Journal of Sensor and Actuator Networks | |
Towards a Lightweight Intrusion Detection Framework for In-Vehicle Networks | |
Dheeraj Basavaraj1  Shahab Tayeb1  | |
[1] Department of Electrical and Computer Engineering, California State University, Fresno, CA 93740, USA; | |
关键词: Controller Area Network; Internet of Vehicles; intrusion detection system; security; | |
DOI : 10.3390/jsan11010006 | |
来源: DOAJ |
【 摘 要 】
With the emergence of networked devices, from the Internet of Things (IoT) nodes and cellular phones to vehicles connected to the Internet, there has been an ever-growing expansion of attack surfaces in the Internet of Vehicles (IoV). In the past decade, there has been a rapid growth in the automotive industry as network-enabled and electronic devices are now integral parts of vehicular ecosystems. These include the development of automobile technologies, namely, Connected and Autonomous Vehicles (CAV) and electric vehicles. Attacks on IoV may lead to malfunctioning of Electronic Control Unit (ECU), brakes, control steering issues, and door lock issues that can be fatal in CAV. To mitigate these risks, there is need for a lightweight model to identify attacks on vehicular systems. In this article, an efficient model of an Intrusion Detection System (IDS) is developed to detect anomalies in the vehicular system. The dataset used in this study is an In-Vehicle Network (IVN) communication protocol, i.e., Control Area Network (CAN) dataset generated in a real-time environment. The model classifies different types of attacks on vehicles into reconnaissance, Denial of Service (DoS), and fuzzing attacks. Experimentation with performance metrics of accuracy, precision, recall, and F-1 score are compared across a variety of classification models. The results demonstrate that the proposed model outperforms other classification models.
【 授权许可】
Unknown