Skip to main content
Log in

Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Connected and Autonomous Vehicles (CAVs) expect to dramatically improve road safety and efficiency of the transportation system. However, CAVs can be vulnerable to attacks at different levels, e.g., attacks on intra-vehicle networks and inter-vehicle networks. Those malicious attacks not only result in loss of confidentiality and user privacy but also lead to more serious consequences such as bodily injury and loss of life. An intrusion detection system (IDS) is one of the most effective ways to monitor the operations of vehicles and networks, detect different types of attacks, and provide essential information to mitigate and remedy the effects of attacks. To ensure the safety of CAVs, it is extremely important to detect various attacks accurately in a timely fashion. The purpose of this survey is to provide a comprehensive review of available machine learning (ML) based IDS for intra-vehicle and inter-vehicle networks. Additionally, this paper discusses publicly available datasets for CAV and offers a summary of the many current testbeds and future research trends for connected vehicle environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data availability

Not applicable.

References

  1. Ye X, Zhou J, Li Y, Cao M, Chen D, Qin Z (2021) A location privacy protection scheme for convoy driving in autonomous driving era. Peer Peer Netw Appl 14(3):1388–1400

    Google Scholar 

  2. Yang Q, Fu S, Wang H, Fang H (2021) Machine-learning-enabled cooperative perception for connected autonomous vehicles: challenges and opportunities. IEEE Netw 35(3):96–101

    Google Scholar 

  3. Taherkhani N, Pierre S (2016) Centralized and localized data congestion control strategy for vehicular ad hoc networks using a machine learning clustering algorithm. IEEE Trans Intell Transp Syst 17(11):3275–3285

    Google Scholar 

  4. Reebadiya D, Rathod T, Gupta R, Tanwar S, Kumar N (2021) Blockchain-based secure and intelligent sensing scheme for autonomous vehicles activity tracking beyond 5G networks. Peer Peer Netw Appl 14(5):2757–2774

    Google Scholar 

  5. Sun X, Yu FR, Zhang P (2021) A survey on cyber-security of connected and autonomous vehicles (CAVS). IEEE Trans Intell Transp Syst

  6. Feng X, Li C-Y, Chen D-X, Tang J (2017) A method for defensing against multi-source sybil attacks in VANET. Peer Peer Netw Appl 10(2):305–314

    Google Scholar 

  7. Wang S, Mao K, Zhan F, Liu D (2020) Hybrid conditional privacy-preserving authentication scheme for VANETs. Peer Peer Netw Appl 13(5):1600–1615

    Google Scholar 

  8. Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91)

  9. Kumar SV, Mary GAA, Suresh P, Uthirasamy R (2021) Investigation on cyber-attacks against in-vehicle network. In: 2021 7th International Conference on Electrical Energy Systems (ICEES). IEEE, pp 305–311

  10. Wolf M, Weimerskirch A, Wollinger T (2007) State of the art: embedding security in vehicles. EURASIP J Embed Syst 2007:1–16

    Google Scholar 

  11. Vdovic H, Babic J, Podobnik V (2019) Automotive software in connected and autonomous electric vehicles: a review. IEEE Access 7:166365–166379

    Google Scholar 

  12. Lu N, Zhang N, Cheng N, Shen X, Mark JW, Bai F (2013) Vehicles meet infrastructure: toward capacity-cost tradeoffs for vehicular access networks. IEEE Trans Intell Transp Syst 14(3):1266–1277

    Google Scholar 

  13. Zhang N, Zhang S, Yang P, Alhussein O, Zhuang W, Shen XS (2017) Software defined space-air-ground integrated vehicular networks: challenges and solutions. IEEE Commun Mag 55(7):101–109

    Google Scholar 

  14. Kumar D, Barani S (2021) Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs). Peer Peer Netw Appl 14(4):2524–2536

    Google Scholar 

  15. Lu N, Cheng N, Zhang N, Shen X, Mark JW (2014) Connected vehicles: solutions and challenges. IEEE Internet Things J 1(4):289–299

    Google Scholar 

  16. Loukas G, Karapistoli E, Panaousis E, Sarigiannidis P, Bezemskij A, Vuong T (2019) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Netw 84:124–147

    Google Scholar 

  17. Kim K, Kim JS, Jeong S, Park J-H, Kim HK (2021) Cybersecurity for autonomous vehicles: review of attacks and defense. Comput Secur 103:102150

    Google Scholar 

  18. Karopoulos G, Kambourakis G, Chatzoglou E, Hernández-Ramos JL, Kouliaridis V (2022) Demystifying in-vehicle intrusion detection systems: a survey of surveys and a meta-taxonomy. Electronics 11(7):1072

    Google Scholar 

  19. Al-Jarrah OY, Maple C, Dianati M, Oxtoby D, Mouzakitis A (2019) Intrusion detection systems for intra-vehicle networks: a review. IEEE Access 7:21266–21289

    Google Scholar 

  20. Wu W, Li R, Xie G, An J, Bai Y, Zhou J, Li K (2019) A survey of intrusion detection for in-vehicle networks. IEEE Trans Intell Transp Syst 21(3):919–933

    Google Scholar 

  21. Bangui H, Buhnova B (2021) Recent advances in machine-learning driven intrusion detection in transportation: survey. Procedia Comput Sci 184:877–886

    Google Scholar 

  22. Young C, Zambreno J, Olufowobi H, Bloom G (2019) Survey of automotive controller area network intrusion detection systems. IEEE Des Test 36(6):48–55

    Google Scholar 

  23. LIN Specification Package (2003) Revision 2.0, LIN consortium

  24. FlexRay Consortium et al (2010) Flexray communication systems protocol specification, version 3.0. 1 [ol]

  25. MOST Cooperation (2009) Most specification 3v0. pp 1–20

  26. Specification CAN (1991) Version 2. Phillips Semiconductors, Hamburg

    Google Scholar 

  27. Hank P, Müller S, Vermesan O, Van Den Keybus J (2013) Automotive ethernet: in-vehicle networking and smart mobility. In: Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE 2013:1735–1739

  28. IEEE 802.1 Working Group et al (1999) Local and metropolitan area networks-virtual bridged local area networks. IEEE Std 802.1 Q-1998

  29. IEEE Standards Association et al (2011) IEEE standard for local and metropolitan area networks–timing and synchronization for time-sensitive applications in bridged local area networks. IEEE Std 802

  30. Steiner W (2008) Ttethemet specification

  31. Sun Y, Wu L, Wu S, Li S, Zhang T, Zhang L, Xu J, Xiong Y, Cui X (2017) Attacks and countermeasures in the internet of vehicles. Ann Telecommun 72(5):283–295

    Google Scholar 

  32. Taylor A, Japkowicz N, Leblanc S (2015) Frequency-based anomaly detection for the automotive CAN BUS. In: 2015 World Congress on Industrial Control Systems Security (WCICSS). IEEE, pp 45–49

  33. Marchetti M, Stabili D (2017) Anomaly detection of CAN bus messages through analysis of id sequences. In: 2017 IEEE Intelligent Vehicles Symposium (IV). IEEE, pp 1577–1583

  34. Lee H, Jeong SH, Kim HK (2017) Otids: a novel intrusion detection system for in-vehicle network by using remote frame. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 57–5709

  35. Rieke R, Seidemann M, Talla EK, Zelle D, Seeger B (2017) Behavior analysis for safety and security in automotive systems. In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP). IEEE, pp 381–385

  36. Mo X, Chen P, Wang J, Wang C (2019) Anomaly detection of vehicle CAN network based on message content. In: International Conference on Security and Privacy in New Computing Environments. Springer, pp 96–104

  37. Sunny J, Sankaran S, Saraswat V (2020) A hybrid approach for fast anomaly detection in controller area networks. In: 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6

  38. Theissler A (2014) Anomaly detection in recordings from in-vehicle networks. Big Data and Applications 23:26

    Google Scholar 

  39. Avatefipour O, Al-Sumaiti AS, El-Sherbeeny AM, Awwad EM, Elmeligy MA, Mohamed MA, Malik H (2019) An intelligent secured framework for cyberattack detection in electric vehicles’ CAN bus using machine learning. IEEE Access 7:127580–127592

    Google Scholar 

  40. Al-Saud M, Eltamaly AM, Mohamed MA, Kavousi-Fard A (2019) An intelligent data-driven model to secure intravehicle communications based on machine learning. IEEE Trans Industr Electron 67(6):5112–5119

    Google Scholar 

  41. Narayanan SN, Mittal S, Joshi A (2016) Obd_securealert: an anomaly detection system for vehicles. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, pp 1–6

  42. Levi M, Allouche Y, Kontorovich A (2018) Advanced analytics for connected car cybersecurity. In: 2018 IEEE 87th vehicular technology conference (VTC spring). IEEE, pp 1–7

  43. Casillo M, Coppola S, De Santo M, Pascale F, Santonicola E (2019) Embedded intrusion detection system for detecting attacks over CAN-BUS. In: 2019 4th International Conference on System Reliability and Safety (ICSRS). IEEE, pp 136–141

  44. Tian D, Li Y, Wang Y, Duan X, Wang C, Wang W, Hui R, Guo P (2017) An intrusion detection system based on machine learning for CAN-BUS. In: International Conference on Industrial Networks and Intelligent Systems. Springer, pp 285–294

  45. Han ML, Kwak BI, Kim HK (2021) Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network. IEEE Trans Inf Forensics Secur 16:2941–2956

    Google Scholar 

  46. Yang L, Moubayed A, Shami A (2021) MTH-IDS: a multi-tiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J

  47. Kang M-J, Kang J-W (2016) A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, pp 1–5

  48. Zhang J, Li F, Zhang H, Li R, Li Y (2019) Intrusion detection system using deep learning for in-vehicle security. Ad Hoc Netw 95:101974

    Google Scholar 

  49. Wang C, Zhao Z, Gong L, Zhu L, Liu Z, Cheng X (2018) A distributed anomaly detection system for in-vehicle network using htm. IEEE Access 6:9091–9098

    Google Scholar 

  50. Kohonen T (1990) The self-organizing map. Proc IEEE 78(9):1464–1480

    Google Scholar 

  51. Song HM, Woo J, Kim HK (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:100198

  52. Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) A kohonen som architecture for intrusion detection on in-vehicle communication networks. Appl Sci 10(15):5062

    Google Scholar 

  53. Mehedi ST, Anwar A, Rahman Z, Ahmed K (2021) Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors 21(14):4736

    Google Scholar 

  54. Taylor A, Leblanc S, Japkowicz N (2016) Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). IEEE, pp 130–139

  55. Zhu K, Chen Z, Peng Y, Zhang L (2019) Mobile edge assisted literal multi-dimensional anomaly detection of in-vehicle network using LSTM. IEEE Trans Veh Technol 68(5):4275–4284

    Google Scholar 

  56. Xiao J, Wu H, Li X (2019) Internet of things meets vehicles: sheltering in-vehicle network through lightweight machine learning. Symmetry 11(11):1388

    Google Scholar 

  57. Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y (2020) LSTM-based intrusion detection system for in-vehicle CAN bus communications. IEEE Access 8:185489–185502

    Google Scholar 

  58. Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y (2020) An effective in-vehicle CAN bus intrusion detection system using CNN deep learning approach In: GLOBECOM 2020–2020 IEEE Global Communications Conference. IEEE, pp 1–6

  59. Balaji P, Ghaderi M (2021) Neurocan: contextual anomaly detection in controller area networks. In: 2021 IEEE International Smart Cities Conference (ISC2). IEEE, pp 1–7

  60. Balaji P, Ghaderi M, Zhang H (2022) Canlite: anomaly detection in controller area networks with multitask learning. In: 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring). IEEE, pp 1–5

  61. Javed AR, Ur Rehman S, Khan MU, Alazab M, Reddy T (2021) Canintelliids: aetecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng 8(2):1456–1466

    Google Scholar 

  62. Sun H, Chen M, Weng J, Liu Z, Geng G (2021) Anomaly detection for in-vehicle network using CNN-LSTM with attention mechanism. IEEE Trans Veh Technol 70(10):10880–10893

    Google Scholar 

  63. Thiruloga SV, Kukkala VK, Pasricha S (2022) Tenet: temporal CNN with attention for anomaly detection in automotive cyber-physical systems. In: 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, pp 326–331

  64. Lokman SF, Othman AT, Musa S, Abu Bakar MH (2019) Deep contractive autoencoder-based anomaly detection for in-vehicle controller area network (CAN) In: Progress in Engineering Technology. Springer, pp 195–205

  65. Lin Y, Chen C, Xiao F, Avatefipour O, Alsubhi K, Yunianta A (2020) An evolutionary deep learning anomaly detection framework for in-vehicle networks-CAN bus. IEEE Trans Ind Appl

  66. Jaoudi Y, Yakopcic C, Taha T (2020) Conversion of an unsupervised anomaly detection system to spiking neural network for car hacking identification. In: 2020 11th International Green and Sustainable Computing Workshops (IGSC). IEEE, pp 1–4

  67. Longari S, Valcarcel DHN, Zago M, Carminati M, Zanero S (2020) Cannolo: an anomaly detection system based on LSTM autoencoders for controller area network. IEEE Trans Netw Serv Manage 18(2):1913–1924

    Google Scholar 

  68. Hanselmann M, Strauss T, Dormann K, Ulmer H (2020) Canet: an unsupervised intrusion detection system for high dimensional CAN bus data. IEEE Access 8:58194–58205

    Google Scholar 

  69. Ashraf J, Bakhshi AD, Moustafa N, Khurshid H, Javed A, Beheshti A (2020) Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans Intell Transp Syst

  70. Seo E, Song HM, Kim HK (2018) Gids: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 1–6

  71. Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) Intrusion detection for in-vehicle communication networks: an unsupervised kohonen som approach. Future Internet 12(7):119

    Google Scholar 

  72. Kukkala VK, Thiruloga SV, Pasricha S (2021) Latte: LSTM self-att ention based anomaly detection in e mbedded automotive platforms. ACM Transactions on Embedded Computing Systems (TECS) 20(5s):1–23

    Google Scholar 

  73. Song HM, Kim HK (2021) Self-supervised anomaly detection for in-vehicle network using noised pseudo normal data. IEEE Trans Veh Technol 70(2):1098–1108

    Google Scholar 

  74. Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANET security challenges and solutions: a survey. Veh Commun 7:7–20

    Google Scholar 

  75. Qian B, Zhou H, Ma T, Xu Y, Yu K, Shen X, Hou F (2020) Leveraging dynamic stackelberg pricing game for multi-mode spectrum sharing in 5G-VANET. IEEE Trans Veh Technol 69(6):6374–6387

    Google Scholar 

  76. Shahid MA, Jaekel A, Ezeife C, Al-Ajmi Q, Saini I (2018) Review of potential security attacks in vanet. In: 2018 Majan International Conference (MIC). IEEE, pp 1–4

  77. Kenney JB (2011) Dedicated short-range communications (dsrc) standards in the united states. Proc IEEE 99(7):1162–1182

    Google Scholar 

  78. Bazzi A, Cecchini G, Menarini M, Masini BM, Zanella A (2019) Survey and perspectives of vehicular wi-fi versus sidelink cellular-v2x in the 5G era. Future Internet 11(6):122

    Google Scholar 

  79. Kumar A, Bansal M et al (2017) A review on vanet security attacks and their countermeasure. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, pp 580–585

  80. Sheikh MS, Liang J, Wang W (2019) A survey of security services, attacks, and applications for vehicular ad hoc networks (VANETs). Sensors 19(16):3589

    Google Scholar 

  81. Yang A, Weng J, Cheng N, Ni J, Lin X, Shen X (2019) Deqos attack: degrading quality of service in VANETs and its mitigation. IEEE Trans Veh Technol 68(5):4834–4845

    Google Scholar 

  82. Boualouache A, Senouci S-M, Moussaoui S (2017) A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun Surv Tutorials 20(1):770–790

    Google Scholar 

  83. Boudhir A, Benahmed M, Ghadi A, Bouhorma M (2016) Vehicular navigation spoofing detection based on v2i calibration. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt). IEEE, pp 847–849

  84. Quyoom A, Mir AA, Sarwar A (2020) Security attacks and challenges of VANETs: a literature survey. Journal of Multimedia Information System 7(1):45–54

    Google Scholar 

  85. Chhatwal SS, Sharma M (2015) Detection of impersonation attack in VANETs using buck filter and VANET content fragile watermarking (VCFW). In: 2015 International Conference on Computer Communication and Informatics (ICCCI). IEEE, pp 1–5

  86. Ahmed W, Elhadef, M (2018) Dos attacks and countermeasures in VANETs. In: Advanced Multimedia and Ubiquitous Engineering. Springer, pp 333–341

  87. Ilavendhan A, Saruladha K (2020) Comparative analysis of various approaches for dos attack detection in VANETs. In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp 821–825

  88. Kumar S, Mann KS (2019) Prevention of dos attacks by detection of multiple malicious nodes in VANETs. In: 2019 International Conference on Automation, Computational and Technology Management (ICACTM). IEEE, pp 89–94

  89. Malebary S, Xu W, Huang C-T (2016) Jamming mobility in 802.11 p networks: modeling, evaluation, and detection. In: 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC). IEEE, pp 1–7

  90. Lachdhaf S, Mazouzi M, Abid M et al (2017) Detection and prevention of black hole attack in VANET using secured aodv routing protocol. In: International Conference on Networks & Communications (NetCom 2017), Dubai. pp 25–36

  91. Bhatti FN, Ahmad RB, Abu Bakar MS, Daud S, Elias S, Warip M (2015) Analyze the VANET performance in presence of timing attack and sinkhole attack using OMNET++. Journal of Advanced Research in Computing and Applications 1(1):16–31

    Google Scholar 

  92. Sumra IA, Ab Manan J-L, Hasbullah H (2011) Timing attack in vehicular network. In: Proceedings of the 15th WSEAS International Conference on Computers. World Scientific and Engineering Academy and Society (WSEAS), Corfu Island, Greece, pp 151–155

  93. Junejo MH, Ab Rahman AA-H, Shaikh RA, Yusof KM (2021) Location closeness model for VANETs with integration of 5G. Procedia Comput Sci 182:71–79

    Google Scholar 

  94. Choudhari DP, Dorle SS (2019) Maximization of packet delivery ratio for DADCQ protocol after removal of eavesdropping and DDOS attacks in vanet. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, pp 1–8

  95. Ahmad F, Adnane A, Franqueira VN, Kurugollu F, Liu L (2018) Man-in-the-middle attacks in vehicular ad-hoc networks: evaluating the impact of attackers’ strategies. Sensors 18(11):4040

    Google Scholar 

  96. Al-Shareeda MA, Anbar M, Manickam S, Yassin AA (2020) VPPCS: VANET-based privacy-preserving communication scheme. IEEE Access 8:150914–150928

    Google Scholar 

  97. Pu Y, Xiang T, Hu C, Alrawais A, Yan H (2020) An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inf Sci 540:308–324

    MathSciNet  Google Scholar 

  98. Saini I, Saad S, Jaekel A (2020) A context aware and traffic adaptive privacy scheme in VANETs. In: 2020 IEEE 3rd Connected and Automated Vehicles Symposium (CAVS). IEEE, pp 1–5

  99. Emara K (2016) Poster: Prext: privacy extension for veins VANET simulator. In: 2016 IEEE Vehicular Networking Conference (VNC). IEEE, pp 1–2

  100. Kamel J, Wolf M, van der Hei RW, Kaiser A, Urien P, Kargl F (2020) Veremi extension: a dataset for comparable evaluation of misbehavior detection in VANETs. In: ICC 2020–2020 IEEE International Conference on Communications (ICC). IEEE, pp 1–6

  101. van der Heijden RW, Lukaseder T, Kargl F (2018) Veremi: a dataset for comparable evaluation of misbehavior detection in VANETs. Preprint at http://arxiv.org/abs/1804.06701

  102. Kamel J, Haidar F, Jemaa IB, Kaiser A, Lonc B, Urien P (2019) A misbehavior authority system for sybil attack detection in C-ITS. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, pp 1117–1123

  103. Singh PK, Gupta RR, Nandi SK, Nandi S (2019) Machine learning based approach to detect wormhole attack in VANETs. In: Workshops of the International Conference on Advanced Information Networking and Applications. Springer, pp 651–661

  104. van der Heijden RW, Dietzel S, Leinmüller T, Kargl F (2018) Survey on misbehavior detection in cooperative intelligent transportation systems. IEEE Commun Surv Tutorials 21(1):779–811

    Google Scholar 

  105. Hortelano J, Ruiz JC, Manzoni P (2010) Evaluating the usefulness of watchdogs for intrusion detection in VANETs. In: 2010 IEEE International Conference on Communications Workshops. IEEE, pp 1–5

  106. Hamieh A, Ben-Othman J, Mokdad L (2009) Detection of radio interference attacks in VANET. In: GLOBECOM 2009–2009 IEEE Global Telecommunications Conference. IEEE, pp 1–5

  107. Puñal O, Aguiar A, Gross J (2012) In VANETs we trust? Characterizing RF jamming in vehicular networks. In: Proceedings of the Ninth ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications. pp 83–92

  108. Zaidi K, Milojevic MB, Rakocevic V, Nallanathan A, Rajarajan M (2015) Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans Veh Technol 65(8):6703–6714

    Google Scholar 

  109. Grover J, Prajapati NK, Laxmi V, Gaur MS (2011) Machine learning approach for multiple misbehavior detection in VANET. In: International Conference on Advances in Computing and Communications. Springer, pp 644–653

  110. Gyawali S, Qian Y (2019) Misbehavior detection using machine learning in vehicular communication networks. In: ICC 2019–2019 IEEE International Conference on Communications (ICC). IEEE, pp 1–6

  111. Zeng Y, Qiu M, Zhu D, Xue Z, Xiong J, Liu M (2019) DEEPVCM: a deep learning based intrusion detection method in VANET. In: 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity). IEEE, pp 288–293

  112. Montenegro J, Iza C, Aguilar Igartua M (2020) Detection of position falsification attacks in VANETs applying trust model and machine learning. In: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks. pp 9–16

  113. Wang S-Y, Lin C-C (2008) NCTUNS 5.0: a network simulator for IEEE 802.11 (p) and 1609 wireless vehicular network researches. In: 2008 IEEE 68th Vehicular Technology Conference. IEEE, pp 1–2

  114. Witten IH, Frank E, Trigg LE, Hall MA, Holmes G, Cunningham SJ (1999) Weka: practical machine learning tools and techniques with Java implementations

  115. So S, Sharma P, Petit J (2018) Integrating plausibility checks and machine learning for misbehavior detection in VANET. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, pp 564–571

  116. Sharma A, Jaekel A (2021) Machine learning approach for detecting location spoofing in VANET. In: 2021 International Conference on Computer Communications and Networks (ICCCN). IEEE, pp 1–6

  117. Lopez PA, Behrisch M, Bieker-Walz L, Erdmann J, Flötteröd Y-P, Hilbrich R, Lücken L, Rummel J, Wagner P, Wießner E (2018) Microscopic traffic simulation using sumo. In: 2018 21st International Conference on Intelligent Transportation Systems (ITSC). IEEE, pp 2575–2582

  118. Riley GF, Henderson TR (2010) The NS-3 network simulator. In: Modeling and Tools for Network Simulation. Springer, pp 15–34

  119. Haklay M, Weber P (2008) Openstreetmap: User-generated street maps. IEEE Pervasive Comput 7(4):12–18

    Google Scholar 

  120. Sommer C, German R, Dressler F (2010) Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans Mob Comput 10(1):3–15

    Google Scholar 

  121. Shams EA, Rizaner A, Ulusoy AH (2018) Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks. Comput Secur 78:245–254

    Google Scholar 

  122. Sharma P, Liu H (2020) A machine-learning-based data-centric misbehavior detection model for internet of vehicles. IEEE Internet Things J 8(6):4991–4999

    Google Scholar 

  123. Karagiannis D, Argyriou A (2018) Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning. Veh Commun 13:56–63

    Google Scholar 

  124. Oucheikh R, Fri M, Fedouaki F, Hain M (2020) Deep anomaly detector based on spatio-temporal clustering for connected autonomous vehicles. In: International Conference on Ad Hoc Networks. Springer, pp 201–212

  125. Wyoming dot connected vehicle pilot improving safety and travel reliability on i–80 in Wyoming. [Online]. https://wydotcvp.wyoroad.info/

  126. Aneja MJS, Bhatia T, Sharma G, Shrivastava G (2018) Artificial intelligence based intrusion detection system to detect flooding attack in VANETs. In: Handbook of Research on Network Forensics and Analysis Techniques. IGI Global, pp 87–100

  127. Atli BG, Miche Y, Kalliola A, Oliver I, Holtmanns S, Lendasse A (2018) Anomaly-based intrusion detection using extreme learning machine and aggregation of network traffic statistics in probability space. Cogn Comput 10(5):848–863

    Google Scholar 

  128. Uprety A, Rawat DB, Li J (2021) Privacy preserving misbehavior detection in IoV using federated machine learning. In: 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 1–6

  129. Jaton N (2021) Distributed neural network based architecture for DDOS detection in vehicular communication systems

  130. Varga A (2001) Discrete event simulation system. In: Proceedings of the European Simulation Multiconference (ESM’2001). pp 1–7

  131. Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of sumo-simulation of urban mobility. International Journal on Advances in Systems and Measurements 5(3 &4)

  132. Codecá L, Frank R, Faye S, Engel T (2017) Luxembourg sumo traffic (lust) scenario: traffic demand evaluation. IEEE Intell Transp Syst Mag 9(2):52–63

    Google Scholar 

  133. Chakirov A, Fourie PJ (2014) Enriched sioux falls scenario with dynamic and disaggregate demand. Arbeitsberichte Verkehrs-und Raumplanung 978

  134. Axhausen KW, Horni A, Nagel K (2016) The multi-agent transport simulation MATSim. Ubiquity Press

  135. Uppoor S, Fiore M (2011) Large-scale urban vehicular mobility for networking research. In: 2011 IEEE Vehicular Networking Conference (VNC). IEEE, pp 62–69

  136. Pigné Y, Danoy G, Bouvry P (2011) A vehicular mobility model based on real traffic counting data. In: International Workshop on Communication Technologies for Vehicles. Springer, pp 131–142

  137. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp 1–6

  138. He Q, Meng X, Qu R, Xi R (2020) Machine learning-based detection for cyber security attacks on connected and autonomous vehicles. Mathematics 8(8):1311

    Google Scholar 

  139. Kim M, Jang I, Choo S, Koo J, Pack S (2017) Collaborative security attack detection in software-defined vehicular networks. In: 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, pp 19–24

  140. Gao Y, Wu H, Song B, Jin Y, Luo X, Zeng X (2019) A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7:154560–154571

    Google Scholar 

  141. Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, pp 1–6

  142. Song J, Takakura H, Okabe Y, Eto M, Inoue D, Nakao K (2011) Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for nids evaluation. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. pp 29–36

  143. Ali Alheeti KM, McDonald-Maier K (2018) Intelligent intrusion detection in external communication systems for autonomous vehicles. Syst Sci Control Eng 6(1):48–56

    Google Scholar 

  144. Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357–374

    Google Scholar 

  145. Belenko V, Krundyshev V, Kalinin M (2018) Synthetic datasets generation for intrusion detection in VANET. In: Proceedings of the 11th International Conference on Security of Information and Networks. pp 1–6

  146. Gonçalves F, Ribeiro B, Gama O, Santos J, Costa A, Dias B, Nicolau MJ, Macedo J, Santos A (2020) Synthesizing datasets with security threats for vehicular ad-hoc networks. In: GLOBECOM 2020–2020 IEEE Global Communications Conference. IEEE, pp 1–6

  147. Schünemann B (2011) V2x simulation runtime infrastructure Vsimrti: an assessment tool to design smart traffic management systems. Comput Netw 55(14):3189–3198

    Google Scholar 

  148. Dataset collection. (2020, Dec). Accessed September 20, 2021. [Online]. https://github.com/fabio-r-goncalves/dataset-collection

  149. Alhaidari FA, Alrehan AM (2021) A simulation work for generating a novel dataset to detect distributed denial of service attacks on vehicular ad hoc network systems. Int J Distrib Sens Netw 17(3):15501477211000288

    Google Scholar 

  150. Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y (2019) An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw 90:101842

    Google Scholar 

  151. Wyoming D (2018) Connected vehicle pilot: improving safety and travel reliability on 1–80 in Wyoming

  152. Rehman A, Rehman SU, Khan M, Alazab M, Reddy T (2021) Canintelliids: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng

  153. Dupont G, Lekidis A, Den Hartog J, Etalle S (2019) Automotive controller area network (CAN) BUS intrusion dataset v. 2

  154. Woo S, Jo HJ, Lee DH (2014) A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans Intell Transp Syst 16(2):993–1006

    Google Scholar 

  155. Syncan dataset (2020, Apr) Accessed September 20, 2021. [Online]. https://github.com/etas/SynCAN

  156. Verma ME, Iannacone MD, Bridges RA, Hollifield SC, Moriano P, Kay B, Combs FL (2022) Addressing the lack of comparability & testing in CAN intrusion detection research: a comprehensive guide to CAN IDS data & introduction of the road dataset

  157. Berger I, Rieke R, Kolomeets M, Chechulin A, Kotenko I (2018) Comparative study of machine learning methods for in-vehicle intrusion detection. In: Computer Security. Springer, pp 85–101

  158. Gunduz MZ, Das R (2018) A comparison of cyber-security oriented testbeds for IoT-based smart grids. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, pp 1–6

  159. California connected vehicle testbed - home. [Online]. https://caconnectedvehicletestbed.org/index.php/. Accessed 17 Sept 2021

  160. Test bed for connected and autonomous vehicles: Cav. [Online]. https://www.millbrook.us/services/connected-and-autonomous-vehicle-testing/. Accessed 17 Sept 2021

  161. Everett CE, McCoy D (2013) OCTANE (open car testbed and network experiments): bringing cyber-physical security research to researchers and students. In: 6th Workshop on Cyber Security Experimentation and Test (CSET 13)

  162. Dosovitskiy A, Ros G, Codevilla F, Lopez A, Koltun V (2017) Carla: an open urban driving simulator. In: Conference on Robot Learning. PMLR, pp 1–16

  163. Gss7000 series GNSS constellatio simulator (2021) Spirent Communications PLC

  164. SimHiL Datasheet (2021) Spirent Communications PLC

  165. V2x test tools (2020, Jul) [Online]. https://www.danlawinc.com/v2xtesttools/. Accessed 20 Sept 2021

Download references

Funding

This work was supported by Mitacs through the Mitacs Accelerate Program.

Author information

Authors and Affiliations

Authors

Contributions

All authors have contributions to this work.

Corresponding author

Correspondence to Ning Zhang.

Ethics declarations

Ethics approval

Not applicable.

Consent to publish

Yes

Conflict of interest

No

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nagarajan, J., Mansourian, P., Shahid, M.A. et al. Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey. Peer-to-Peer Netw. Appl. 16, 2153–2185 (2023). https://doi.org/10.1007/s12083-023-01508-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01508-7

Keywords

Navigation