Tanwar S, Kumar N (2021) Blockchain-based secure and intelligent sensing scheme for autonomous vehicles activity tracking beyond 5G networks. Peer Peer Netw Appl 14(5):2757–2774
5.
go back to reference Sun X, Yu FR, Zhang P (2021) A survey on cyber-security of connected and autonomous vehicles (CAVS). IEEE Trans Intell Transp Syst Sun X, Yu FR, Zhang P (2021) A survey on cyber-security of connected and autonomous vehicles (CAVS). IEEE Trans Intell Transp Syst
6.
go back to reference Feng X, Li C-Y, Chen D-X, Tang J (2017) A method for defensing against multi-source sybil attacks in VANET. Peer Peer Netw Appl 10(2):305–314 Feng X, Li C-Y, Chen D-X, Tang J (2017) A method for defensing against multi-source sybil attacks in VANET. Peer Peer Netw Appl 10(2):305–314
7.
go back to reference Wang S, Mao K, Zhan F, Liu D (2020) Hybrid conditional privacy-preserving authentication scheme for VANETs. Peer Peer Netw Appl 13(5):1600–1615 Wang S, Mao K, Zhan F, Liu D (2020) Hybrid conditional privacy-preserving authentication scheme for VANETs. Peer Peer Netw Appl 13(5):1600–1615
8.
go back to reference Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91) Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91)
9.
go back to reference Kumar SV, Mary GAA, Suresh P, Uthirasamy R (2021) Investigation on cyber-attacks against in-vehicle network. In: 2021 7th International Conference on Electrical Energy Systems (ICEES). IEEE, pp 305–311 Kumar SV, Mary GAA, Suresh P, Uthirasamy R (2021) Investigation on cyber-attacks against in-vehicle network. In: 2021 7th International Conference on Electrical Energy Systems (ICEES). IEEE, pp 305–311
10.
go back to reference Wolf M, Weimerskirch A, Wollinger T (2007) State of the art: embedding security in vehicles. EURASIP J Embed Syst 2007:1–16 Wolf M, Weimerskirch A, Wollinger T (2007) State of the art: embedding security in vehicles. EURASIP J Embed Syst 2007:1–16
11.
go back to reference Vdovic H, Babic J, Podobnik V (2019) Automotive software in connected and autonomous electric vehicles: a review. IEEE Access 7:166365–166379 Vdovic H, Babic J, Podobnik V (2019) Automotive software in connected and autonomous electric vehicles: a review. IEEE Access 7:166365–166379
12.
go back to reference Lu N, Zhang N, Cheng N, Shen X, Mark JW, Bai F (2013) Vehicles meet infrastructure: toward capacity-cost tradeoffs for vehicular access networks. IEEE Trans Intell Transp Syst 14(3):1266–1277 Lu N, Zhang N, Cheng N, Shen X, Mark JW, Bai F (2013) Vehicles meet infrastructure: toward capacity-cost tradeoffs for vehicular access networks. IEEE Trans Intell Transp Syst 14(3):1266–1277
13.
go back to reference Zhang N, Zhang S, Yang P, Alhussein O, Zhuang W, Shen XS (2017) Software defined space-air-ground integrated vehicular networks: challenges and solutions. IEEE Commun Mag 55(7):101–109 Zhang N, Zhang S, Yang P, Alhussein O, Zhuang W, Shen XS (2017) Software defined space-air-ground integrated vehicular networks: challenges and solutions. IEEE Commun Mag 55(7):101–109
14.
go back to reference Kumar D, Barani S (2021) Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs). Peer Peer Netw Appl 14(4):2524–2536 Kumar D, Barani S (2021) Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs). Peer Peer Netw Appl 14(4):2524–2536
15.
go back to reference Lu N, Cheng N, Zhang N, Shen X, Mark JW (2014) Connected vehicles: solutions and challenges. IEEE Internet Things J 1(4):289–299 Lu N, Cheng N, Zhang N, Shen X, Mark JW (2014) Connected vehicles: solutions and challenges. IEEE Internet Things J 1(4):289–299
16.
go back to reference Loukas G, Karapistoli E, Panaousis E, Sarigiannidis P, Bezemskij A, Vuong T (2019) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Netw 84:124–147 Loukas G, Karapistoli E, Panaousis E, Sarigiannidis P, Bezemskij A, Vuong T (2019) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Netw 84:124–147
17.
go back to reference Kim K, Kim JS, Jeong S, Park J-H, Kim HK (2021) Cybersecurity for autonomous vehicles: review of attacks and defense. Comput Secur 103:102150 Kim K, Kim JS, Jeong S, Park J-H, Kim HK (2021) Cybersecurity for autonomous vehicles: review of attacks and defense. Comput Secur 103:102150
18.
go back to reference Karopoulos G, Kambourakis G, Chatzoglou E, Hernández-Ramos JL, Kouliaridis V (2022) Demystifying in-vehicle intrusion detection systems: a survey of surveys and a meta-taxonomy. Electronics 11(7):1072 Karopoulos G, Kambourakis G, Chatzoglou E, Hernández-Ramos JL, Kouliaridis V (2022) Demystifying in-vehicle intrusion detection systems: a survey of surveys and a meta-taxonomy. Electronics 11(7):1072
19.
go back to reference Al-Jarrah OY, Maple C, Dianati M, Oxtoby D, Mouzakitis A (2019) Intrusion detection systems for intra-vehicle networks: a review. IEEE Access 7:21266–21289 Al-Jarrah OY, Maple C, Dianati M, Oxtoby D, Mouzakitis A (2019) Intrusion detection systems for intra-vehicle networks: a review. IEEE Access 7:21266–21289
20.
go back to reference Wu W, Li R, Xie G, An J, Bai Y, Zhou J, Li K (2019) A survey of intrusion detection for in-vehicle networks. IEEE Trans Intell Transp Syst 21(3):919–933 Wu W, Li R, Xie G, An J, Bai Y, Zhou J, Li K (2019) A survey of intrusion detection for in-vehicle networks. IEEE Trans Intell Transp Syst 21(3):919–933
21.
go back to reference Bangui H, Buhnova B (2021) Recent advances in machine-learning driven intrusion detection in transportation: survey. Procedia Comput Sci 184:877–886 Bangui H, Buhnova B (2021) Recent advances in machine-learning driven intrusion detection in transportation: survey. Procedia Comput Sci 184:877–886
22.
go back to reference Young C, Zambreno J, Olufowobi H, Bloom G (2019) Survey of automotive controller area network intrusion detection systems. IEEE Des Test 36(6):48–55 Young C, Zambreno J, Olufowobi H, Bloom G (2019) Survey of automotive controller area network intrusion detection systems. IEEE Des Test 36(6):48–55
23.
go back to reference LIN Specification Package (2003) Revision 2.0, LIN consortium LIN Specification Package (2003) Revision 2.0, LIN consortium
24.
go back to reference FlexRay Consortium et al (2010) Flexray communication systems protocol specification, version 3.0. 1 [ol] FlexRay Consortium et al (2010) Flexray communication systems protocol specification, version 3.0. 1 [ol]
25.
go back to reference MOST Cooperation (2009) Most specification 3v0. pp 1–20 MOST Cooperation (2009) Most specification 3v0. pp 1–20
26.
go back to reference Specification CAN (1991) Version 2. Phillips Semiconductors, Hamburg Specification CAN (1991) Version 2. Phillips Semiconductors, Hamburg
27.
go back to reference Hank P, Müller S, Vermesan O, Van Den Keybus J (2013) Automotive ethernet: in-vehicle networking and smart mobility. In: Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE 2013:1735–1739 Hank P, Müller S, Vermesan O, Van Den Keybus J (2013) Automotive ethernet: in-vehicle networking and smart mobility. In: Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE 2013:1735–1739
28.
go back to reference IEEE 802.1 Working Group et al (1999) Local and metropolitan area networks-virtual bridged local area networks. IEEE Std 802.1 Q-1998 IEEE 802.1 Working Group et al (1999) Local and metropolitan area networks-virtual bridged local area networks. IEEE Std 802.1 Q-1998
29.
go back to reference IEEE Standards Association et al (2011) IEEE standard for local and metropolitan area networks–timing and synchronization for time-sensitive applications in bridged local area networks. IEEE Std 802 IEEE Standards Association et al (2011) IEEE standard for local and metropolitan area networks–timing and synchronization for time-sensitive applications in bridged local area networks. IEEE Std 802
30.
31.
go back to reference Sun Y, Wu L, Wu S, Li S, Zhang T, Zhang L, Xu J, Xiong Y, Cui X (2017) Attacks and countermeasures in the internet of vehicles. Ann Telecommun 72(5):283–295 Sun Y, Wu L, Wu S, Li S, Zhang T, Zhang L, Xu J, Xiong Y, Cui X (2017) Attacks and countermeasures in the internet of vehicles. Ann Telecommun 72(5):283–295
32.
go back to reference Taylor A, Japkowicz N, Leblanc S (2015) Frequency-based anomaly detection for the automotive CAN BUS. In: 2015 World Congress on Industrial Control Systems Security (WCICSS). IEEE, pp 45–49 Taylor A, Japkowicz N, Leblanc S (2015) Frequency-based anomaly detection for the automotive CAN BUS. In: 2015 World Congress on Industrial Control Systems Security (WCICSS). IEEE, pp 45–49
33.
go back to reference Marchetti M, Stabili D (2017) Anomaly detection of CAN bus messages through analysis of id sequences. In: 2017 IEEE Intelligent Vehicles Symposium (IV). IEEE, pp 1577–1583 Marchetti M, Stabili D (2017) Anomaly detection of CAN bus messages through analysis of id sequences. In: 2017 IEEE Intelligent Vehicles Symposium (IV). IEEE, pp 1577–1583
34.
go back to reference Lee H, Jeong SH, Kim HK (2017) Otids: a novel intrusion detection system for in-vehicle network by using remote frame. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 57–5709 Lee H, Jeong SH, Kim HK (2017) Otids: a novel intrusion detection system for in-vehicle network by using remote frame. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 57–5709
35.
go back to reference Rieke R, Seidemann M, Talla EK, Zelle D, Seeger B (2017) Behavior analysis for safety and security in automotive systems. In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP). IEEE, pp 381–385 Rieke R, Seidemann M, Talla EK, Zelle D, Seeger B (2017) Behavior analysis for safety and security in automotive systems. In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP). IEEE, pp 381–385
36.
go back to reference Mo X, Chen P, Wang J, Wang C (2019) Anomaly detection of vehicle CAN network based on message content. In: International Conference on Security and Privacy in New Computing Environments. Springer, pp 96–104 Mo X, Chen P, Wang J, Wang C (2019) Anomaly detection of vehicle CAN network based on message content. In: International Conference on Security and Privacy in New Computing Environments. Springer, pp 96–104
37.
go back to reference Sunny J, Sankaran S, Saraswat V (2020) A hybrid approach for fast anomaly detection in controller area networks. In: 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6 Sunny J, Sankaran S, Saraswat V (2020) A hybrid approach for fast anomaly detection in controller area networks. In: 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6
38.
go back to reference Theissler A (2014) Anomaly detection in recordings from in-vehicle networks. Big Data and Applications 23:26 Theissler A (2014) Anomaly detection in recordings from in-vehicle networks. Big Data and Applications 23:26
39.
go back to reference Avatefipour O, Al-Sumaiti AS, El-Sherbeeny AM, Awwad EM, Elmeligy MA, Mohamed MA, Malik H (2019) An intelligent secured framework for cyberattack detection in electric vehicles’ CAN bus using machine learning. IEEE Access 7:127580–127592 Avatefipour O, Al-Sumaiti AS, El-Sherbeeny AM, Awwad EM, Elmeligy MA, Mohamed MA, Malik H (2019) An intelligent secured framework for cyberattack detection in electric vehicles’ CAN bus using machine learning. IEEE Access 7:127580–127592
40.
go back to reference Al-Saud M, Eltamaly AM, Mohamed MA, Kavousi-Fard A (2019) An intelligent data-driven model to secure intravehicle communications based on machine learning. IEEE Trans Industr Electron 67(6):5112–5119 Al-Saud M, Eltamaly AM, Mohamed MA, Kavousi-Fard A (2019) An intelligent data-driven model to secure intravehicle communications based on machine learning. IEEE Trans Industr Electron 67(6):5112–5119
41.
go back to reference Narayanan SN, Mittal S, Joshi A (2016) Obd_securealert: an anomaly detection system for vehicles. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, pp 1–6 Narayanan SN, Mittal S, Joshi A (2016) Obd_securealert: an anomaly detection system for vehicles. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, pp 1–6
42.
go back to reference Levi M, Allouche Y, Kontorovich A (2018) Advanced analytics for connected car cybersecurity. In: 2018 IEEE 87th vehicular technology conference (VTC spring). IEEE, pp 1–7 Levi M, Allouche Y, Kontorovich A (2018) Advanced analytics for connected car cybersecurity. In: 2018 IEEE 87th vehicular technology conference (VTC spring). IEEE, pp 1–7
43.
go back to reference Casillo M, Coppola S, De Santo M, Pascale F, Santonicola E (2019) Embedded intrusion detection system for detecting attacks over CAN-BUS. In: 2019 4th International Conference on System Reliability and Safety (ICSRS). IEEE, pp 136–141 Casillo M, Coppola S, De Santo M, Pascale F, Santonicola E (2019) Embedded intrusion detection system for detecting attacks over CAN-BUS. In: 2019 4th International Conference on System Reliability and Safety (ICSRS). IEEE, pp 136–141
44.
go back to reference Tian D, Li Y, Wang Y, Duan X, Wang C, Wang W, Hui R, Guo P (2017) An intrusion detection system based on machine learning for CAN-BUS. In: International Conference on Industrial Networks and Intelligent Systems. Springer, pp 285–294 Tian D, Li Y, Wang Y, Duan X, Wang C, Wang W, Hui R, Guo P (2017) An intrusion detection system based on machine learning for CAN-BUS. In: International Conference on Industrial Networks and Intelligent Systems. Springer, pp 285–294
45.
go back to reference Han ML, Kwak BI, Kim HK (2021) Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network. IEEE Trans Inf Forensics Secur 16:2941–2956 Han ML, Kwak BI, Kim HK (2021) Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network. IEEE Trans Inf Forensics Secur 16:2941–2956
46.
go back to reference Yang L, Moubayed A, Shami A (2021) MTH-IDS: a multi-tiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J Yang L, Moubayed A, Shami A (2021) MTH-IDS: a multi-tiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J
47.
go back to reference Kang M-J, Kang J-W (2016) A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, pp 1–5 Kang M-J, Kang J-W (2016) A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, pp 1–5
48.
go back to reference Zhang J, Li F, Zhang H, Li R, Li Y (2019) Intrusion detection system using deep learning for in-vehicle security. Ad Hoc Netw 95:101974 Zhang J, Li F, Zhang H, Li R, Li Y (2019) Intrusion detection system using deep learning for in-vehicle security. Ad Hoc Netw 95:101974
49.
go back to reference Wang C, Zhao Z, Gong L, Zhu L, Liu Z, Cheng X (2018) A distributed anomaly detection system for in-vehicle network using htm. IEEE Access 6:9091–9098 Wang C, Zhao Z, Gong L, Zhu L, Liu Z, Cheng X (2018) A distributed anomaly detection system for in-vehicle network using htm. IEEE Access 6:9091–9098
50.
go back to reference Kohonen T (1990) The self-organizing map. Proc IEEE 78(9):1464–1480 Kohonen T (1990) The self-organizing map. Proc IEEE 78(9):1464–1480
51.
go back to reference Song HM, Woo J, Kim HK (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:100198 Song HM, Woo J, Kim HK (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:100198
52.
go back to reference Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) A kohonen som architecture for intrusion detection on in-vehicle communication networks. Appl Sci 10(15):5062 Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) A kohonen som architecture for intrusion detection on in-vehicle communication networks. Appl Sci 10(15):5062
53.
go back to reference Mehedi ST, Anwar A, Rahman Z, Ahmed K (2021) Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors 21(14):4736 Mehedi ST, Anwar A, Rahman Z, Ahmed K (2021) Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors 21(14):4736
54.
go back to reference Taylor A, Leblanc S, Japkowicz N (2016) Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). IEEE, pp 130–139 Taylor A, Leblanc S, Japkowicz N (2016) Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). IEEE, pp 130–139
55.
go back to reference Zhu K, Chen Z, Peng Y, Zhang L (2019) Mobile edge assisted literal multi-dimensional anomaly detection of in-vehicle network using LSTM. IEEE Trans Veh Technol 68(5):4275–4284 Zhu K, Chen Z, Peng Y, Zhang L (2019) Mobile edge assisted literal multi-dimensional anomaly detection of in-vehicle network using LSTM. IEEE Trans Veh Technol 68(5):4275–4284
56.
go back to reference Xiao J, Wu H, Li X (2019) Internet of things meets vehicles: sheltering in-vehicle network through lightweight machine learning. Symmetry 11(11):1388 Xiao J, Wu H, Li X (2019) Internet of things meets vehicles: sheltering in-vehicle network through lightweight machine learning. Symmetry 11(11):1388
57.
go back to reference Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y (2020) LSTM-based intrusion detection system for in-vehicle CAN bus communications. IEEE Access 8:185489–185502 Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y (2020) LSTM-based intrusion detection system for in-vehicle CAN bus communications. IEEE Access 8:185489–185502
58.
go back to reference Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y (2020) An effective in-vehicle CAN bus intrusion detection system using CNN deep learning approach In: GLOBECOM 2020–2020 IEEE Global Communications Conference. IEEE, pp 1–6 Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y (2020) An effective in-vehicle CAN bus intrusion detection system using CNN deep learning approach In: GLOBECOM 2020–2020 IEEE Global Communications Conference. IEEE, pp 1–6
59.
go back to reference Balaji P, Ghaderi M (2021) Neurocan: contextual anomaly detection in controller area networks. In: 2021 IEEE International Smart Cities Conference (ISC2). IEEE, pp 1–7 Balaji P, Ghaderi M (2021) Neurocan: contextual anomaly detection in controller area networks. In: 2021 IEEE International Smart Cities Conference (ISC2). IEEE, pp 1–7
60.
go back to reference Balaji P, Ghaderi M, Zhang H (2022) Canlite: anomaly detection in controller area networks with multitask learning. In: 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring). IEEE, pp 1–5 Balaji P, Ghaderi M, Zhang H (2022) Canlite: anomaly detection in controller area networks with multitask learning. In: 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring). IEEE, pp 1–5
61.
go back to reference Javed AR, Ur Rehman S, Khan MU, Alazab M, Reddy T (2021) Canintelliids: aetecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng 8(2):1456–1466 Javed AR, Ur Rehman S, Khan MU, Alazab M, Reddy T (2021) Canintelliids: aetecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng 8(2):1456–1466
62.
go back to reference Sun H, Chen M, Weng J, Liu Z, Geng G (2021) Anomaly detection for in-vehicle network using CNN-LSTM with attention mechanism. IEEE Trans Veh Technol 70(10):10880–10893 Sun H, Chen M, Weng J, Liu Z, Geng G (2021) Anomaly detection for in-vehicle network using CNN-LSTM with attention mechanism. IEEE Trans Veh Technol 70(10):10880–10893
63.
go back to reference Thiruloga SV, Kukkala VK, Pasricha S (2022) Tenet: temporal CNN with attention for anomaly detection in automotive cyber-physical systems. In: 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, pp 326–331 Thiruloga SV, Kukkala VK, Pasricha S (2022) Tenet: temporal CNN with attention for anomaly detection in automotive cyber-physical systems. In: 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, pp 326–331
64.
go back to reference Lokman SF, Othman AT, Musa S, Abu Bakar MH (2019) Deep contractive autoencoder-based anomaly detection for in-vehicle controller area network (CAN) In: Progress in Engineering Technology. Springer, pp 195–205 Lokman SF, Othman AT, Musa S, Abu Bakar MH (2019) Deep contractive autoencoder-based anomaly detection for in-vehicle controller area network (CAN) In: Progress in Engineering Technology. Springer, pp 195–205
65.
go back to reference Lin Y, Chen C, Xiao F, Avatefipour O, Alsubhi K, Yunianta A (2020) An evolutionary deep learning anomaly detection framework for in-vehicle networks-CAN bus. IEEE Trans Ind Appl Lin Y, Chen C, Xiao F, Avatefipour O, Alsubhi K, Yunianta A (2020) An evolutionary deep learning anomaly detection framework for in-vehicle networks-CAN bus. IEEE Trans Ind Appl
66.
go back to reference Jaoudi Y, Yakopcic C, Taha T (2020) Conversion of an unsupervised anomaly detection system to spiking neural network for car hacking identification. In: 2020 11th International Green and Sustainable Computing Workshops (IGSC). IEEE, pp 1–4 Jaoudi Y, Yakopcic C, Taha T (2020) Conversion of an unsupervised anomaly detection system to spiking neural network for car hacking identification. In: 2020 11th International Green and Sustainable Computing Workshops (IGSC). IEEE, pp 1–4
67.
go back to reference Longari S, Valcarcel DHN, Zago M, Carminati M, Zanero S (2020) Cannolo: an anomaly detection system based on LSTM autoencoders for controller area network. IEEE Trans Netw Serv Manage 18(2):1913–1924 Longari S, Valcarcel DHN, Zago M, Carminati M, Zanero S (2020) Cannolo: an anomaly detection system based on LSTM autoencoders for controller area network. IEEE Trans Netw Serv Manage 18(2):1913–1924
68.
go back to reference Hanselmann M, Strauss T, Dormann K, Ulmer H (2020) Canet: an unsupervised intrusion detection system for high dimensional CAN bus data. IEEE Access 8:58194–58205 Hanselmann M, Strauss T, Dormann K, Ulmer H (2020) Canet: an unsupervised intrusion detection system for high dimensional CAN bus data. IEEE Access 8:58194–58205
69.
go back to reference Ashraf J, Bakhshi AD, Moustafa N, Khurshid H, Javed A, Beheshti A (2020) Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans Intell Transp Syst Ashraf J, Bakhshi AD, Moustafa N, Khurshid H, Javed A, Beheshti A (2020) Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans Intell Transp Syst
70.
go back to reference Seo E, Song HM, Kim HK (2018) Gids: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 1–6 Seo E, Song HM, Kim HK (2018) Gids: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 1–6
71.
go back to reference Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) Intrusion detection for in-vehicle communication networks: an unsupervised kohonen som approach. Future Internet 12(7):119 Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) Intrusion detection for in-vehicle communication networks: an unsupervised kohonen som approach. Future Internet 12(7):119
72.
go back to reference Kukkala VK, Thiruloga SV, Pasricha S (2021) Latte: LSTM self-att ention based anomaly detection in e mbedded automotive platforms. ACM Transactions on Embedded Computing Systems (TECS) 20(5s):1–23 Kukkala VK, Thiruloga SV, Pasricha S (2021) Latte: LSTM self-att ention based anomaly detection in e mbedded automotive platforms. ACM Transactions on Embedded Computing Systems (TECS) 20(5s):1–23
73.
go back to reference Song HM, Kim HK (2021) Self-supervised anomaly detection for in-vehicle network using noised pseudo normal data. IEEE Trans Veh Technol 70(2):1098–1108 Song HM, Kim HK (2021) Self-supervised anomaly detection for in-vehicle network using noised pseudo normal data. IEEE Trans Veh Technol 70(2):1098–1108
74.
go back to reference Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANET security challenges and solutions: a survey. Veh Commun 7:7–20 Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANET security challenges and solutions: a survey. Veh Commun 7:7–20
75.
go back to reference Qian B, Zhou H, Ma T, Xu Y, Yu K, Shen X, Hou F (2020) Leveraging dynamic stackelberg pricing game for multi-mode spectrum sharing in 5G-VANET. IEEE Trans Veh Technol 69(6):6374–6387 Qian B, Zhou H, Ma T, Xu Y, Yu K, Shen X, Hou F (2020) Leveraging dynamic stackelberg pricing game for multi-mode spectrum sharing in 5G-VANET. IEEE Trans Veh Technol 69(6):6374–6387
76.
go back to reference Shahid MA, Jaekel A, Ezeife C, Al-Ajmi Q, Saini I (2018) Review of potential security attacks in vanet. In: 2018 Majan International Conference (MIC). IEEE, pp 1–4 Shahid MA, Jaekel A, Ezeife C, Al-Ajmi Q, Saini I (2018) Review of potential security attacks in vanet. In: 2018 Majan International Conference (MIC). IEEE, pp 1–4
77.
go back to reference Kenney JB (2011) Dedicated short-range communications (dsrc) standards in the united states. Proc IEEE 99(7):1162–1182 Kenney JB (2011) Dedicated short-range communications (dsrc) standards in the united states. Proc IEEE 99(7):1162–1182
78.
go back to reference Bazzi A, Cecchini G, Menarini M, Masini BM, Zanella A (2019) Survey and perspectives of vehicular wi-fi versus sidelink cellular-v2x in the 5G era. Future Internet 11(6):122 Bazzi A, Cecchini G, Menarini M, Masini BM, Zanella A (2019) Survey and perspectives of vehicular wi-fi versus sidelink cellular-v2x in the 5G era. Future Internet 11(6):122
79.
go back to reference Kumar A, Bansal M et al (2017) A review on vanet security attacks and their countermeasure. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, pp 580–585 Kumar A, Bansal M et al (2017) A review on vanet security attacks and their countermeasure. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, pp 580–585
80.
go back to reference Sheikh MS, Liang J, Wang W (2019) A survey of security services, attacks, and applications for vehicular ad hoc networks (VANETs). Sensors 19(16):3589 Sheikh MS, Liang J, Wang W (2019) A survey of security services, attacks, and applications for vehicular ad hoc networks (VANETs). Sensors 19(16):3589
81.
go back to reference Yang A, Weng J, Cheng N, Ni J, Lin X, Shen X (2019) Deqos attack: degrading quality of service in VANETs and its mitigation. IEEE Trans Veh Technol 68(5):4834–4845 Yang A, Weng J, Cheng N, Ni J, Lin X, Shen X (2019) Deqos attack: degrading quality of service in VANETs and its mitigation. IEEE Trans Veh Technol 68(5):4834–4845
82.
go back to reference Boualouache A, Senouci S-M, Moussaoui S (2017) A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun Surv Tutorials 20(1):770–790 Boualouache A, Senouci S-M, Moussaoui S (2017) A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun Surv Tutorials 20(1):770–790
83.
go back to reference Boudhir A, Benahmed M, Ghadi A, Bouhorma M (2016) Vehicular navigation spoofing detection based on v2i calibration. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt). IEEE, pp 847–849 Boudhir A, Benahmed M, Ghadi A, Bouhorma M (2016) Vehicular navigation spoofing detection based on v2i calibration. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt). IEEE, pp 847–849
84.
go back to reference Quyoom A, Mir AA, Sarwar A (2020) Security attacks and challenges of VANETs: a literature survey. Journal of Multimedia Information System 7(1):45–54 Quyoom A, Mir AA, Sarwar A (2020) Security attacks and challenges of VANETs: a literature survey. Journal of Multimedia Information System 7(1):45–54
85.
go back to reference Chhatwal SS, Sharma M (2015) Detection of impersonation attack in VANETs using buck filter and VANET content fragile watermarking (VCFW). In: 2015 International Conference on Computer Communication and Informatics (ICCCI). IEEE, pp 1–5 Chhatwal SS, Sharma M (2015) Detection of impersonation attack in VANETs using buck filter and VANET content fragile watermarking (VCFW). In: 2015 International Conference on Computer Communication and Informatics (ICCCI). IEEE, pp 1–5
86.
go back to reference Ahmed W, Elhadef, M (2018) Dos attacks and countermeasures in VANETs. In: Advanced Multimedia and Ubiquitous Engineering. Springer, pp 333–341 Ahmed W, Elhadef, M (2018) Dos attacks and countermeasures in VANETs. In: Advanced Multimedia and Ubiquitous Engineering. Springer, pp 333–341
87.
go back to reference Ilavendhan A, Saruladha K (2020) Comparative analysis of various approaches for dos attack detection in VANETs. In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp 821–825 Ilavendhan A, Saruladha K (2020) Comparative analysis of various approaches for dos attack detection in VANETs. In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp 821–825
88.
go back to reference Kumar S, Mann KS (2019) Prevention of dos attacks by detection of multiple malicious nodes in VANETs. In: 2019 International Conference on Automation, Computational and Technology Management (ICACTM). IEEE, pp 89–94 Kumar S, Mann KS (2019) Prevention of dos attacks by detection of multiple malicious nodes in VANETs. In: 2019 International Conference on Automation, Computational and Technology Management (ICACTM). IEEE, pp 89–94
89.
go back to reference Malebary S, Xu W, Huang C-T (2016) Jamming mobility in 802.11 p networks: modeling, evaluation, and detection. In: 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC). IEEE, pp 1–7 Malebary S, Xu W, Huang C-T (2016) Jamming mobility in 802.11 p networks: modeling, evaluation, and detection. In: 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC). IEEE, pp 1–7
90.
go back to reference Lachdhaf S, Mazouzi M, Abid M et al (2017) Detection and prevention of black hole attack in VANET using secured aodv routing protocol. In: International Conference on Networks & Communications (NetCom 2017), Dubai. pp 25–36 Lachdhaf S, Mazouzi M, Abid M et al (2017) Detection and prevention of black hole attack in VANET using secured aodv routing protocol. In: International Conference on Networks & Communications (NetCom 2017), Dubai. pp 25–36
91.
go back to reference Bhatti FN, Ahmad RB, Abu Bakar MS, Daud S, Elias S, Warip M (2015) Analyze the VANET performance in presence of timing attack and sinkhole attack using OMNET++. Journal of Advanced Research in Computing and Applications 1(1):16–31 Bhatti FN, Ahmad RB, Abu Bakar MS, Daud S, Elias S, Warip M (2015) Analyze the VANET performance in presence of timing attack and sinkhole attack using OMNET++. Journal of Advanced Research in Computing and Applications 1(1):16–31
92.
go back to reference Sumra IA, Ab Manan J-L, Hasbullah H (2011) Timing attack in vehicular network. In: Proceedings of the 15th WSEAS International Conference on Computers. World Scientific and Engineering Academy and Society (WSEAS), Corfu Island, Greece, pp 151–155 Sumra IA, Ab Manan J-L, Hasbullah H (2011) Timing attack in vehicular network. In: Proceedings of the 15th WSEAS International Conference on Computers. World Scientific and Engineering Academy and Society (WSEAS), Corfu Island, Greece, pp 151–155
93.
go back to reference Junejo MH, Ab Rahman AA-H, Shaikh RA, Yusof KM (2021) Location closeness model for VANETs with integration of 5G. Procedia Comput Sci 182:71–79 Junejo MH, Ab Rahman AA-H, Shaikh RA, Yusof KM (2021) Location closeness model for VANETs with integration of 5G. Procedia Comput Sci 182:71–79
94.
go back to reference Choudhari DP, Dorle SS (2019) Maximization of packet delivery ratio for DADCQ protocol after removal of eavesdropping and DDOS attacks in vanet. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, pp 1–8 Choudhari DP, Dorle SS (2019) Maximization of packet delivery ratio for DADCQ protocol after removal of eavesdropping and DDOS attacks in vanet. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, pp 1–8
95.
go back to reference Ahmad F, Adnane A, Franqueira VN, Kurugollu F, Liu L (2018) Man-in-the-middle attacks in vehicular ad-hoc networks: evaluating the impact of attackers’ strategies. Sensors 18(11):4040 Ahmad F, Adnane A, Franqueira VN, Kurugollu F, Liu L (2018) Man-in-the-middle attacks in vehicular ad-hoc networks: evaluating the impact of attackers’ strategies. Sensors 18(11):4040
96.
go back to reference Al-Shareeda MA, Anbar M, Manickam S, Yassin AA (2020) VPPCS: VANET-based privacy-preserving communication scheme. IEEE Access 8:150914–150928 Al-Shareeda MA, Anbar M, Manickam S, Yassin AA (2020) VPPCS: VANET-based privacy-preserving communication scheme. IEEE Access 8:150914–150928
97.
go back to reference Pu Y, Xiang T, Hu C, Alrawais A, Yan H (2020) An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inf Sci 540:308–324MathSciNet Pu Y, Xiang T, Hu C, Alrawais A, Yan H (2020) An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inf Sci 540:308–324MathSciNet
98.
go back to reference Saini I, Saad S, Jaekel A (2020) A context aware and traffic adaptive privacy scheme in VANETs. In: 2020 IEEE 3rd Connected and Automated Vehicles Symposium (CAVS). IEEE, pp 1–5 Saini I, Saad S, Jaekel A (2020) A context aware and traffic adaptive privacy scheme in VANETs. In: 2020 IEEE 3rd Connected and Automated Vehicles Symposium (CAVS). IEEE, pp 1–5
99.
go back to reference Emara K (2016) Poster: Prext: privacy extension for veins VANET simulator. In: 2016 IEEE Vehicular Networking Conference (VNC). IEEE, pp 1–2 Emara K (2016) Poster: Prext: privacy extension for veins VANET simulator. In: 2016 IEEE Vehicular Networking Conference (VNC). IEEE, pp 1–2
100.
go back to reference Kamel J, Wolf M, van der Hei RW, Kaiser A, Urien P, Kargl F (2020) Veremi extension: a dataset for comparable evaluation of misbehavior detection in VANETs. In: ICC 2020–2020 IEEE International Conference on Communications (ICC). IEEE, pp 1–6 Kamel J, Wolf M, van der Hei RW, Kaiser A, Urien P, Kargl F (2020) Veremi extension: a dataset for comparable evaluation of misbehavior detection in VANETs. In: ICC 2020–2020 IEEE International Conference on Communications (ICC). IEEE, pp 1–6
102.
go back to reference Kamel J, Haidar F, Jemaa IB, Kaiser A, Lonc B, Urien P (2019) A misbehavior authority system for sybil attack detection in C-ITS. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, pp 1117–1123 Kamel J, Haidar F, Jemaa IB, Kaiser A, Lonc B, Urien P (2019) A misbehavior authority system for sybil attack detection in C-ITS. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, pp 1117–1123
103.
go back to reference Singh PK, Gupta RR, Nandi SK, Nandi S (2019) Machine learning based approach to detect wormhole attack in VANETs. In: Workshops of the International Conference on Advanced Information Networking and Applications. Springer, pp 651–661 Singh PK, Gupta RR, Nandi SK, Nandi S (2019) Machine learning based approach to detect wormhole attack in VANETs. In: Workshops of the International Conference on Advanced Information Networking and Applications. Springer, pp 651–661
104.
go back to reference van der Heijden RW, Dietzel S, Leinmüller T, Kargl F (2018) Survey on misbehavior detection in cooperative intelligent transportation systems. IEEE Commun Surv Tutorials 21(1):779–811 van der Heijden RW, Dietzel S, Leinmüller T, Kargl F (2018) Survey on misbehavior detection in cooperative intelligent transportation systems. IEEE Commun Surv Tutorials 21(1):779–811
105.
go back to reference Hortelano J, Ruiz JC, Manzoni P (2010) Evaluating the usefulness of watchdogs for intrusion detection in VANETs. In: 2010 IEEE International Conference on Communications Workshops. IEEE, pp 1–5 Hortelano J, Ruiz JC, Manzoni P (2010) Evaluating the usefulness of watchdogs for intrusion detection in VANETs. In: 2010 IEEE International Conference on Communications Workshops. IEEE, pp 1–5
106.
go back to reference Hamieh A, Ben-Othman J, Mokdad L (2009) Detection of radio interference attacks in VANET. In: GLOBECOM 2009–2009 IEEE Global Telecommunications Conference. IEEE, pp 1–5 Hamieh A, Ben-Othman J, Mokdad L (2009) Detection of radio interference attacks in VANET. In: GLOBECOM 2009–2009 IEEE Global Telecommunications Conference. IEEE, pp 1–5
107.
go back to reference Puñal O, Aguiar A, Gross J (2012) In VANETs we trust? Characterizing RF jamming in vehicular networks. In: Proceedings of the Ninth ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications. pp 83–92 Puñal O, Aguiar A, Gross J (2012) In VANETs we trust? Characterizing RF jamming in vehicular networks. In: Proceedings of the Ninth ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications. pp 83–92
108.
go back to reference Zaidi K, Milojevic MB, Rakocevic V, Nallanathan A, Rajarajan M (2015) Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans Veh Technol 65(8):6703–6714 Zaidi K, Milojevic MB, Rakocevic V, Nallanathan A, Rajarajan M (2015) Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans Veh Technol 65(8):6703–6714
109.
go back to reference Grover J, Prajapati NK, Laxmi V, Gaur MS (2011) Machine learning approach for multiple misbehavior detection in VANET. In: International Conference on Advances in Computing and Communications. Springer, pp 644–653 Grover J, Prajapati NK, Laxmi V, Gaur MS (2011) Machine learning approach for multiple misbehavior detection in VANET. In: International Conference on Advances in Computing and Communications. Springer, pp 644–653
110.
go back to reference Gyawali S, Qian Y (2019) Misbehavior detection using machine learning in vehicular communication networks. In: ICC 2019–2019 IEEE International Conference on Communications (ICC). IEEE, pp 1–6 Gyawali S, Qian Y (2019) Misbehavior detection using machine learning in vehicular communication networks. In: ICC 2019–2019 IEEE International Conference on Communications (ICC). IEEE, pp 1–6
111.
go back to reference Zeng Y, Qiu M, Zhu D, Xue Z, Xiong J, Liu M (2019) DEEPVCM: a deep learning based intrusion detection method in VANET. In: 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity). IEEE, pp 288–293 Zeng Y, Qiu M, Zhu D, Xue Z, Xiong J, Liu M (2019) DEEPVCM: a deep learning based intrusion detection method in VANET. In: 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity). IEEE, pp 288–293
112.
go back to reference Montenegro J, Iza C, Aguilar Igartua M (2020) Detection of position falsification attacks in VANETs applying trust model and machine learning. In: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks. pp 9–16 Montenegro J, Iza C, Aguilar Igartua M (2020) Detection of position falsification attacks in VANETs applying trust model and machine learning. In: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks. pp 9–16
113.
go back to reference Wang S-Y, Lin C-C (2008) NCTUNS 5.0: a network simulator for IEEE 802.11 (p) and 1609 wireless vehicular network researches. In: 2008 IEEE 68th Vehicular Technology Conference. IEEE, pp 1–2 Wang S-Y, Lin C-C (2008) NCTUNS 5.0: a network simulator for IEEE 802.11 (p) and 1609 wireless vehicular network researches. In: 2008 IEEE 68th Vehicular Technology Conference. IEEE, pp 1–2
114.
go back to reference Witten IH, Frank E, Trigg LE, Hall MA, Holmes G, Cunningham SJ (1999) Weka: practical machine learning tools and techniques with Java implementations Witten IH, Frank E, Trigg LE, Hall MA, Holmes G, Cunningham SJ (1999) Weka: practical machine learning tools and techniques with Java implementations
115.
go back to reference So S, Sharma P, Petit J (2018) Integrating plausibility checks and machine learning for misbehavior detection in VANET. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, pp 564–571 So S, Sharma P, Petit J (2018) Integrating plausibility checks and machine learning for misbehavior detection in VANET. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, pp 564–571
116.
go back to reference Sharma A, Jaekel A (2021) Machine learning approach for detecting location spoofing in VANET. In: 2021 International Conference on Computer Communications and Networks (ICCCN). IEEE, pp 1–6 Sharma A, Jaekel A (2021) Machine learning approach for detecting location spoofing in VANET. In: 2021 International Conference on Computer Communications and Networks (ICCCN). IEEE, pp 1–6
117.
go back to reference Lopez PA, Behrisch M, Bieker-Walz L, Erdmann J, Flötteröd Y-P, Hilbrich R, Lücken L, Rummel J, Wagner P, Wießner E (2018) Microscopic traffic simulation using sumo. In: 2018 21st International Conference on Intelligent Transportation Systems (ITSC). IEEE, pp 2575–2582 Lopez PA, Behrisch M, Bieker-Walz L, Erdmann J, Flötteröd Y-P, Hilbrich R, Lücken L, Rummel J, Wagner P, Wießner E (2018) Microscopic traffic simulation using sumo. In: 2018 21st International Conference on Intelligent Transportation Systems (ITSC). IEEE, pp 2575–2582
118.
go back to reference Riley GF, Henderson TR (2010) The NS-3 network simulator. In: Modeling and Tools for Network Simulation. Springer, pp 15–34 Riley GF, Henderson TR (2010) The NS-3 network simulator. In: Modeling and Tools for Network Simulation. Springer, pp 15–34
119.
go back to reference Haklay M, Weber P (2008) Openstreetmap: User-generated street maps. IEEE Pervasive Comput 7(4):12–18 Haklay M, Weber P (2008) Openstreetmap: User-generated street maps. IEEE Pervasive Comput 7(4):12–18
120.
go back to reference Sommer C, German R, Dressler F (2010) Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans Mob Comput 10(1):3–15 Sommer C, German R, Dressler F (2010) Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans Mob Comput 10(1):3–15
121.
go back to reference Shams EA, Rizaner A, Ulusoy AH (2018) Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks. Comput Secur 78:245–254 Shams EA, Rizaner A, Ulusoy AH (2018) Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks. Comput Secur 78:245–254
122.
go back to reference Sharma P, Liu H (2020) A machine-learning-based data-centric misbehavior detection model for internet of vehicles. IEEE Internet Things J 8(6):4991–4999 Sharma P, Liu H (2020) A machine-learning-based data-centric misbehavior detection model for internet of vehicles. IEEE Internet Things J 8(6):4991–4999
123.
go back to reference Karagiannis D, Argyriou A (2018) Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning. Veh Commun 13:56–63 Karagiannis D, Argyriou A (2018) Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning. Veh Commun 13:56–63
124.
go back to reference Oucheikh R, Fri M, Fedouaki F, Hain M (2020) Deep anomaly detector based on spatio-temporal clustering for connected autonomous vehicles. In: International Conference on Ad Hoc Networks. Springer, pp 201–212 Oucheikh R, Fri M, Fedouaki F, Hain M (2020) Deep anomaly detector based on spatio-temporal clustering for connected autonomous vehicles. In: International Conference on Ad Hoc Networks. Springer, pp 201–212
126.
go back to reference Aneja MJS, Bhatia T, Sharma G, Shrivastava G (2018) Artificial intelligence based intrusion detection system to detect flooding attack in VANETs. In: Handbook of Research on Network Forensics and Analysis Techniques. IGI Global, pp 87–100 Aneja MJS, Bhatia T, Sharma G, Shrivastava G (2018) Artificial intelligence based intrusion detection system to detect flooding attack in VANETs. In: Handbook of Research on Network Forensics and Analysis Techniques. IGI Global, pp 87–100
127.
go back to reference Atli BG, Miche Y, Kalliola A, Oliver I, Holtmanns S, Lendasse A (2018) Anomaly-based intrusion detection using extreme learning machine and aggregation of network traffic statistics in probability space. Cogn Comput 10(5):848–863 Atli BG, Miche Y, Kalliola A, Oliver I, Holtmanns S, Lendasse A (2018) Anomaly-based intrusion detection using extreme learning machine and aggregation of network traffic statistics in probability space. Cogn Comput 10(5):848–863
128.
go back to reference Uprety A, Rawat DB, Li J (2021) Privacy preserving misbehavior detection in IoV using federated machine learning. In: 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 1–6 Uprety A, Rawat DB, Li J (2021) Privacy preserving misbehavior detection in IoV using federated machine learning. In: 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 1–6
129.
go back to reference Jaton N (2021) Distributed neural network based architecture for DDOS detection in vehicular communication systems Jaton N (2021) Distributed neural network based architecture for DDOS detection in vehicular communication systems
130.
go back to reference Varga A (2001) Discrete event simulation system. In: Proceedings of the European Simulation Multiconference (ESM’2001). pp 1–7 Varga A (2001) Discrete event simulation system. In: Proceedings of the European Simulation Multiconference (ESM’2001). pp 1–7
131.
go back to reference Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of sumo-simulation of urban mobility. International Journal on Advances in Systems and Measurements 5(3 &4) Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of sumo-simulation of urban mobility. International Journal on Advances in Systems and Measurements 5(3 &4)
132.
go back to reference Codecá L, Frank R, Faye S, Engel T (2017) Luxembourg sumo traffic (lust) scenario: traffic demand evaluation. IEEE Intell Transp Syst Mag 9(2):52–63 Codecá L, Frank R, Faye S, Engel T (2017) Luxembourg sumo traffic (lust) scenario: traffic demand evaluation. IEEE Intell Transp Syst Mag 9(2):52–63
133.
go back to reference Chakirov A, Fourie PJ (2014) Enriched sioux falls scenario with dynamic and disaggregate demand. Arbeitsberichte Verkehrs-und Raumplanung 978 Chakirov A, Fourie PJ (2014) Enriched sioux falls scenario with dynamic and disaggregate demand. Arbeitsberichte Verkehrs-und Raumplanung 978
134.
go back to reference Axhausen KW, Horni A, Nagel K (2016) The multi-agent transport simulation MATSim. Ubiquity Press Axhausen KW, Horni A, Nagel K (2016) The multi-agent transport simulation MATSim. Ubiquity Press
135.
go back to reference Uppoor S, Fiore M (2011) Large-scale urban vehicular mobility for networking research. In: 2011 IEEE Vehicular Networking Conference (VNC). IEEE, pp 62–69 Uppoor S, Fiore M (2011) Large-scale urban vehicular mobility for networking research. In: 2011 IEEE Vehicular Networking Conference (VNC). IEEE, pp 62–69
136.
go back to reference Pigné Y, Danoy G, Bouvry P (2011) A vehicular mobility model based on real traffic counting data. In: International Workshop on Communication Technologies for Vehicles. Springer, pp 131–142 Pigné Y, Danoy G, Bouvry P (2011) A vehicular mobility model based on real traffic counting data. In: International Workshop on Communication Technologies for Vehicles. Springer, pp 131–142
137.
go back to reference Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp 1–6 Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp 1–6
138.
go back to reference He Q, Meng X, Qu R, Xi R (2020) Machine learning-based detection for cyber security attacks on connected and autonomous vehicles. Mathematics 8(8):1311 He Q, Meng X, Qu R, Xi R (2020) Machine learning-based detection for cyber security attacks on connected and autonomous vehicles. Mathematics 8(8):1311
139.
go back to reference Kim M, Jang I, Choo S, Koo J, Pack S (2017) Collaborative security attack detection in software-defined vehicular networks. In: 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, pp 19–24 Kim M, Jang I, Choo S, Koo J, Pack S (2017) Collaborative security attack detection in software-defined vehicular networks. In: 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, pp 19–24
140.
go back to reference Gao Y, Wu H, Song B, Jin Y, Luo X, Zeng X (2019) A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7:154560–154571 Gao Y, Wu H, Song B, Jin Y, Luo X, Zeng X (2019) A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7:154560–154571
141.
go back to reference Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, pp 1–6 Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, pp 1–6
142.
go back to reference Song J, Takakura H, Okabe Y, Eto M, Inoue D, Nakao K (2011) Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for nids evaluation. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. pp 29–36 Song J, Takakura H, Okabe Y, Eto M, Inoue D, Nakao K (2011) Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for nids evaluation. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. pp 29–36
143.
go back to reference Ali Alheeti KM, McDonald-Maier K (2018) Intelligent intrusion detection in external communication systems for autonomous vehicles. Syst Sci Control Eng 6(1):48–56 Ali Alheeti KM, McDonald-Maier K (2018) Intelligent intrusion detection in external communication systems for autonomous vehicles. Syst Sci Control Eng 6(1):48–56
144.
go back to reference Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357–374 Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357–374
145.
go back to reference Belenko V, Krundyshev V, Kalinin M (2018) Synthetic datasets generation for intrusion detection in VANET. In: Proceedings of the 11th International Conference on Security of Information and Networks. pp 1–6 Belenko V, Krundyshev V, Kalinin M (2018) Synthetic datasets generation for intrusion detection in VANET. In: Proceedings of the 11th International Conference on Security of Information and Networks. pp 1–6
146.
go back to reference Gonçalves F, Ribeiro B, Gama O, Santos J, Costa A, Dias B, Nicolau MJ, Macedo J, Santos A (2020) Synthesizing datasets with security threats for vehicular ad-hoc networks. In: GLOBECOM 2020–2020 IEEE Global Communications Conference. IEEE, pp 1–6 Gonçalves F, Ribeiro B, Gama O, Santos J, Costa A, Dias B, Nicolau MJ, Macedo J, Santos A (2020) Synthesizing datasets with security threats for vehicular ad-hoc networks. In: GLOBECOM 2020–2020 IEEE Global Communications Conference. IEEE, pp 1–6
147.
go back to reference Schünemann B (2011) V2x simulation runtime infrastructure Vsimrti: an assessment tool to design smart traffic management systems. Comput Netw 55(14):3189–3198 Schünemann B (2011) V2x simulation runtime infrastructure Vsimrti: an assessment tool to design smart traffic management systems. Comput Netw 55(14):3189–3198
149.
go back to reference Alhaidari FA, Alrehan AM (2021) A simulation work for generating a novel dataset to detect distributed denial of service attacks on vehicular ad hoc network systems. Int J Distrib Sens Netw 17(3):15501477211000288 Alhaidari FA, Alrehan AM (2021) A simulation work for generating a novel dataset to detect distributed denial of service attacks on vehicular ad hoc network systems. Int J Distrib Sens Netw 17(3):15501477211000288
150.
go back to reference Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y (2019) An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw 90:101842 Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y (2019) An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw 90:101842
151.
go back to reference Wyoming D (2018) Connected vehicle pilot: improving safety and travel reliability on 1–80 in Wyoming Wyoming D (2018) Connected vehicle pilot: improving safety and travel reliability on 1–80 in Wyoming
152.
go back to reference Rehman A, Rehman SU, Khan M, Alazab M, Reddy T (2021) Canintelliids: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng Rehman A, Rehman SU, Khan M, Alazab M, Reddy T (2021) Canintelliids: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng
153.
go back to reference Dupont G, Lekidis A, Den Hartog J, Etalle S (2019) Automotive controller area network (CAN) BUS intrusion dataset v. 2 Dupont G, Lekidis A, Den Hartog J, Etalle S (2019) Automotive controller area network (CAN) BUS intrusion dataset v. 2
154.
go back to reference Woo S, Jo HJ, Lee DH (2014) A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans Intell Transp Syst 16(2):993–1006 Woo S, Jo HJ, Lee DH (2014) A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans Intell Transp Syst 16(2):993–1006
156.
go back to reference Verma ME, Iannacone MD, Bridges RA, Hollifield SC, Moriano P, Kay B, Combs FL (2022) Addressing the lack of comparability & testing in CAN intrusion detection research: a comprehensive guide to CAN IDS data & introduction of the road dataset Verma ME, Iannacone MD, Bridges RA, Hollifield SC, Moriano P, Kay B, Combs FL (2022) Addressing the lack of comparability & testing in CAN intrusion detection research: a comprehensive guide to CAN IDS data & introduction of the road dataset
157.
go back to reference Berger I, Rieke R, Kolomeets M, Chechulin A, Kotenko I (2018) Comparative study of machine learning methods for in-vehicle intrusion detection. In: Computer Security. Springer, pp 85–101 Berger I, Rieke R, Kolomeets M, Chechulin A, Kotenko I (2018) Comparative study of machine learning methods for in-vehicle intrusion detection. In: Computer Security. Springer, pp 85–101
158.
go back to reference Gunduz MZ, Das R (2018) A comparison of cyber-security oriented testbeds for IoT-based smart grids. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, pp 1–6 Gunduz MZ, Das R (2018) A comparison of cyber-security oriented testbeds for IoT-based smart grids. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, pp 1–6
161.
go back to reference Everett CE, McCoy D (2013) OCTANE (open car testbed and network experiments): bringing cyber-physical security research to researchers and students. In: 6th Workshop on Cyber Security Experimentation and Test (CSET 13) Everett CE, McCoy D (2013) OCTANE (open car testbed and network experiments): bringing cyber-physical security research to researchers and students. In: 6th Workshop on Cyber Security Experimentation and Test (CSET 13)
162.
go back to reference Dosovitskiy A, Ros G, Codevilla F, Lopez A, Koltun V (2017) Carla: an open urban driving simulator. In: Conference on Robot Learning. PMLR, pp 1–16 Dosovitskiy A, Ros G, Codevilla F, Lopez A, Koltun V (2017) Carla: an open urban driving simulator. In: Conference on Robot Learning. PMLR, pp 1–16
163.
go back to reference Gss7000 series GNSS constellatio simulator (2021) Spirent Communications PLC Gss7000 series GNSS constellatio simulator (2021) Spirent Communications PLC
164.
go back to reference SimHiL Datasheet (2021) Spirent Communications PLC SimHiL Datasheet (2021) Spirent Communications PLC
Metadata
Title
Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey
Authors
Jay Nagarajan
Pegah Mansourian
Muhammad Anwar Shahid
Arunita Jaekel
Ikjot Saini
Ning Zhang
Marc Kneppers
Publication date
10-07-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01508-7

Other articles of this Issue 5/2023

Peer-to-Peer Networking and Applications 5/2023 Go to the issue

Premium Partner