Abstract
An in-vehicle network (IVN) is the internal communication network that connects all sensors and control units in an autonomous vehicle. Sensors and control units use the IVN to send perception-related messages and control commands for the normal and safe operation of the vehicle. However, the IVN, by design, is vulnerable to network attacks due to a lack of adequate security mechanisms. This paper presents a Dynamic Windowing Intrusion Detection System (DWIDS) that adapts its detection window in real-time based on observed anomalies, enabling accurate and responsive attack detection. Unlike prior methods that focus on static configurations or single-attack detection, DWIDS supports multi-label classification and real-time tuning of detection parameters. The system is evaluated using two public benchmark datasets (CHD and IVN-IDS challenge) which feature diverse and imbalanced attack types. Experimental results demonstrate high performance across key metrics (e.g., >98% precision, >97% recall and F1-score), including for rare attacks. The findings confirm DWIDS’s practicality and robustness for deployment in real-world autonomous vehicle environments.
| Original language | English |
|---|---|
| Pages (from-to) | 333-344 |
| Number of pages | 12 |
| Journal | IEEE Transactions on Intelligent Transportation Systems |
| Volume | 27 |
| Issue number | 1 |
| Early online date | Jan 2025 |
| DOIs | |
| Publication status | Published - 2026 |
Keywords
- Attacks
- CAN bus
- ECU
- IVN
- autonomous vehicles
- in-vehicle network
- intrusion detection