Communications - Scientific Letters of the University of Zilina 2025, 27(2):C14-C23 | DOI: 10.26552/com.C.2025.017
Internet of Vehicles Security Improvement Based Controller Area Network and Artificial Intelligence
- Department of Computer Communications Engineering, Al-Rafidain University College, Baghdad, Iraq
The Internet of Vehicle (IoV) is revolutionizing the automobile sector by allowing vehicles to interact between them and with roadside infrastructure. The Controller Area Network (CAN) is a vital component of such Autonomous vehicles (AVs), allowing communication between various Electronic Control Units (ECUs). However, the CAN protocol's intrinsic lack of security renders it opens to a variety of cyber-attacks, posing substantial hazards to both safety and privacy. This research proposes a defence mechanism for the real-time threat detection. It investigates the use of deep learning with multi-layer perceptron to improve the security of CAN networks inside the IoV framework. The suggested method is highly effective in identifying and mitigating potential risks, as evidenced by extensive testing on real-world CAN datasets.
Keywords: autonomous vehicle, Internet of Vehicles (IoV), Controller Area Network (CAN), cyber security, deep learning, vehicular communication systems
Grants and funding:
The authors received no financial support for the research, authorship and/or publication of this article.
Conflicts of interest:
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Received: August 23, 2024; Accepted: January 13, 2025; Prepublished online: January 29, 2025; Published: April 1, 2025 Show citation
ACS | AIP | APA | ASA | Harvard | Chicago | Chicago Notes | IEEE | ISO690 | MLA | NLM | Turabian | Vancouver |
References
- ISLAM, R., REFAT, R. U. D. Improving CAN bus security by assigning dynamic arbitration IDs. Journal of Transportation Security [online]. 2020, 13(1-2), p. 19-31. ISSN 1938-7741, eISSN 1938-775X. Available from: https://doi.org/10.1007/s12198-020-00208-0
Go to original source...
- O.-R. A. D. (ORAD) Committee. Taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles. SAE International, 2021.
- GERSHON, P., SEAMAN, S., MEHLER, B. REIMER, B., COUGHLIN, J. Driver behavior and the use of automation in real-world driving. Accident Analysis and Prevention [online]. 2021, 158, 106217. ISSN 0001-4575, eISSN 1879-2057. Available from: https://doi.org/10.1016/j.aap.2021.106217
Go to original source...
- SHARMA, N. CHAUHAN, N., CHAND, N. Security challenges in Internet of Vehicles (IoV) environment. In: 2018 First International Conference on Secure Cyber Computing and Communication ICSCCC: proceedings [online]. IEEE. 2018. eISBN 978-1-5386-6373-8, p. 203-207. Available from: https://doi.org/10.1109/ICSCCC.2018.8703272
Go to original source...
- ASWAL, K., DOBHAL, D. C., PATHAK, H. Comparative analysis of machine learning algorithms for identification of BOT attack on the Internet of Vehicles (IoV). In: 2020 International Conference on Inventive Computation Technologies ICICT: proceedings [online]. IEEE. 2020. eISBN 978-1-7281-4685-0, p. 312-317. Available from: https://doi.org/10.1109/ICICT48043.2020.9112422
Go to original source...
- ZHAO, Q., CHEN, M., GU, Z., LUAN, S., CAN bus intrusion detection based on auxiliary classifier GAN and out-of-distribution detection. ACM Transactions on Embedded Computing Systems [online]. 2022, 21(4), p. 1-30. ISSN 1539-9087, eISSN 1558-3465. Available from: https://doi.org/10.1145/3540198
Go to original source...
- SUN, H., HUANG, W., WENG, J., LIU, Z., TAN, W., HE, Z., CHEN, M., WU, B., LI, L., PENG, X. CCID-CAN: cross-chain intrusion detection on CAN bus for autonomous vehicles. IEEE Internet of Things Journal [online]. 2024, p. 26146 - 26159. eISSN 2327-4662. Available from: https://doi.org/10.1109/JIOT.2024.3393122
Go to original source...
- ALIWA, E., RANA, O., PERERA, C., Cyberattacks and countermeasures for in-vehicle networks. ACM Computing Surveys [online]. 2022, 5(1), p. 1-37. ISSN 0360-0300, eISSN 1557-7341. Available from: https://doi.org/10.1145/3431233
Go to original source...
- ZHANG, T., ANTUNES, H., AGGARWAL, S. Defending connected vehicles against malware: challenges and a solution framework. IEEE Internet of Things Journal [online]. 2014, 1(1), p. 10-21. eISSN 2327-4662. Available from: https://doi.org/10.1109/JIOT.2014.2302386
Go to original source...
- CHEN, S.-H., LIN, C.-H. R. Evaluation of DoS attacks on vehicle CAN bus system. In: Recent advances in intelligent information hiding and multimedia signal processing. Vol. 110 [online]. PAN, J.-S., ITO, A., TSAI, P.-W., JAIN, L. C. (Eds.). Cham: Springer International Publishing, 2019. ISBN 978-3-030-03747-5, eISBN 978-3-030-03748-2, p. 308-314. Available from: https://doi.org/10.1007/978-3-030-03748-2_38
Go to original source...
- JO, H. J., CHOI, W. A Survey of attacks on controller area networks and corresponding countermeasures. IEEE Transactions on Intelligent Transportation Systems [online]. 2022, 23(7), p. 6123-6141. ISSN 1524-9050, eISSN 1558-0016. Available from: https://doi.org/10.1109/TITS.2021.3078740
Go to original source...
- HANSELMANN, M., STRAUSS, T., DORMANN, K., ULMER, H. CANet: An unsupervised intrusion detection system for high dimensional CAN bus data. IEEE Access [online]. 2020, 8, p. 58194-58205. eISSN 2169-3536. Available from: https://doi.org/10.1109/ACCESS.2020.2982544
Go to original source...
- LIU, J., ZHANG, S., In-vehicle network attacks and countermeasures: challenges and future directions. IEEE Network [online]. 2017, 31(5), p. 50-58. ISSN 0890-8044, eISSN 1558-156X. Available from: https://doi.org/10.1109/MNET.2017.1600257
Go to original source...
- BOZDAL, M. SAMIE, M., ASLAM, S., JENNIONS, I. Evaluation of CAN bus security challenges. Sensors [online]. 2020, 20(8), 2364. eISSN 1424-8220. Available from: https://doi.org/10.3390/s20082364
Go to original source...
- EISENBARTH, T. KASPER, T., MORADI, A., PAAR, C., SALMASIZADEH, M., SHALMANI, M. T. M. On the power of power analysis in the real world: a complete break of the KeeLoq code hopping scheme. In: 28th Annual International Cryptology Conference Advances in Cryptology-CRYPTO 2008: proceedings [online]. Springer. 2008. ISBN 978-3-540-85173-8, eISBN 978-3-540-85174-5, p. 203-220. Available from: https://doi.org/10.1007/978-3-540-85174-5_12
Go to original source...
- KOSCHER, K., CZESKIS, A., ROESNER, F., PATEL, S., KOHNO, T., CHECKOWAY, S., MCCOY, D., KANTOR, B., ANDERSON, D., SHACHAM, H., SAVAGE, S. Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy: proceedings [online]. IEEE. 2010. ISSN 1081-6011, eISSN 2375-1207, ISBN 978-1-4244-6894-2, eISBN 978-1-4244-6895-9, p. 447-462. Available from: https://doi.org/10.1109/SP.2010.34
Go to original source...
- VALASEK, C., MILLER, C. Remote exploitation of an unaltered passenger vehicle. Black Hat USA. 2015, 2015(S91), p. 1-91.
- PETIT, J., STOTTELAAR, B., FEIRI, M., KARGL, F. Remote attacks on automated vehicles sensors: experiments on camera and lidar. Black Hat Eur. 2015, 11(2015), 995.
- ZORZ, Z. Backdooring connected cars for covert remote control - help net security. 2018. Retrieved August, 2020.
- PALANCA, A., EVENCHICK, E., MAGGI, F., ZANERO, S. A stealth, selective, link-layer denial-of-service attack against automotive networks. In: 14th International Conference, Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2017: proceedings [online]. 2017. Springer. 2017. ISBN 978-3-319-60875-4, eISBN 978-3-319-60876-1, p. 185-206. Available from: https://doi.org/10.1007/978-3-319-60876-1_9
Go to original source...
- WOO, S., JO, H. J., LEE, D. H. A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Transactions on Intelligent Transportation Systems [online]. 2014, 16(2), p. 993-1006. ISSN 1524-9050, eISSN 1558-0016. Available from: https://doi.org/10.1109/TITS.2014.2351612
Go to original source...
- NIE, S., LIU, L., DU, Y. Free-fall: hacking tesla from wireless to can bus. Defcon. 2017, p. 1-16.
- MUKHERJEE, S., SHIRAZI, H., RAY, I., DAILY, J., GAMBLE, R. Practical DoS attacks on embedded networks in commercial vehicles. In: 12th International Conference Information Systems Security ICISS 2016: proceedings [online]. 2016. Springer. 2016. ISBN 978-3-319-49805-8, eISBN 978-3-319-49806-5, p. 23-42. Available from: https://doi.org/10.1007/978-3-319-49806-5_2
Go to original source...
- AHMED, I., JEON, G., AHMAD, A. Deep learning-based intrusion detection system for internet of vehicles. IEEE Consumer Electronics Magazine [online]. 2023, 12(1), p. 117-123. ISSN 2162-2248, eISSN 2162-2256. Available from: https://doi.org/10.1109/MCE.2021.3139170
Go to original source...
- ALLADI, T., KOHLI, V. CHAMOLA, V., YU, F. R. A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems. Digital Communications and Networks [online]. 2023, 9(5), p. 1113-1122. ISSN 2468-5925, eISSN 2352-8648. Available from: https://doi.org/10.1016/j.dcan.2022.06.018
Go to original source...
- HOSSAIN, M. D., INOUE, H. OCHIAI, H., FALL, D., KADOBAYASHI, Y. LSTM-Based intrusion detection system for in-vehicle Can bus communications. IEEE Access [online]. 2020, 8, p. 185489-185502. eISSN 2169-3536. Available from: https://doi.org/10.1109/ACCESS.2020.3029307
Go to original source...
- SONG, H. M., WOO, J., KIM, H. K. In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Communications [online]. 2020, 21, 100198. eISSN 2214-210X. Available from: https://doi.org/10.1016/j.vehcom.2019.100198
Go to original source...
- ZHANG, J., LI, F., ZHANG, H., LI, R., LI, Y. Intrusion detection system using deep learning for in-vehicle security. Ad Hoc Networks [online]. 2019, 95, 101974. ISSN 1570-8705, eISSN 1570-8713. Available from: https://doi.org/10.1016/j.adhoc.2019.101974
Go to original source...
- ZHOU, A., LI, Z., SHEN, Y. Anomaly detection of CAN bus messages using a deep neural network for autonomous vehicles. Applied Sciences [online]. 2019, 9(15), 3174. eISSN 2076-3417. Available from: https://doi.org/10.3390/app9153174
Go to original source...
- MANSOURIAN, P., ZHANG, N., JAEKEL, A., KNEPPERS, M. Deep learning-based anomaly detection for connected autonomous vehicles using spatiotemporal information. IEEE Transactions on Intelligent Transportation Systems [online]. 2023, 24(12), p. 16006-16017. ISSN 1524-9050, eISSN 1558-0016. Available from: https://doi.org/10.1109/TITS.2023.3286611
Go to original source...
- NETO, E. C. P., TASLIMASA, H., DADKHAH, S., IQBAL, S., XIONG, P., RAHMAN, T., GHORBANI, A. A. CICIoV2024: advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus. Internet of Things [online]. 2024, 26, 101209. ISSN 2543-1536, eISSN 2542-6605. Available from: https://doi.org/10.1016/j.iot.2024.101209
Go to original source...
- NETO, E. C. P., TASLIMASA, H., DADKHAH, S. IQBAL, S., XIONG, P., RAHMANB, T., GHORBANI, A. A. CIC IoV dataset 2024 [online]. Canadian Institute for Cybersecurity, 2024. Available from: https://www.unb.ca/cic/datasets/iov-dataset-2024.html
- SPITALOVA, Z. Vehicle-to-everything communication. Communications - Scientific Letters of the University of Zilina [online]. 2023, 25(1), p. 24-35. ISSN 1335-4205, eISSN 2585-7878. Available from: https://doi.org/10.26552/com.C.2023.017
Go to original source...
- SABIHA, A. D., KAMEL, M. A., SAID, E., HUSSEIN, W. M. Path planning algorithm based on teaching-learning-based-optimization for an autonomous vehicle. Communications - Scientific Letters of the University of Zilina [online]. 2022, 24(2), p. C33-C42. ISSN 1335-4205, eISSN 2585-7878. Available from: https://doi.org/10.26552/com.C.2022.2.C33-C42
Go to original source...
- MORGOS, J., KLCO, P., HRUDKAY, K. Artificial neural network based MPPT algorithm for modern household with electric vehicle. Communications - Scientific Letters of the University of Zilina [online]. 2022, 24(1), p. C18-C26. ISSN 1335-4205, eISSN 2585-7878. Available from: https://doi.org/10.26552/com.C.2022.1.C18-C26
Go to original source...
- DANKO, M., HANKO, B., DRGONA, P. Optimized control of energy flow in an electric vehicle based on GPS. Communications - Scientific Letters of the University of Zilina [online]. 2021, 23(1), p. C7-C14. ISSN 1335-4205, eISSN 2585-7878. Available from: https://doi.org/10.26552/com.C.2021.1.C7-C14
Go to original source...
- KAPOOR, J., PATHAK, A., RAI, M., MISHRA G. R. Vehicle cabin noise cancellation model using pre-filter for improved convergence rate and better stability. Communications - Scientific Letters of the University of Zilina [online]. 2023, 25(1), p. C1-C12. ISSN 1335-4205, eISSN 2585-7878. Available from: https://doi.org/10.26552/com.C.2023.003
Go to original source...
- SUDHAKAR, KUMAR, S. An emerging threat fileless malware: a survey and research challenges. Cybersecurity [online]. 2020, 3(1), 1. eISSN 2523-3246. Available from: https://doi.org/10.1186/s42400-019-0043-x
Go to original source...
This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.