Revisiting the Intrusion Detection in In-Vehicle Networks

  • Muhammad Asif Khan*
  • , Hamid Menouar
  • , Mohamed Abdallah
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

An in-vehicle network (IVN) is the internal communication network that connects all sensors and control units in an autonomous vehicle. Sensors and control units use the IVN to send perception-related messages and control commands for the normal and safe operation of the vehicle. However, the IVN, by design, is vulnerable to network attacks due to a lack of adequate security mechanisms. This paper presents a Dynamic Windowing Intrusion Detection System (DWIDS) that adapts its detection window in real-time based on observed anomalies, enabling accurate and responsive attack detection. Unlike prior methods that focus on static configurations or single-attack detection, DWIDS supports multi-label classification and real-time tuning of detection parameters. The system is evaluated using two public benchmark datasets (CHD and IVN-IDS challenge) which feature diverse and imbalanced attack types. Experimental results demonstrate high performance across key metrics (e.g., >98% precision, >97% recall and F1-score), including for rare attacks. The findings confirm DWIDS’s practicality and robustness for deployment in real-world autonomous vehicle environments.

Original languageEnglish
Pages (from-to)333-344
Number of pages12
JournalIEEE Transactions on Intelligent Transportation Systems
Volume27
Issue number1
Early online dateJan 2025
DOIs
Publication statusPublished - 2026

Keywords

  • Attacks
  • CAN bus
  • ECU
  • IVN
  • autonomous vehicles
  • in-vehicle network
  • intrusion detection

Fingerprint

Dive into the research topics of 'Revisiting the Intrusion Detection in In-Vehicle Networks'. Together they form a unique fingerprint.

Cite this