Communications - Scientific Letters of the University of Zilina 2025, 27(2):C14-C23 | DOI: 10.26552/com.C.2025.017

Internet of Vehicles Security Improvement Based Controller Area Network and Artificial Intelligence

Ibraheem Hatem Mohammed ORCID...
Department of Computer Communications Engineering, Al-Rafidain University College, Baghdad, Iraq

The Internet of Vehicle (IoV) is revolutionizing the automobile sector by allowing vehicles to interact between them and with roadside infrastructure. The Controller Area Network (CAN) is a vital component of such Autonomous vehicles (AVs), allowing communication between various Electronic Control Units (ECUs). However, the CAN protocol's intrinsic lack of security renders it opens to a variety of cyber-attacks, posing substantial hazards to both safety and privacy. This research proposes a defence mechanism for the real-time threat detection. It investigates the use of deep learning with multi-layer perceptron to improve the security of CAN networks inside the IoV framework. The suggested method is highly effective in identifying and mitigating potential risks, as evidenced by extensive testing on real-world CAN datasets.

Keywords: autonomous vehicle, Internet of Vehicles (IoV), Controller Area Network (CAN), cyber security, deep learning, vehicular communication systems
Grants and funding:

The authors received no financial support for the research, authorship and/or publication of this article.

Conflicts of interest:

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Received: August 23, 2024; Accepted: January 13, 2025; Prepublished online: January 29, 2025; Published: April 1, 2025  Show citation

ACS AIP APA ASA Harvard Chicago Chicago Notes IEEE ISO690 MLA NLM Turabian Vancouver
Mohammed, I.H. (2025). Internet of Vehicles Security Improvement Based Controller Area Network and Artificial Intelligence. Communications - Scientific Letters of the University of Zilina27(2), C14-23. doi: 10.26552/com.C.2025.017
Download citation

References

  1. ISLAM, R., REFAT, R. U. D. Improving CAN bus security by assigning dynamic arbitration IDs. Journal of Transportation Security [online]. 2020, 13(1-2), p. 19-31. ISSN 1938-7741, eISSN 1938-775X. Available from: https://doi.org/10.1007/s12198-020-00208-0 Go to original source...
  2. O.-R. A. D. (ORAD) Committee. Taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles. SAE International, 2021.
  3. GERSHON, P., SEAMAN, S., MEHLER, B. REIMER, B., COUGHLIN, J. Driver behavior and the use of automation in real-world driving. Accident Analysis and Prevention [online]. 2021, 158, 106217. ISSN 0001-4575, eISSN 1879-2057. Available from: https://doi.org/10.1016/j.aap.2021.106217 Go to original source...
  4. SHARMA, N. CHAUHAN, N., CHAND, N. Security challenges in Internet of Vehicles (IoV) environment. In: 2018 First International Conference on Secure Cyber Computing and Communication ICSCCC: proceedings [online]. IEEE. 2018. eISBN 978-1-5386-6373-8, p. 203-207. Available from: https://doi.org/10.1109/ICSCCC.2018.8703272 Go to original source...
  5. ASWAL, K., DOBHAL, D. C., PATHAK, H. Comparative analysis of machine learning algorithms for identification of BOT attack on the Internet of Vehicles (IoV). In: 2020 International Conference on Inventive Computation Technologies ICICT: proceedings [online]. IEEE. 2020. eISBN 978-1-7281-4685-0, p. 312-317. Available from: https://doi.org/10.1109/ICICT48043.2020.9112422 Go to original source...
  6. ZHAO, Q., CHEN, M., GU, Z., LUAN, S., CAN bus intrusion detection based on auxiliary classifier GAN and out-of-distribution detection. ACM Transactions on Embedded Computing Systems [online]. 2022, 21(4), p. 1-30. ISSN 1539-9087, eISSN 1558-3465. Available from: https://doi.org/10.1145/3540198 Go to original source...
  7. SUN, H., HUANG, W., WENG, J., LIU, Z., TAN, W., HE, Z., CHEN, M., WU, B., LI, L., PENG, X. CCID-CAN: cross-chain intrusion detection on CAN bus for autonomous vehicles. IEEE Internet of Things Journal [online]. 2024, p. 26146 - 26159. eISSN 2327-4662. Available from: https://doi.org/10.1109/JIOT.2024.3393122 Go to original source...
  8. ALIWA, E., RANA, O., PERERA, C., Cyberattacks and countermeasures for in-vehicle networks. ACM Computing Surveys [online]. 2022, 5(1), p. 1-37. ISSN 0360-0300, eISSN 1557-7341. Available from: https://doi.org/10.1145/3431233 Go to original source...
  9. ZHANG, T., ANTUNES, H., AGGARWAL, S. Defending connected vehicles against malware: challenges and a solution framework. IEEE Internet of Things Journal [online]. 2014, 1(1), p. 10-21. eISSN 2327-4662. Available from: https://doi.org/10.1109/JIOT.2014.2302386 Go to original source...
  10. CHEN, S.-H., LIN, C.-H. R. Evaluation of DoS attacks on vehicle CAN bus system. In: Recent advances in intelligent information hiding and multimedia signal processing. Vol. 110 [online]. PAN, J.-S., ITO, A., TSAI, P.-W., JAIN, L. C. (Eds.). Cham: Springer International Publishing, 2019. ISBN 978-3-030-03747-5, eISBN 978-3-030-03748-2, p. 308-314. Available from: https://doi.org/10.1007/978-3-030-03748-2_38 Go to original source...
  11. JO, H. J., CHOI, W. A Survey of attacks on controller area networks and corresponding countermeasures. IEEE Transactions on Intelligent Transportation Systems [online]. 2022, 23(7), p. 6123-6141. ISSN 1524-9050, eISSN 1558-0016. Available from: https://doi.org/10.1109/TITS.2021.3078740 Go to original source...
  12. HANSELMANN, M., STRAUSS, T., DORMANN, K., ULMER, H. CANet: An unsupervised intrusion detection system for high dimensional CAN bus data. IEEE Access [online]. 2020, 8, p. 58194-58205. eISSN 2169-3536. Available from: https://doi.org/10.1109/ACCESS.2020.2982544 Go to original source...
  13. LIU, J., ZHANG, S., In-vehicle network attacks and countermeasures: challenges and future directions. IEEE Network [online]. 2017, 31(5), p. 50-58. ISSN 0890-8044, eISSN 1558-156X. Available from: https://doi.org/10.1109/MNET.2017.1600257 Go to original source...
  14. BOZDAL, M. SAMIE, M., ASLAM, S., JENNIONS, I. Evaluation of CAN bus security challenges. Sensors [online]. 2020, 20(8), 2364. eISSN 1424-8220. Available from: https://doi.org/10.3390/s20082364 Go to original source...
  15. EISENBARTH, T. KASPER, T., MORADI, A., PAAR, C., SALMASIZADEH, M., SHALMANI, M. T. M. On the power of power analysis in the real world: a complete break of the KeeLoq code hopping scheme. In: 28th Annual International Cryptology Conference Advances in Cryptology-CRYPTO 2008: proceedings [online]. Springer. 2008. ISBN 978-3-540-85173-8, eISBN 978-3-540-85174-5, p. 203-220. Available from: https://doi.org/10.1007/978-3-540-85174-5_12 Go to original source...
  16. KOSCHER, K., CZESKIS, A., ROESNER, F., PATEL, S., KOHNO, T., CHECKOWAY, S., MCCOY, D., KANTOR, B., ANDERSON, D., SHACHAM, H., SAVAGE, S. Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy: proceedings [online]. IEEE. 2010. ISSN 1081-6011, eISSN 2375-1207, ISBN 978-1-4244-6894-2, eISBN 978-1-4244-6895-9, p. 447-462. Available from: https://doi.org/10.1109/SP.2010.34 Go to original source...
  17. VALASEK, C., MILLER, C. Remote exploitation of an unaltered passenger vehicle. Black Hat USA. 2015, 2015(S91), p. 1-91.
  18. PETIT, J., STOTTELAAR, B., FEIRI, M., KARGL, F. Remote attacks on automated vehicles sensors: experiments on camera and lidar. Black Hat Eur. 2015, 11(2015), 995.
  19. ZORZ, Z. Backdooring connected cars for covert remote control - help net security. 2018. Retrieved August, 2020.
  20. PALANCA, A., EVENCHICK, E., MAGGI, F., ZANERO, S. A stealth, selective, link-layer denial-of-service attack against automotive networks. In: 14th International Conference, Detection of Intrusions and Malware, and Vulnerability Assessment DIMVA 2017: proceedings [online]. 2017. Springer. 2017. ISBN 978-3-319-60875-4, eISBN 978-3-319-60876-1, p. 185-206. Available from: https://doi.org/10.1007/978-3-319-60876-1_9 Go to original source...
  21. WOO, S., JO, H. J., LEE, D. H. A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Transactions on Intelligent Transportation Systems [online]. 2014, 16(2), p. 993-1006. ISSN 1524-9050, eISSN 1558-0016. Available from: https://doi.org/10.1109/TITS.2014.2351612 Go to original source...
  22. NIE, S., LIU, L., DU, Y. Free-fall: hacking tesla from wireless to can bus. Defcon. 2017, p. 1-16.
  23. MUKHERJEE, S., SHIRAZI, H., RAY, I., DAILY, J., GAMBLE, R. Practical DoS attacks on embedded networks in commercial vehicles. In: 12th International Conference Information Systems Security ICISS 2016: proceedings [online]. 2016. Springer. 2016. ISBN 978-3-319-49805-8, eISBN 978-3-319-49806-5, p. 23-42. Available from: https://doi.org/10.1007/978-3-319-49806-5_2 Go to original source...
  24. AHMED, I., JEON, G., AHMAD, A. Deep learning-based intrusion detection system for internet of vehicles. IEEE Consumer Electronics Magazine [online]. 2023, 12(1), p. 117-123. ISSN 2162-2248, eISSN 2162-2256. Available from: https://doi.org/10.1109/MCE.2021.3139170 Go to original source...
  25. ALLADI, T., KOHLI, V. CHAMOLA, V., YU, F. R. A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems. Digital Communications and Networks [online]. 2023, 9(5), p. 1113-1122. ISSN 2468-5925, eISSN 2352-8648. Available from: https://doi.org/10.1016/j.dcan.2022.06.018 Go to original source...
  26. HOSSAIN, M. D., INOUE, H. OCHIAI, H., FALL, D., KADOBAYASHI, Y. LSTM-Based intrusion detection system for in-vehicle Can bus communications. IEEE Access [online]. 2020, 8, p. 185489-185502. eISSN 2169-3536. Available from: https://doi.org/10.1109/ACCESS.2020.3029307 Go to original source...
  27. SONG, H. M., WOO, J., KIM, H. K. In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Communications [online]. 2020, 21, 100198. eISSN 2214-210X. Available from: https://doi.org/10.1016/j.vehcom.2019.100198 Go to original source...
  28. ZHANG, J., LI, F., ZHANG, H., LI, R., LI, Y. Intrusion detection system using deep learning for in-vehicle security. Ad Hoc Networks [online]. 2019, 95, 101974. ISSN 1570-8705, eISSN 1570-8713. Available from: https://doi.org/10.1016/j.adhoc.2019.101974 Go to original source...
  29. ZHOU, A., LI, Z., SHEN, Y. Anomaly detection of CAN bus messages using a deep neural network for autonomous vehicles. Applied Sciences [online]. 2019, 9(15), 3174. eISSN 2076-3417. Available from: https://doi.org/10.3390/app9153174 Go to original source...
  30. MANSOURIAN, P., ZHANG, N., JAEKEL, A., KNEPPERS, M. Deep learning-based anomaly detection for connected autonomous vehicles using spatiotemporal information. IEEE Transactions on Intelligent Transportation Systems [online]. 2023, 24(12), p. 16006-16017. ISSN 1524-9050, eISSN 1558-0016. Available from: https://doi.org/10.1109/TITS.2023.3286611 Go to original source...
  31. NETO, E. C. P., TASLIMASA, H., DADKHAH, S., IQBAL, S., XIONG, P., RAHMAN, T., GHORBANI, A. A. CICIoV2024: advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus. Internet of Things [online]. 2024, 26, 101209. ISSN 2543-1536, eISSN 2542-6605. Available from: https://doi.org/10.1016/j.iot.2024.101209 Go to original source...
  32. NETO, E. C. P., TASLIMASA, H., DADKHAH, S. IQBAL, S., XIONG, P., RAHMANB, T., GHORBANI, A. A. CIC IoV dataset 2024 [online]. Canadian Institute for Cybersecurity, 2024. Available from: https://www.unb.ca/cic/datasets/iov-dataset-2024.html
  33. SPITALOVA, Z. Vehicle-to-everything communication. Communications - Scientific Letters of the University of Zilina [online]. 2023, 25(1), p. 24-35. ISSN 1335-4205, eISSN 2585-7878. Available from: https://doi.org/10.26552/com.C.2023.017 Go to original source...
  34. SABIHA, A. D., KAMEL, M. A., SAID, E., HUSSEIN, W. M. Path planning algorithm based on teaching-learning-based-optimization for an autonomous vehicle. Communications - Scientific Letters of the University of Zilina [online]. 2022, 24(2), p. C33-C42. ISSN 1335-4205, eISSN 2585-7878. Available from: https://doi.org/10.26552/com.C.2022.2.C33-C42 Go to original source...
  35. MORGOS, J., KLCO, P., HRUDKAY, K. Artificial neural network based MPPT algorithm for modern household with electric vehicle. Communications - Scientific Letters of the University of Zilina [online]. 2022, 24(1), p. C18-C26. ISSN 1335-4205, eISSN 2585-7878. Available from: https://doi.org/10.26552/com.C.2022.1.C18-C26 Go to original source...
  36. DANKO, M., HANKO, B., DRGONA, P. Optimized control of energy flow in an electric vehicle based on GPS. Communications - Scientific Letters of the University of Zilina [online]. 2021, 23(1), p. C7-C14. ISSN 1335-4205, eISSN 2585-7878. Available from: https://doi.org/10.26552/com.C.2021.1.C7-C14 Go to original source...
  37. KAPOOR, J., PATHAK, A., RAI, M., MISHRA G. R. Vehicle cabin noise cancellation model using pre-filter for improved convergence rate and better stability. Communications - Scientific Letters of the University of Zilina [online]. 2023, 25(1), p. C1-C12. ISSN 1335-4205, eISSN 2585-7878. Available from: https://doi.org/10.26552/com.C.2023.003 Go to original source...
  38. SUDHAKAR, KUMAR, S. An emerging threat fileless malware: a survey and research challenges. Cybersecurity [online]. 2020, 3(1), 1. eISSN 2523-3246. Available from: https://doi.org/10.1186/s42400-019-0043-x Go to original source...

This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.