Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review

SF Lokman, AT Othman, MH Abu-Bakar - EURASIP Journal on Wireless …, 2019 - Springer
The modern vehicles nowadays are managed by networked controllers. Most of the
networks were designed with little concern about security which has recently motivated …

Cyberattacks and countermeasures for in-vehicle networks

E Aliwa, O Rana, C Perera, P Burnap - ACM computing surveys (CSUR), 2021 - dl.acm.org
As connectivity between and within vehicles increases, so does concern about safety and
security. Various automotive serial protocols are used inside vehicles such as Controller …

Two-stage intrusion detection system in intelligent transportation systems using rule extraction methods from deep neural networks

S Almutlaq, A Derhab, MM Hassan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In recent years, intrusion detection systems (IDSs) are offering effective solutions to protect
various types of cyber-attacks in different networks such as Internet of Vehicles (IoVs) …

MBID: Micro-blockchain-based geographical dynamic intrusion detection for V2X

H Liang, J Wu, S Mumtaz, J Li, X Lin… - IEEE Communications …, 2019 - ieeexplore.ieee.org
Vehicle-to-everything (V2X) aims to make transportation system more intelligent through
linking everything with the moving vehicles, but it brings geographical dynamic intrusions …

Intercept the cloud network from brute force and DDoS attacks via intrusion detection and prevention system

M Nadeem, A Arshad, S Riaz, SS Band… - IEEE Access, 2021 - ieeexplore.ieee.org
Cloud computing is considered to be the best technique for storing data online instead of
using a hard drive. It includes three different types of computing services that are provided to …

Analysis of recent deep-learning-based intrusion detection methods for in-vehicle network

K Wang, A Zhang, H Sun… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The development and popularity of vehicle-to-everything communication have caused more
risks to the in-vehicle networks security. As a result, an increasing number of various and …

An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks

Y Wang, J Ma, A Sharma, PK Singh… - Journal of …, 2021 - Wiley Online Library
Intrusion detection is crucial in computer network security issues; therefore, this work is
aimed at maximizing network security protection and its improvement by proposing various …

Application of controller area network (CAN) bus anomaly detection based on time series prediction

H Qin, M Yan, H Ji - Vehicular Communications, 2021 - Elsevier
Electronization and intelligentization are gradually becoming the basic characteristics of
modern automobiles. With the continuous deepening of intelligent network integration …

[HTML][HTML] The deceitful connected and autonomous vehicle: defining the concept, contextualising its dimensions and proposing mitigation policies

A Nikitas, S Parkinson, M Vallati - Transport policy, 2022 - Elsevier
Abstract The Connected and Autonomous Vehicle (CAV) is an emerging mobility technology
that may hold a paradigm-changing potential for the future of transport policy and planning …

A hybrid deep sensor anomaly detection for autonomous vehicles in 6G-V2X environment

SB Prathiba, G Raja, S Anbalagan… - … on Network Science …, 2022 - ieeexplore.ieee.org
Autonomous Vehicles (AVs) exchange real-time and seamless data between other AVs and
the network, thus revolutionizing the Intelligent Transportation System (ITS). Automated …