2023
DOI: 10.1145/3570954
|View full text |Cite
|
Sign up to set email alerts
|

AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey

Abstract: The Controller Area Network (CAN) is the most widely used in-vehicle communication protocol, which still lacks the implementation of suitable security mechanisms such as message authentication and encryption. This makes the CAN bus vulnerable to numerous cyber attacks. Various Intrusion Detection Systems (IDSs) have been developed to detect these attacks. However, the high generalization capabilities of Artificial Intelligence (AI) make AI-based IDS an excellent countermeasure against automotive cyber attacks.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 72 publications
(29 citation statements)
references
References 156 publications
0
29
0
Order By: Relevance
“…These major enablers have been investigated independently in-vehicle networks. 10 In their study, the authors developed an integrated framework to increase the performance of next-generation vehicle networks. 11 Their paradigm presented resource allocation as a combined optimization problem considering networking, caching, and computation advantages.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…These major enablers have been investigated independently in-vehicle networks. 10 In their study, the authors developed an integrated framework to increase the performance of next-generation vehicle networks. 11 Their paradigm presented resource allocation as a combined optimization problem considering networking, caching, and computation advantages.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Information and communications technology have fueled linked automobiles' networking, caching, and computing improvements. These major enablers have been investigated independently in‐vehicle networks 10 . In their study, the authors developed an integrated framework to increase the performance of next‐generation vehicle networks 11 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…Recently, the Internet of Vehicles (IoV) has been widely criticized for the vulnerability of its communication protocols, which made several security threats, such as authentication hijacking, message tapping, and availability destruction [1]. These are mainly caused by the Controller Area Network(CAN), considered the de facto standard for in-vehicle communication [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…technologies integrated into vehicles, ICVs can obtain various intelligent services and comfortable experiences, including autonomous driving, collision avoidance, auto parking assist, and so on. However, these technologies also expose the invehicle network to attackers with more opportunities, and a large number of evolving new types of attacks have appeared in cyberspace, which threatenes the security of in-vehicle network (IVN) and even the safety of passengers [2].…”
Section: Introductionmentioning
confidence: 99%
“…Ecryption and authentication methods are effective for protecting IVNs [5], but it is generally necessary to add specific hardware to ensure the efficiency of encryption and decryption. As another security way, intrusion detection method does not require modification of the CAN protocol message fields and interactions, which has broader applicability for resource-constrained IVN environments [8].…”
Section: Introductionmentioning
confidence: 99%