Abstract
Connected and Autonomous Vehicles (CAVs) expect to dramatically improve road safety and efficiency of the transportation system. However, CAVs can be vulnerable to attacks at different levels, e.g., attacks on intra-vehicle networks and inter-vehicle networks. Those malicious attacks not only result in loss of confidentiality and user privacy but also lead to more serious consequences such as bodily injury and loss of life. An intrusion detection system (IDS) is one of the most effective ways to monitor the operations of vehicles and networks, detect different types of attacks, and provide essential information to mitigate and remedy the effects of attacks. To ensure the safety of CAVs, it is extremely important to detect various attacks accurately in a timely fashion. The purpose of this survey is to provide a comprehensive review of available machine learning (ML) based IDS for intra-vehicle and inter-vehicle networks. Additionally, this paper discusses publicly available datasets for CAV and offers a summary of the many current testbeds and future research trends for connected vehicle environments.
Similar content being viewed by others
Data availability
Not applicable.
References
Ye X, Zhou J, Li Y, Cao M, Chen D, Qin Z (2021) A location privacy protection scheme for convoy driving in autonomous driving era. Peer Peer Netw Appl 14(3):1388–1400
Yang Q, Fu S, Wang H, Fang H (2021) Machine-learning-enabled cooperative perception for connected autonomous vehicles: challenges and opportunities. IEEE Netw 35(3):96–101
Taherkhani N, Pierre S (2016) Centralized and localized data congestion control strategy for vehicular ad hoc networks using a machine learning clustering algorithm. IEEE Trans Intell Transp Syst 17(11):3275–3285
Reebadiya D, Rathod T, Gupta R, Tanwar S, Kumar N (2021) Blockchain-based secure and intelligent sensing scheme for autonomous vehicles activity tracking beyond 5G networks. Peer Peer Netw Appl 14(5):2757–2774
Sun X, Yu FR, Zhang P (2021) A survey on cyber-security of connected and autonomous vehicles (CAVS). IEEE Trans Intell Transp Syst
Feng X, Li C-Y, Chen D-X, Tang J (2017) A method for defensing against multi-source sybil attacks in VANET. Peer Peer Netw Appl 10(2):305–314
Wang S, Mao K, Zhan F, Liu D (2020) Hybrid conditional privacy-preserving authentication scheme for VANETs. Peer Peer Netw Appl 13(5):1600–1615
Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015(S 91)
Kumar SV, Mary GAA, Suresh P, Uthirasamy R (2021) Investigation on cyber-attacks against in-vehicle network. In: 2021 7th International Conference on Electrical Energy Systems (ICEES). IEEE, pp 305–311
Wolf M, Weimerskirch A, Wollinger T (2007) State of the art: embedding security in vehicles. EURASIP J Embed Syst 2007:1–16
Vdovic H, Babic J, Podobnik V (2019) Automotive software in connected and autonomous electric vehicles: a review. IEEE Access 7:166365–166379
Lu N, Zhang N, Cheng N, Shen X, Mark JW, Bai F (2013) Vehicles meet infrastructure: toward capacity-cost tradeoffs for vehicular access networks. IEEE Trans Intell Transp Syst 14(3):1266–1277
Zhang N, Zhang S, Yang P, Alhussein O, Zhuang W, Shen XS (2017) Software defined space-air-ground integrated vehicular networks: challenges and solutions. IEEE Commun Mag 55(7):101–109
Kumar D, Barani S (2021) Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs). Peer Peer Netw Appl 14(4):2524–2536
Lu N, Cheng N, Zhang N, Shen X, Mark JW (2014) Connected vehicles: solutions and challenges. IEEE Internet Things J 1(4):289–299
Loukas G, Karapistoli E, Panaousis E, Sarigiannidis P, Bezemskij A, Vuong T (2019) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Netw 84:124–147
Kim K, Kim JS, Jeong S, Park J-H, Kim HK (2021) Cybersecurity for autonomous vehicles: review of attacks and defense. Comput Secur 103:102150
Karopoulos G, Kambourakis G, Chatzoglou E, Hernández-Ramos JL, Kouliaridis V (2022) Demystifying in-vehicle intrusion detection systems: a survey of surveys and a meta-taxonomy. Electronics 11(7):1072
Al-Jarrah OY, Maple C, Dianati M, Oxtoby D, Mouzakitis A (2019) Intrusion detection systems for intra-vehicle networks: a review. IEEE Access 7:21266–21289
Wu W, Li R, Xie G, An J, Bai Y, Zhou J, Li K (2019) A survey of intrusion detection for in-vehicle networks. IEEE Trans Intell Transp Syst 21(3):919–933
Bangui H, Buhnova B (2021) Recent advances in machine-learning driven intrusion detection in transportation: survey. Procedia Comput Sci 184:877–886
Young C, Zambreno J, Olufowobi H, Bloom G (2019) Survey of automotive controller area network intrusion detection systems. IEEE Des Test 36(6):48–55
LIN Specification Package (2003) Revision 2.0, LIN consortium
FlexRay Consortium et al (2010) Flexray communication systems protocol specification, version 3.0. 1 [ol]
MOST Cooperation (2009) Most specification 3v0. pp 1–20
Specification CAN (1991) Version 2. Phillips Semiconductors, Hamburg
Hank P, Müller S, Vermesan O, Van Den Keybus J (2013) Automotive ethernet: in-vehicle networking and smart mobility. In: Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE 2013:1735–1739
IEEE 802.1 Working Group et al (1999) Local and metropolitan area networks-virtual bridged local area networks. IEEE Std 802.1 Q-1998
IEEE Standards Association et al (2011) IEEE standard for local and metropolitan area networks–timing and synchronization for time-sensitive applications in bridged local area networks. IEEE Std 802
Steiner W (2008) Ttethemet specification
Sun Y, Wu L, Wu S, Li S, Zhang T, Zhang L, Xu J, Xiong Y, Cui X (2017) Attacks and countermeasures in the internet of vehicles. Ann Telecommun 72(5):283–295
Taylor A, Japkowicz N, Leblanc S (2015) Frequency-based anomaly detection for the automotive CAN BUS. In: 2015 World Congress on Industrial Control Systems Security (WCICSS). IEEE, pp 45–49
Marchetti M, Stabili D (2017) Anomaly detection of CAN bus messages through analysis of id sequences. In: 2017 IEEE Intelligent Vehicles Symposium (IV). IEEE, pp 1577–1583
Lee H, Jeong SH, Kim HK (2017) Otids: a novel intrusion detection system for in-vehicle network by using remote frame. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 57–5709
Rieke R, Seidemann M, Talla EK, Zelle D, Seeger B (2017) Behavior analysis for safety and security in automotive systems. In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP). IEEE, pp 381–385
Mo X, Chen P, Wang J, Wang C (2019) Anomaly detection of vehicle CAN network based on message content. In: International Conference on Security and Privacy in New Computing Environments. Springer, pp 96–104
Sunny J, Sankaran S, Saraswat V (2020) A hybrid approach for fast anomaly detection in controller area networks. In: 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6
Theissler A (2014) Anomaly detection in recordings from in-vehicle networks. Big Data and Applications 23:26
Avatefipour O, Al-Sumaiti AS, El-Sherbeeny AM, Awwad EM, Elmeligy MA, Mohamed MA, Malik H (2019) An intelligent secured framework for cyberattack detection in electric vehicles’ CAN bus using machine learning. IEEE Access 7:127580–127592
Al-Saud M, Eltamaly AM, Mohamed MA, Kavousi-Fard A (2019) An intelligent data-driven model to secure intravehicle communications based on machine learning. IEEE Trans Industr Electron 67(6):5112–5119
Narayanan SN, Mittal S, Joshi A (2016) Obd_securealert: an anomaly detection system for vehicles. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, pp 1–6
Levi M, Allouche Y, Kontorovich A (2018) Advanced analytics for connected car cybersecurity. In: 2018 IEEE 87th vehicular technology conference (VTC spring). IEEE, pp 1–7
Casillo M, Coppola S, De Santo M, Pascale F, Santonicola E (2019) Embedded intrusion detection system for detecting attacks over CAN-BUS. In: 2019 4th International Conference on System Reliability and Safety (ICSRS). IEEE, pp 136–141
Tian D, Li Y, Wang Y, Duan X, Wang C, Wang W, Hui R, Guo P (2017) An intrusion detection system based on machine learning for CAN-BUS. In: International Conference on Industrial Networks and Intelligent Systems. Springer, pp 285–294
Han ML, Kwak BI, Kim HK (2021) Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network. IEEE Trans Inf Forensics Secur 16:2941–2956
Yang L, Moubayed A, Shami A (2021) MTH-IDS: a multi-tiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J
Kang M-J, Kang J-W (2016) A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, pp 1–5
Zhang J, Li F, Zhang H, Li R, Li Y (2019) Intrusion detection system using deep learning for in-vehicle security. Ad Hoc Netw 95:101974
Wang C, Zhao Z, Gong L, Zhu L, Liu Z, Cheng X (2018) A distributed anomaly detection system for in-vehicle network using htm. IEEE Access 6:9091–9098
Kohonen T (1990) The self-organizing map. Proc IEEE 78(9):1464–1480
Song HM, Woo J, Kim HK (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:100198
Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) A kohonen som architecture for intrusion detection on in-vehicle communication networks. Appl Sci 10(15):5062
Mehedi ST, Anwar A, Rahman Z, Ahmed K (2021) Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors 21(14):4736
Taylor A, Leblanc S, Japkowicz N (2016) Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA). IEEE, pp 130–139
Zhu K, Chen Z, Peng Y, Zhang L (2019) Mobile edge assisted literal multi-dimensional anomaly detection of in-vehicle network using LSTM. IEEE Trans Veh Technol 68(5):4275–4284
Xiao J, Wu H, Li X (2019) Internet of things meets vehicles: sheltering in-vehicle network through lightweight machine learning. Symmetry 11(11):1388
Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y (2020) LSTM-based intrusion detection system for in-vehicle CAN bus communications. IEEE Access 8:185489–185502
Hossain MD, Inoue H, Ochiai H, Fall D, Kadobayashi Y (2020) An effective in-vehicle CAN bus intrusion detection system using CNN deep learning approach In: GLOBECOM 2020–2020 IEEE Global Communications Conference. IEEE, pp 1–6
Balaji P, Ghaderi M (2021) Neurocan: contextual anomaly detection in controller area networks. In: 2021 IEEE International Smart Cities Conference (ISC2). IEEE, pp 1–7
Balaji P, Ghaderi M, Zhang H (2022) Canlite: anomaly detection in controller area networks with multitask learning. In: 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring). IEEE, pp 1–5
Javed AR, Ur Rehman S, Khan MU, Alazab M, Reddy T (2021) Canintelliids: aetecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng 8(2):1456–1466
Sun H, Chen M, Weng J, Liu Z, Geng G (2021) Anomaly detection for in-vehicle network using CNN-LSTM with attention mechanism. IEEE Trans Veh Technol 70(10):10880–10893
Thiruloga SV, Kukkala VK, Pasricha S (2022) Tenet: temporal CNN with attention for anomaly detection in automotive cyber-physical systems. In: 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, pp 326–331
Lokman SF, Othman AT, Musa S, Abu Bakar MH (2019) Deep contractive autoencoder-based anomaly detection for in-vehicle controller area network (CAN) In: Progress in Engineering Technology. Springer, pp 195–205
Lin Y, Chen C, Xiao F, Avatefipour O, Alsubhi K, Yunianta A (2020) An evolutionary deep learning anomaly detection framework for in-vehicle networks-CAN bus. IEEE Trans Ind Appl
Jaoudi Y, Yakopcic C, Taha T (2020) Conversion of an unsupervised anomaly detection system to spiking neural network for car hacking identification. In: 2020 11th International Green and Sustainable Computing Workshops (IGSC). IEEE, pp 1–4
Longari S, Valcarcel DHN, Zago M, Carminati M, Zanero S (2020) Cannolo: an anomaly detection system based on LSTM autoencoders for controller area network. IEEE Trans Netw Serv Manage 18(2):1913–1924
Hanselmann M, Strauss T, Dormann K, Ulmer H (2020) Canet: an unsupervised intrusion detection system for high dimensional CAN bus data. IEEE Access 8:58194–58205
Ashraf J, Bakhshi AD, Moustafa N, Khurshid H, Javed A, Beheshti A (2020) Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans Intell Transp Syst
Seo E, Song HM, Kim HK (2018) Gids: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, pp 1–6
Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) Intrusion detection for in-vehicle communication networks: an unsupervised kohonen som approach. Future Internet 12(7):119
Kukkala VK, Thiruloga SV, Pasricha S (2021) Latte: LSTM self-att ention based anomaly detection in e mbedded automotive platforms. ACM Transactions on Embedded Computing Systems (TECS) 20(5s):1–23
Song HM, Kim HK (2021) Self-supervised anomaly detection for in-vehicle network using noised pseudo normal data. IEEE Trans Veh Technol 70(2):1098–1108
Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANET security challenges and solutions: a survey. Veh Commun 7:7–20
Qian B, Zhou H, Ma T, Xu Y, Yu K, Shen X, Hou F (2020) Leveraging dynamic stackelberg pricing game for multi-mode spectrum sharing in 5G-VANET. IEEE Trans Veh Technol 69(6):6374–6387
Shahid MA, Jaekel A, Ezeife C, Al-Ajmi Q, Saini I (2018) Review of potential security attacks in vanet. In: 2018 Majan International Conference (MIC). IEEE, pp 1–4
Kenney JB (2011) Dedicated short-range communications (dsrc) standards in the united states. Proc IEEE 99(7):1162–1182
Bazzi A, Cecchini G, Menarini M, Masini BM, Zanella A (2019) Survey and perspectives of vehicular wi-fi versus sidelink cellular-v2x in the 5G era. Future Internet 11(6):122
Kumar A, Bansal M et al (2017) A review on vanet security attacks and their countermeasure. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, pp 580–585
Sheikh MS, Liang J, Wang W (2019) A survey of security services, attacks, and applications for vehicular ad hoc networks (VANETs). Sensors 19(16):3589
Yang A, Weng J, Cheng N, Ni J, Lin X, Shen X (2019) Deqos attack: degrading quality of service in VANETs and its mitigation. IEEE Trans Veh Technol 68(5):4834–4845
Boualouache A, Senouci S-M, Moussaoui S (2017) A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun Surv Tutorials 20(1):770–790
Boudhir A, Benahmed M, Ghadi A, Bouhorma M (2016) Vehicular navigation spoofing detection based on v2i calibration. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt). IEEE, pp 847–849
Quyoom A, Mir AA, Sarwar A (2020) Security attacks and challenges of VANETs: a literature survey. Journal of Multimedia Information System 7(1):45–54
Chhatwal SS, Sharma M (2015) Detection of impersonation attack in VANETs using buck filter and VANET content fragile watermarking (VCFW). In: 2015 International Conference on Computer Communication and Informatics (ICCCI). IEEE, pp 1–5
Ahmed W, Elhadef, M (2018) Dos attacks and countermeasures in VANETs. In: Advanced Multimedia and Ubiquitous Engineering. Springer, pp 333–341
Ilavendhan A, Saruladha K (2020) Comparative analysis of various approaches for dos attack detection in VANETs. In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp 821–825
Kumar S, Mann KS (2019) Prevention of dos attacks by detection of multiple malicious nodes in VANETs. In: 2019 International Conference on Automation, Computational and Technology Management (ICACTM). IEEE, pp 89–94
Malebary S, Xu W, Huang C-T (2016) Jamming mobility in 802.11 p networks: modeling, evaluation, and detection. In: 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC). IEEE, pp 1–7
Lachdhaf S, Mazouzi M, Abid M et al (2017) Detection and prevention of black hole attack in VANET using secured aodv routing protocol. In: International Conference on Networks & Communications (NetCom 2017), Dubai. pp 25–36
Bhatti FN, Ahmad RB, Abu Bakar MS, Daud S, Elias S, Warip M (2015) Analyze the VANET performance in presence of timing attack and sinkhole attack using OMNET++. Journal of Advanced Research in Computing and Applications 1(1):16–31
Sumra IA, Ab Manan J-L, Hasbullah H (2011) Timing attack in vehicular network. In: Proceedings of the 15th WSEAS International Conference on Computers. World Scientific and Engineering Academy and Society (WSEAS), Corfu Island, Greece, pp 151–155
Junejo MH, Ab Rahman AA-H, Shaikh RA, Yusof KM (2021) Location closeness model for VANETs with integration of 5G. Procedia Comput Sci 182:71–79
Choudhari DP, Dorle SS (2019) Maximization of packet delivery ratio for DADCQ protocol after removal of eavesdropping and DDOS attacks in vanet. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, pp 1–8
Ahmad F, Adnane A, Franqueira VN, Kurugollu F, Liu L (2018) Man-in-the-middle attacks in vehicular ad-hoc networks: evaluating the impact of attackers’ strategies. Sensors 18(11):4040
Al-Shareeda MA, Anbar M, Manickam S, Yassin AA (2020) VPPCS: VANET-based privacy-preserving communication scheme. IEEE Access 8:150914–150928
Pu Y, Xiang T, Hu C, Alrawais A, Yan H (2020) An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inf Sci 540:308–324
Saini I, Saad S, Jaekel A (2020) A context aware and traffic adaptive privacy scheme in VANETs. In: 2020 IEEE 3rd Connected and Automated Vehicles Symposium (CAVS). IEEE, pp 1–5
Emara K (2016) Poster: Prext: privacy extension for veins VANET simulator. In: 2016 IEEE Vehicular Networking Conference (VNC). IEEE, pp 1–2
Kamel J, Wolf M, van der Hei RW, Kaiser A, Urien P, Kargl F (2020) Veremi extension: a dataset for comparable evaluation of misbehavior detection in VANETs. In: ICC 2020–2020 IEEE International Conference on Communications (ICC). IEEE, pp 1–6
van der Heijden RW, Lukaseder T, Kargl F (2018) Veremi: a dataset for comparable evaluation of misbehavior detection in VANETs. Preprint at http://arxiv.org/abs/1804.06701
Kamel J, Haidar F, Jemaa IB, Kaiser A, Lonc B, Urien P (2019) A misbehavior authority system for sybil attack detection in C-ITS. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, pp 1117–1123
Singh PK, Gupta RR, Nandi SK, Nandi S (2019) Machine learning based approach to detect wormhole attack in VANETs. In: Workshops of the International Conference on Advanced Information Networking and Applications. Springer, pp 651–661
van der Heijden RW, Dietzel S, Leinmüller T, Kargl F (2018) Survey on misbehavior detection in cooperative intelligent transportation systems. IEEE Commun Surv Tutorials 21(1):779–811
Hortelano J, Ruiz JC, Manzoni P (2010) Evaluating the usefulness of watchdogs for intrusion detection in VANETs. In: 2010 IEEE International Conference on Communications Workshops. IEEE, pp 1–5
Hamieh A, Ben-Othman J, Mokdad L (2009) Detection of radio interference attacks in VANET. In: GLOBECOM 2009–2009 IEEE Global Telecommunications Conference. IEEE, pp 1–5
Puñal O, Aguiar A, Gross J (2012) In VANETs we trust? Characterizing RF jamming in vehicular networks. In: Proceedings of the Ninth ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications. pp 83–92
Zaidi K, Milojevic MB, Rakocevic V, Nallanathan A, Rajarajan M (2015) Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans Veh Technol 65(8):6703–6714
Grover J, Prajapati NK, Laxmi V, Gaur MS (2011) Machine learning approach for multiple misbehavior detection in VANET. In: International Conference on Advances in Computing and Communications. Springer, pp 644–653
Gyawali S, Qian Y (2019) Misbehavior detection using machine learning in vehicular communication networks. In: ICC 2019–2019 IEEE International Conference on Communications (ICC). IEEE, pp 1–6
Zeng Y, Qiu M, Zhu D, Xue Z, Xiong J, Liu M (2019) DEEPVCM: a deep learning based intrusion detection method in VANET. In: 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity). IEEE, pp 288–293
Montenegro J, Iza C, Aguilar Igartua M (2020) Detection of position falsification attacks in VANETs applying trust model and machine learning. In: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks. pp 9–16
Wang S-Y, Lin C-C (2008) NCTUNS 5.0: a network simulator for IEEE 802.11 (p) and 1609 wireless vehicular network researches. In: 2008 IEEE 68th Vehicular Technology Conference. IEEE, pp 1–2
Witten IH, Frank E, Trigg LE, Hall MA, Holmes G, Cunningham SJ (1999) Weka: practical machine learning tools and techniques with Java implementations
So S, Sharma P, Petit J (2018) Integrating plausibility checks and machine learning for misbehavior detection in VANET. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, pp 564–571
Sharma A, Jaekel A (2021) Machine learning approach for detecting location spoofing in VANET. In: 2021 International Conference on Computer Communications and Networks (ICCCN). IEEE, pp 1–6
Lopez PA, Behrisch M, Bieker-Walz L, Erdmann J, Flötteröd Y-P, Hilbrich R, Lücken L, Rummel J, Wagner P, Wießner E (2018) Microscopic traffic simulation using sumo. In: 2018 21st International Conference on Intelligent Transportation Systems (ITSC). IEEE, pp 2575–2582
Riley GF, Henderson TR (2010) The NS-3 network simulator. In: Modeling and Tools for Network Simulation. Springer, pp 15–34
Haklay M, Weber P (2008) Openstreetmap: User-generated street maps. IEEE Pervasive Comput 7(4):12–18
Sommer C, German R, Dressler F (2010) Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans Mob Comput 10(1):3–15
Shams EA, Rizaner A, Ulusoy AH (2018) Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks. Comput Secur 78:245–254
Sharma P, Liu H (2020) A machine-learning-based data-centric misbehavior detection model for internet of vehicles. IEEE Internet Things J 8(6):4991–4999
Karagiannis D, Argyriou A (2018) Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning. Veh Commun 13:56–63
Oucheikh R, Fri M, Fedouaki F, Hain M (2020) Deep anomaly detector based on spatio-temporal clustering for connected autonomous vehicles. In: International Conference on Ad Hoc Networks. Springer, pp 201–212
Wyoming dot connected vehicle pilot improving safety and travel reliability on i–80 in Wyoming. [Online]. https://wydotcvp.wyoroad.info/
Aneja MJS, Bhatia T, Sharma G, Shrivastava G (2018) Artificial intelligence based intrusion detection system to detect flooding attack in VANETs. In: Handbook of Research on Network Forensics and Analysis Techniques. IGI Global, pp 87–100
Atli BG, Miche Y, Kalliola A, Oliver I, Holtmanns S, Lendasse A (2018) Anomaly-based intrusion detection using extreme learning machine and aggregation of network traffic statistics in probability space. Cogn Comput 10(5):848–863
Uprety A, Rawat DB, Li J (2021) Privacy preserving misbehavior detection in IoV using federated machine learning. In: 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 1–6
Jaton N (2021) Distributed neural network based architecture for DDOS detection in vehicular communication systems
Varga A (2001) Discrete event simulation system. In: Proceedings of the European Simulation Multiconference (ESM’2001). pp 1–7
Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of sumo-simulation of urban mobility. International Journal on Advances in Systems and Measurements 5(3 &4)
Codecá L, Frank R, Faye S, Engel T (2017) Luxembourg sumo traffic (lust) scenario: traffic demand evaluation. IEEE Intell Transp Syst Mag 9(2):52–63
Chakirov A, Fourie PJ (2014) Enriched sioux falls scenario with dynamic and disaggregate demand. Arbeitsberichte Verkehrs-und Raumplanung 978
Axhausen KW, Horni A, Nagel K (2016) The multi-agent transport simulation MATSim. Ubiquity Press
Uppoor S, Fiore M (2011) Large-scale urban vehicular mobility for networking research. In: 2011 IEEE Vehicular Networking Conference (VNC). IEEE, pp 62–69
Pigné Y, Danoy G, Bouvry P (2011) A vehicular mobility model based on real traffic counting data. In: International Workshop on Communication Technologies for Vehicles. Springer, pp 131–142
Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp 1–6
He Q, Meng X, Qu R, Xi R (2020) Machine learning-based detection for cyber security attacks on connected and autonomous vehicles. Mathematics 8(8):1311
Kim M, Jang I, Choo S, Koo J, Pack S (2017) Collaborative security attack detection in software-defined vehicular networks. In: 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, pp 19–24
Gao Y, Wu H, Song B, Jin Y, Luo X, Zeng X (2019) A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7:154560–154571
Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, pp 1–6
Song J, Takakura H, Okabe Y, Eto M, Inoue D, Nakao K (2011) Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for nids evaluation. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. pp 29–36
Ali Alheeti KM, McDonald-Maier K (2018) Intelligent intrusion detection in external communication systems for autonomous vehicles. Syst Sci Control Eng 6(1):48–56
Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357–374
Belenko V, Krundyshev V, Kalinin M (2018) Synthetic datasets generation for intrusion detection in VANET. In: Proceedings of the 11th International Conference on Security of Information and Networks. pp 1–6
Gonçalves F, Ribeiro B, Gama O, Santos J, Costa A, Dias B, Nicolau MJ, Macedo J, Santos A (2020) Synthesizing datasets with security threats for vehicular ad-hoc networks. In: GLOBECOM 2020–2020 IEEE Global Communications Conference. IEEE, pp 1–6
Schünemann B (2011) V2x simulation runtime infrastructure Vsimrti: an assessment tool to design smart traffic management systems. Comput Netw 55(14):3189–3198
Dataset collection. (2020, Dec). Accessed September 20, 2021. [Online]. https://github.com/fabio-r-goncalves/dataset-collection
Alhaidari FA, Alrehan AM (2021) A simulation work for generating a novel dataset to detect distributed denial of service attacks on vehicular ad hoc network systems. Int J Distrib Sens Netw 17(3):15501477211000288
Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y (2019) An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw 90:101842
Wyoming D (2018) Connected vehicle pilot: improving safety and travel reliability on 1–80 in Wyoming
Rehman A, Rehman SU, Khan M, Alazab M, Reddy T (2021) Canintelliids: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng
Dupont G, Lekidis A, Den Hartog J, Etalle S (2019) Automotive controller area network (CAN) BUS intrusion dataset v. 2
Woo S, Jo HJ, Lee DH (2014) A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans Intell Transp Syst 16(2):993–1006
Syncan dataset (2020, Apr) Accessed September 20, 2021. [Online]. https://github.com/etas/SynCAN
Verma ME, Iannacone MD, Bridges RA, Hollifield SC, Moriano P, Kay B, Combs FL (2022) Addressing the lack of comparability & testing in CAN intrusion detection research: a comprehensive guide to CAN IDS data & introduction of the road dataset
Berger I, Rieke R, Kolomeets M, Chechulin A, Kotenko I (2018) Comparative study of machine learning methods for in-vehicle intrusion detection. In: Computer Security. Springer, pp 85–101
Gunduz MZ, Das R (2018) A comparison of cyber-security oriented testbeds for IoT-based smart grids. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, pp 1–6
California connected vehicle testbed - home. [Online]. https://caconnectedvehicletestbed.org/index.php/. Accessed 17 Sept 2021
Test bed for connected and autonomous vehicles: Cav. [Online]. https://www.millbrook.us/services/connected-and-autonomous-vehicle-testing/. Accessed 17 Sept 2021
Everett CE, McCoy D (2013) OCTANE (open car testbed and network experiments): bringing cyber-physical security research to researchers and students. In: 6th Workshop on Cyber Security Experimentation and Test (CSET 13)
Dosovitskiy A, Ros G, Codevilla F, Lopez A, Koltun V (2017) Carla: an open urban driving simulator. In: Conference on Robot Learning. PMLR, pp 1–16
Gss7000 series GNSS constellatio simulator (2021) Spirent Communications PLC
SimHiL Datasheet (2021) Spirent Communications PLC
V2x test tools (2020, Jul) [Online]. https://www.danlawinc.com/v2xtesttools/. Accessed 20 Sept 2021
Funding
This work was supported by Mitacs through the Mitacs Accelerate Program.
Author information
Authors and Affiliations
Contributions
All authors have contributions to this work.
Corresponding author
Ethics declarations
Ethics approval
Not applicable.
Consent to publish
Yes
Conflict of interest
No
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Nagarajan, J., Mansourian, P., Shahid, M.A. et al. Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey. Peer-to-Peer Netw. Appl. 16, 2153–2185 (2023). https://doi.org/10.1007/s12083-023-01508-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01508-7