Cybersecurity of Automotive Wired Networking Syste
Cybersecurity of Automotive Wired Networking Syste
1 Department of Information Engineering, University of Pisa, Via G. Caruso n.16, 56122 Pisa, Italy;
nicasio.canino@phd.unipi.it (N.C.); daniele.rossi1@unipi.it (D.R.); sergio.saponara@unipi.it (S.S.);
ettore.soldaini@hotmail.it (E.S.)
2 Embedded Software Systems (ESWS) S.r.l., Via R. Volpi n.77, 41058 Vignola, Italy; stefano.mazzetti@esws.tech
* Correspondence: pierpaolo.dini@unipi.it
† Authors are listed in alphabetic order.
Abstract: The evolution of Electrical and Electronic (E/E) architectures in the automotive
industry has been a significant factor in the transformation of vehicles from traditional
mechanical systems to sophisticated, software-defined machines. With increasing vehicle
connectivity and the growing threats from cyberattacks that could compromise safety and
violate user privacy, the incorporation of cybersecurity into the automotive development
process is becoming imperative. As vehicles evolve into sophisticated interconnected sys-
tems, understanding their vulnerabilities becomes essential to improve cybersecurity. This
paper also discusses the role of evolving standards and regulations, such as ISO 26262 and
ISO/SAE 21434, in ensuring both the safety and cybersecurity of modern vehicles. This
paper offers a comprehensive review of the current challenges in automotive cybersecurity,
with a focus on the vulnerabilities of the Controller Area Network (CAN) protocol. Ad-
ditionally, we explore state-of-the-art countermeasures, focusing on Intrusion Detection
Systems (IDSs), which are increasingly leveraging artificial intelligence and machine learn-
ing techniques to detect anomalies and prevent attacks in real time. Through an analysis
of publicly available CAN datasets, we evaluate the effectiveness of IDS frameworks in
mitigating these threats.
The development of effective Intrusion Detection Systems (IDSs) for automotive net-
works, particularly those focusing on the CAN protocol, is highly dependent on the quality
of the datasets used. Therefore, publicly available CAN datasets play a crucial role in train-
ing and evaluating these systems, providing researchers with the necessary data to simulate
various attack scenarios and assess the performance of their detection mechanisms.
1. Initial Search: An initial search was conducted using the primary keywords in each
database. This step aimed to identify a broad range of potentially relevant articles.
2. Refinement of Search Terms: Based on the initial search results, the search terms
were refined to include additional relevant keywords and phrases. Boolean operators
(AND, OR) were used to combine search terms effectively.
3. Screening of Titles and Abstracts: The titles and abstracts of the retrieved articles were
screened to assess their relevance to the review’s objectives. Articles that did not meet
the inclusion criteria were excluded at this stage.
4. Full-Text Review: The full texts of the remaining articles were reviewed to ensure they
met the inclusion criteria. Any discrepancies or uncertainties were resolved through
discussion among the authors.
Around the beginning of the new century, E/E architectures started a rapid ramp-up
towards their electrification. This evolution was supported by the adoption of centralized
gateways, which became common to optimize in-vehicle networks (IVNs) and their wiring.
In fact, all the ECUs were subdivided and distributed among different subnets, all con-
nected to a common gateway. This approach increased the number of available comfort
and safety services, thus increasing power demands, necessitating the transition to high-
voltage systems (48 V) [1,32,33]. Also, as vehicles started to become cyber–physical systems,
from purely mechanical, the introduction of a gateway was the first step toward increased
cybersecurity [34–36]. As automated driving functions and the number of ECUs increased,
the traditional network architecture became unsustainable, leading to the development
of Domain Control Units (DCUs) [24,37]. They centralize the management of multiple
subsystems within a vehicle domain, consolidating tasks that were traditionally handled
by separate ECUs. This consolidation results in increased system efficiency through lower
power consumption, simplified wiring, and reduced system complexity. Domain con-
trollers, for example, improve subsystem integration and coordination, particularly in
complex frameworks such as an ADAS. They offer scalability, facilitate easier software
updates, including over-the-air updates, and reduce hardware costs. Nonetheless, they
improve cybersecurity by focusing control on fewer and more secure areas, simplifying
vehicle communication, reducing latency, and ensuring better real-time responsiveness.
As vehicles become more automated, domain controllers are crucial for managing the
complexities of modern automotive architecture. Table 2 lists the typical domains with their
core functions, components (i.e., ECUs), and common IVN protocol. This E/E architecture
has been widely adopted since the 2010s and continues to be in use.
Electronics 2025, 14, 471 8 of 29
Table 2. Vehicle domain functions, components, and typical network protocol [2,24,37].
The integration of these standards into the automotive development process will
ultimately contribute to building consumer trust and fostering the safe adoption of new
technologies in the automotive industry.
Table 3. Attack surfaces in the automotive domain, classified according to classical taxonomy.
This classification can become limiting when performing a Threat Analysis and Risk
Assessment (TARA) on the vehicle against its cybersecurity vulnerabilities [48]. Therefore,
we propose a novel and more complete taxonomy, as depicted in Figure 1, in which the
attack surface is further distinguished according to the proximity of the attacker before and
during the attack:
• Attack starting point phase: is the actual access point before the attack actually is
carried out. It can require the following:
– Initial physical access to the vehicle, for example, by accessing the IVN, OBD-II
port, or infotainment ports;
– Without any initial physical access to the vehicle, for example, exploiting wireless
V2X connectivity, or tampering with the vehicle’s sensors.
• Attack ongoing phase: defines how the attacker performs the attack, physically or
remotely connected to the vehicle.
Electronics 2025, 14, 471 11 of 29
Figure 1. Taxonomy of attack surfaces from a dual point of view: starting point and ongoing phases
of an attack.
This distinction can be useful in some sophisticated attacks; for example, consider that
the attacker aims to inject malicious messages into the vehicle’s IVN, starting from the OBD-
II port. This would mean, without our taxonomy, that the attack surface should be classified
as physical. However, if the attacker connects to the OBD-II port with an aftermarket device
with wireless connectivity, in reality, the physical attack surface would become wireless
indirectly. In light of the ready availability of tools of this nature, the TARA phase for
the vehicle may require further consideration. In fact, the potential threat associated with
physical attack surfaces may increase. This is because physical attack surfaces that would
otherwise remain contained may become vulnerable due to the difficulty of carrying out
prolonged attacks with the attacker physically connected to the car. Throughout the rest
of this paper, a specific focus will be on the CAN protocol for two reasons. First, it is one
of the most used within the vehicle domain (see the last column in Table 2) because of
its high reliability and contained cost of implementation. In fact, for the physical layer, it
only requires a twisted pair of wires to deliver the data information. Second, since this
protocol was invented in the 1980s, it does not include security countermeasures such as
message authentication, sender and receiver addresses, or message encryption. Therefore,
countermeasures must be taken into account to protect critical domains that rely on the
CAN bus.
• Frame Injection Attack: Due to the broadcast characteristic of the CAN protocol and
its lack of encryption mechanisms, an attacker can inject malicious messages into
the CAN bus, potentially altering vehicular actions and disrupting standard IVN
operations. This can be performed, for example, by physically accessing the OBD-II
port or directly connecting to the targeted subnet.
• Error Management: This mechanism within the CAN protocol, designed to improve
reliability and fault tolerance, can inadvertently create vulnerabilities that malicious
actors can exploit. These mechanisms include error counters (Transmit and Receive
Error Counters) that track the number of transmission errors and dictate the opera-
tional state of a CAN node. Figure 3 displays the error states and the conditions under
which the ECU changes its network state. Although these features are intended to
isolate faulty nodes and maintain network integrity, they can also be manipulated to
launch sophisticated attacks.
Figure 2. CAN arbitration policy: three ECUs (A, B, and C) initiate transmission at the same time, but
only ECU B wins arbitration.
Figure 4. Examples of known attacks on CAN networks, highlighting the order and periodicity of
considered frames. ECUs A and B are legitimate, while K is the attacker.
(a) DoS Attack floods the CAN bus with an excessive number of high-priority frames,
thus preventing benign ECUs from transmitting frames that have lower priority levels.
The typical ID used is 0x000 (highest overall priority, but easy to detect because it is
never used by benign nodes) or the highest ID typically sent in that network [59,60].
(b) Fuzzy Attack involves injecting frames that contain random, or partially random,
values across various fields of the CAN frame, namely ID, DLC (Data Length Code),
and payload. This strategy seeks to inundate benign frames by introducing a high
Electronics 2025, 14, 471 14 of 29
volume of randomized traffic, or to specifically target a set of benign IDs with the goal
of inducing adverse vehicle behaviors [61].
(c) Replay Attack involves an initial phase to capture valid frames by monitoring the
CAN traffic, storing them, and subsequently retransmitting these frames to produce
discrepancies in the information within the targeted benign IDs [62].
(d) Spoof Attack requires an initial examination of the data embedded in the payload of
the target ID(s).
The forged malicious frames, with benign ID, are then transmitted with manipulated
payloads, with the intent of provoking undesired or dangerous vehicle states [63].
(e) Suspension Attack is designed to stop the transmission of CAN frames originating
from a targeted ECU. This can be executed externally by taking advantage of the error
handling capabilities inherent in the CAN protocol, inducing the ECU into the Bus Off
state (see Figure 3), or internally through the deployment of harmful software aimed
at blocking frame transmission at a certain stage [64].
(f) Masquerade Attack occurs after the suspension of transmission from an ECU. Using
a malicious ECU, spoofed frames that match the ID, DLC, payload characteristics,
and timing of the original frames are transmitted, thus seemingly maintaining an
unchanged overall traffic pattern on the bus [65].
Depending on the target ECU for the suspension attack, it can become a Wormhole/
Black-hole Attack, which causes an ECU that interconnects multiple distinct subnets to
cease functioning.
For injection attacks, the first four in Figure 4, a distinction can be made depending on
the injection delivery method, rather than only on the content of CAN frames. Three meth-
ods can be exploited: periodic, flam, and irregular. Firstly, the periodic delivery method
consists of the injection of malicious CAN frames within a fixed period. The effectiveness of
this method highly depends on the targeted ID, and on the chosen periodicity. Secondly, the
flam delivery method is a more sophisticated option. In this case, the malicious frames are
sent in immediate succession after the benign ones. This timing order between benign and
injected frames ensures that the authentic message cannot physically be executed before
the malicious one modifies the data [10]. The effects of flam delivery can be noticed, for
example, in the information displayed on the tachometer, in which the needle may remain
at a fixed position even if the vehicle is in motion. This happens because the instrument
cluster ECU does not have the physical time to actuate the benign data before the injected
one arrives. Lastly, the irregular delivery method encloses all CAN frames injected with-
out a specific time property. The aforementioned attack categories focus specifically on
their effects on CAN bus traffic. The specific attack vector (the technique employed by
an attacker to unlawfully access an IVN or ECU) is beyond the scope of this overview
and is inherently linked to the attacker’s chosen target. However, since every attack will
inevitably leave traces in some part of the vehicle’s IVN, an intrusion detection system
monitoring that network may be able to detect the attack.
• Approach: defines which architecture has been selected for the IDS, determining the
detection methodology between more deterministic (rule-based) or heuristic (anomaly-
based) approaches.
• Layering: the IDS can monitor single protocol layers (single-layer), or more than one
layer simultaneously (cross-layer). It depends on the available layers of the considered
protocol, for example, physical, data-link, network, or application layers.
• Reaction: classifies the post-detection behavior of the system. An Intrusion Detection
System (IDS) is a passive technique that only raises an alert when an anomaly/attack
is detected, while an Intrusion Prevention System (IPS) is also able to proactively take
some countermeasures after the detection of the anomaly/attack.
Figure 5. IDS taxonomy defining the four characteristics of the design space.
unusual patterns that deviate from normal operations [70–72]. Although this approach is
adept at uncovering novel attacks, it can also result in a higher rate of false positives due
to the challenges in precisely defining what constitutes "normal" behavior in a dynamic
automotive environment.
and refining them to more detailed inspections to optimize both detection accuracy and
computational efficiency.
Moreover, the ability of the datasets to encompass the complete range of CAN traffic,
including elements like ID, DLC (Data Length Code), payload, and timestamps, augments
the model’s ability to detect subtle anomalies. Future research should emphasize the ex-
pansion and refinement of these datasets, integrating more intricate attack scenarios and
real-time traffic conditions, to ensure that AI-based IDS models are robust, flexible, and
prepared for deployment in next-generation vehicles. Table 4 contains some of the most
recent and valuable CAN datasets for IDSs, providing the release year, organization, and
URL of the shared repositories for each dataset. Then, the key features of the aforemen-
tioned CAN datasets are listed in Table 5. This information can provide valuable insights
to determine the most suitable CAN dataset for IDS design and development. Therefore,
we have classified the traffic categories of each attack and benign data point, with an
in-depth distinction: Real, Testbed, Virtual, and Manipulated. The Real class considers
only traffic (benign or attack) logged entirely from a real vehicle, without any subsequent
manipulation or simulation in a virtual environment. Clearly, attacks classified as real
have been performed by injecting additional CAN frames into the monitored IVN of the
real vehicle, for example, via the OBD-II port. The Testbed class instead considers those
datasets generated in physical testbeds, without the use of a vehicle connection during the
recording, for example, by emulating a real CAN network with discrete boards.
The Virtual class is assigned when the CAN traffic is fully generated in a virtual
environment, for example, in Matlab suite. Lastly, the Manipulated class is related to traffic
generated in a physical environment, and then manipulated to manually add/remove
CAN frames. When choosing a dataset, according to the IDS to be designed, the labeling
and traffic diversity characteristics should be considered. If, for example, the designed
IDS should cover at least a subset of the known attacks, then at least those attacks should
be included.
Electronics 2025, 14, 471 19 of 29
Also, a key aspect could be the total duration of the dataset, and its balancing between
benign and attack traffic, thus providing the most complete scenario possible to develop an
IDS. However, for each chosen dataset, some preliminary steps may be required to prepare
the data appropriately:
• Preprocessing: Cleaning and organizing data to remove noise and irrelevant informa-
tion, ensuring high-quality inputs for AI models.
• Dataset Analysis: Determining the main information of the dataset and defining
which CAN traffic characteristics to monitor in the IDS.
• Feature Extraction: Identifying and extracting relevant features from the CAN data,
such as message IDs, payload content, and timing information, which are crucial for
detecting anomalies.
In the following, an overview of the most common AI models for Intrusion Detection
Systems will be provided.
Dataset Label Traffic Type Benign DoS Fuzzy Replay Spoof Susp. Masq. Traces No Attack Attack
DS1 No Real Yes Yes Yes - - Yes - 3 17 m 17 s 18 m 56 s
DS2 Yes Real/Testbed Yes Yes Yes Yes Yes Yes - 18 32 m 8 s 19 m 45 s
DS3 Mixed Real/Virtual Yes Yes Yes Yes Yes Yes Yes 5 13 h 24 h
DS4 Mixed Real Yes Yes Yes Yes Yes - - 13 2m 46 m
DS5 No Real Yes Yes Yes - Yes - Yes 33 3 h 0 m 32 s 27 m 10 s
DS6 Yes Real/Testbed Yes - Yes Yes Yes - Yes 1248 2 h 33 m 43 s 2 h 33 m 43 s
DS7 Yes Real Yes Yes Yes Yes Yes Yes Yes 36 17 h 8 m 10 s 2 h 54 m 56 s
32 m 42 s
DS8 Yes Real/Testbed Yes - Yes Yes Yes Yes Yes 126 3 h 28 m 25 s
each
comparing new data with previous examples, without the need for a complex model.
In practice, the model analyzes the similarity between new observations and stored
historical data, classifying messages transmitted on the CAN network based on their
proximity to the most similar “neighbors”, which have been labeled as legitimate
or suspicious. When a suspicious message is transmitted on the network, KNN can
detect it by comparing the sequence, message identifier, and other characteristics with
pre-existing data, identifying any significant deviations. Another type of attack that
KNN can detect is a Denial of Service (DoS) attack, where an attacker sends a large
number of messages to the network to saturate it. In this case, the model can observe
the characteristics of the messages, such as frequency and temporal distribution,
and determine if there are any spikes or unusual patterns that suggest an ongoing
attack. The main strength of KNN is its ability to dynamically adapt to changes in the
data, since as new data is acquired, the model can easily update itself, improving its
ability to detect emerging threats. Although KNN can be more expensive in terms
of memory and computation than simpler models such as Naive Bayes, its distance-
based and proximity classification approach makes it particularly useful in scenarios
where deviations from normal network behavior are subtle and difficult to detect.
Additionally, KNN can be implemented on embedded systems, albeit with some
resource limitations, and can run in real time, which is essential for ensuring secure
communications on wired networks in vehicles. Its effectiveness depends on the
choice of an appropriate value of K, which determines the number of neighbors to
consider, and on the quality of the training data, which must be representative of
normal conditions and possible threats [92,93].
• In the context of vehicle cybersecurity, the linear regression model can be used to
detect attacks on wired networks, such as those using the CAN bus. Although linear
regression is not a classification model, its application in wired vehicle networks is
beneficial for detecting anomalies in data by analyzing the relationships between
different variables. The most common attacks on these networks include malicious
message injection or the manipulation of data passing between various vehicle com-
ponents. Linear regression can be used to monitor the relationship between various
communication parameters, such as message sequence, data length, and the time
interval between messages. Under normal conditions, these parameters will follow
predictable, linear trends. If an attack such as malicious message injection alters these
patterns, linear regression would be able to detect a discrepancy between the observed
data and those predicted by the model, flagging potential threats. For example, a
Denial of Service (DoS) attack could generate an abnormal amount of traffic on the
CAN network, suddenly changing the relationships between the number of messages
sent and the time elapsed between them. Linear regression, analyzing the historical
trend of the data, could identify these changes and suggest that the network traffic is
deviating from what would be considered normal. Another important aspect of linear
regression is its ability to make predictions. If the model is trained on historical, nor-
malized CAN communication data, it could provide an indication of what constitutes
expected network behavior, allowing it to easily identify when current data deviate
from this prediction. However, linear regression also has limitations in complex attack
scenarios. Because it assumes a linear relationship between variables, it may not be
able to detect attacks with more complex patterns, where the relationships between
the data do not follow a simple distribution. However, this model is extremely useful
for detecting anomalies in scenarios where the changes in the data are gradual or
follow regular trends, such as traffic spikes or fluctuations in message flow. Although
linear regression is not particularly computationally demanding and can be easily
Electronics 2025, 14, 471 21 of 29
data into a higher-dimensional space, where a hyperplane can separate classes more
effectively. This is particularly useful for detecting complex attacks that do not follow
simple linear patterns. However, SVMs can be computationally intensive, especially
during the training phase, and require a fair amount of resources to compute margins
and support vectors, which can be a challenge in resource-constrained embedded
environments. However, once trained, SVMs can operate in real time, which is critical
for the security of wired vehicle networks. Their ability to generalize well to unseen
data makes them a robust choice for cybersecurity applications, where accuracy and
the ability to detect new forms of attack are essential [98,99].
• Random Forest (RF) is an ensemble of Decision Trees that works by combining
predictions from many trees to improve the accuracy and robustness of the model
compared to a single Decision Tree. This approach is particularly useful for detecting
attacks such as fraudulent message injection or communication manipulation within
the CAN network, where individual message features (such as identifier, length,
and transmission time) can have subtle variations that are difficult to detect with
simple models. For attacks such as message injection, Random Forest can analyze
each message by running through multiple Decision Trees, each trained on different
portions of the data and with a different subset of features. This allows the model
to capture complex patterns and reduce the risk of overfitting, which is common in
single Decision Trees. When an anomalous message is detected, such as a message
with an unusual ID or sent at an unusual time, the multiple trees in the Random
Forest can converge to classify this message as anomalous. Random Forest is also
particularly effective at detecting DoS attacks, where traffic on the CAN network
suddenly increases to overload the system. Due to its ability to aggregate decisions
from multiple trees, Random Forest can detect these anomalies even when the attack
signals are subtle and distributed across many features. The model can handle a large
number of inputs and find correlations that individual trees might miss. Another
significant advantage of Random Forest is its robustness to noise in the data and
its ability to handle datasets with many features, without the need for excessive
preprocessing or dimension reduction. This makes it particularly suitable for the
complex environment of wired vehicle networks, where each message may contain
multiple attributes to analyze. However, Random Forest can be computationally
more expensive than simpler models, especially during the training phase, where
many trees must be built. Despite this, once trained, the model is fast and efficient
at inference, making it suitable for real-time implementation in embedded vehicle
systems, ensuring fast and accurate detection of attacks on wired networks [100,101].
DoS attacks, which aim to overload the CAN network by sending a large number
of messages in rapid succession, can also be effectively detected with LSTMs. The
network can observe the sudden and sustained increase in traffic, distinguishing these
anomalous spikes from normal communication patterns. A key advantage of LSTMs
is their ability to handle both data that exhibit short-term relationships and data with
long-term relationships. This is particularly useful in detecting attacks that may have
cumulative or delayed effects over time, something that traditional models may not
capture effectively. However, training LSTM networks can be computationally in-
tensive and require a significant amount of training data to generalize well, which
may be a challenge in resource-constrained embedded systems in vehicles. However,
once trained, LSTMs can operate in real time, allowing the immediate detection of
anomalies in CAN network traffic, ensuring a high level of security for internal vehicle
communications [102,103].
• Convolutional Neural Networks (CNNs) automatically extract relevant features from
complex data structures, including temporal or sequential data that can be represented
as two-dimensional matrices. In the case of CAN networks, transmitted messages can
be transformed into a matrix representation, where each row could represent a message
and each column could represent an attribute of the message, such as the identifier,
data length, and timestamp. CNNs can then be used to detect complex spatial and
temporal patterns within this data, which could indicate anomalous behavior or
attacks. For example, a malicious message injection attack could alter regular message
patterns, introducing variations in the data that a CNN can recognize as deviations
from normal behavior. DoS attacks, which produce a sudden and anomalous increase
in message volume, can be detected by CNNs due to their ability to capture rapid
and distinct changes in data patterns. CNNs, by applying convolutional filters, can
quickly identify regions of the data where significant changes occur, signaling the
presence of a possible attack. One advantage of CNNs is their ability to reduce the
need for manual feature engineering, as convolutional filters can autonomously learn
the most significant features from the raw data. This is particularly useful in complex
environments such as wired vehicle networks, where it is difficult to determine a
priori which specific features are most indicative of an attack. However, CNNs require
considerable computational power, especially during the training phase, and large
amounts of data to learn effectively, which can be a challenge in resource-constrained
embedded systems. However, once trained, CNNs can operate efficiently in real time,
providing accurate and rapid detection of anomalies in network traffic, providing an
additional layer of security for vehicle communications [104,105].
• Autoencoders are unsupervised neural networks designed to learn a compressed
representation (encoding) of input data, and then reconstruct it as accurately as possi-
ble. Their ability to learn a compact and faithful representation of normal data makes
them ideal for anomaly detection, as any significant deviation from normal data, such
as attacks, will result in a higher reconstruction error. In the case of CAN networks,
autoencoders can be trained using only legitimate, non-compromised data. During
training, the network learns to compress and decompress network messages in a way
that minimizes information loss. When the autoencoder is exposed to anomalous
data, such as those generated by malicious message injection or denial of service
attacks, the trained models cannot accurately reconstruct these new data patterns,
resulting in a higher reconstruction error. This error can be used as a signal to identify
potential attacks. For example, in a message injection attack, the injected message data
will have temporal and structural characteristics that differ significantly from normal
data. The autoencoder, trained on normal CAN data, will not be able to accurately
Electronics 2025, 14, 471 24 of 29
reproduce these new data, signaling an anomaly. The same is true for DoS attacks,
where the sudden and irregular increase in traffic may produce a pattern that the
autoencoder cannot effectively reconstruct. A significant advantage of autoencoders
is that they do not require labeled data for training, which is useful in cybersecurity
contexts where obtaining a complete dataset of attacks can be difficult. However,
a potential disadvantage is that they require a sufficient amount of normal data to
train the model, and their ability to generalize may be limited if the training data
do not well represent all the variables of normal communication scenarios. Despite
these challenges, autoencoders are a powerful technique for anomaly detection, being
able to operate in real time on embedded systems, offering an efficient and accurate
solution to protect wired vehicle networks from potential threats [106,107].
Future research should explore ways to align IDS development with these standards
to ensure security without compromising compliance.
• Energy Efficiency: Given the limited power resources in vehicles, future research
should explore energy-efficient IDS implementations that minimize power consump-
tion while maintaining high detection accuracy.
In conclusion, this review not only consolidates existing knowledge but also introduces
novel insights into the application of AI-based IDSs in the automotive sector. By addressing
the outlined research directions, future studies can contribute to the development of more
robust, scalable, and efficient IDS solutions. Such advancements are crucial for safeguarding
the next generation of connected and autonomous vehicles from an ever-growing landscape
of cyber threats.
Author Contributions: All authors have contributed equally to this article. All authors have read
and agreed to the published version of the manuscript.
Funding: This research has been partially supported by CN1 Spoke 6; by HARDNESS PE SERICS
Spoke 7; MIUR project FoReLab.
Conflicts of Interest: Stefano Mazzetti was employed by the company ESWS. The remaining authors
declare that the research was conducted in the absence of any commercial or financial relationship
that could be construed as a potential conflict of interest.
References
1. Zhu, H.; Zhou, W.; Li, Z.; Li, L.; Huang, T. Requirements-driven automotive electrical/electronic architecture: A survey and
prospective trends. IEEE Access 2021, 9, 100096–100112. [CrossRef]
2. Askaripoor, H.; Hashemi Farzaneh, M.; Knoll, A. E/E architecture synthesis: Challenges and technologies. Electronics 2022,
11, 518. [CrossRef]
3. Bandur, V.; Selim, G.; Pantelic, V.; Lawford, M. Making the case for centralized automotive E/E architectures. IEEE Trans. Veh.
Technol. 2021, 70, 1230–1245. [CrossRef]
4. Brunner, S.; Roder, J.; Kucera, M.; Waas, T. Automotive E/E-architecture enhancements by usage of ethernet TSN. In Proceedings
of the 2017 13th Workshop on Intelligent Solutions in Embedded Systems (WISES), Hamburg, Germany, 12–13 June 2017; pp. 9–13.
5. Young, C.; Zambreno, J.; Olufowobi, H.; Bloom, G. Survey of automotive controller area network intrusion detection systems.
IEEE Des. Test 2019, 36, 48–55. [CrossRef]
6. Bozdal, M.; Samie, M.; Jennions, I. A survey on can bus protocol: Attacks, challenges, and potential solutions. In Proceedings of
the 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, UK, 16–17
August 2018; pp. 201–205.
7. Bozdal, M.; Samie, M.; Aslam, S.; Jennions, I. Evaluation of can bus security challenges. Sensors 2020, 20, 2364. [CrossRef]
[PubMed]
8. Checkoway, S.; McCoy, D.; Kantor, B.; Anderson, D.; Shacham, H.; Savage, S.; Koscher, K.; Czeskis, A.; Roesner, F.; Kohno, T.
Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of the 20th USENIX Security Symposium
(USENIX Security 11), San Francisco, CA, USA, 8–12 August 2011.
9. Rouf, I.; Miller, R.; Mustafa, H.; Taylor, T.; Oh, S.; Xu, W.; Gruteser, M.; Trappe, W.; Seskar, I. Security and privacy vulnerabilities
of {In-Car} wireless networks: A tire pressure monitoring system case study. In Proceedings of the 19th USENIX Security
Symposium (USENIX Security 10), Washington, DC, USA, 11–13 August 2010.
10. Hoppe, T.; Kiltz, S.; Dittmann, J. Security threats to automotive CAN networks—Practical examples and selected short-term
countermeasures. Reliab. Eng. Syst. Saf. 2011, 96, 11–25. [CrossRef]
11. Wang, Q.; Lu, Z.; Qu, G. An entropy analysis based intrusion detection system for controller area network in vehicles. In
Proceedings of the 2018 31st IEEE International System-on-Chip Conference (SOCC), Arlington, VA, USA, 4–7 September 2018;
pp. 90–95.
12. Lokman, S.F.; Othman, A.T.; Abu-Bakar, M.H. Intrusion detection system for automotive Controller Area Network (CAN) bus
system: A review. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 184. [CrossRef]
13. Zhang, L.; Ma, D. A hybrid approach toward efficient and accurate intrusion detection for in-vehicle networks. IEEE Access 2022,
10, 10852–10866. [CrossRef]
Electronics 2025, 14, 471 26 of 29
14. Longari, S.; Noseda, F.; Carminati, M.; Zanero, S. Evaluating the Robustness of Automotive Intrusion Detection Systems Against
Evasion Attacks. In Proceedings of the International Symposium on Cyber Security, Cryptology, and Machine Learning, Beer
Sheva, Israel, 29–30 June 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 337–352.
15. Zhou, J.; Xie, G.; Yu, S.; Li, R. Clock-based sender identification and attack detection for automotive CAN network. IEEE Access
2020, 9, 2665–2679. [CrossRef]
16. Abreu, R.; Simão, E.; Serôdio, C.; Branco, F.; Valente, A. Enhancing IoT Security in Vehicles: A Comprehensive Review of
AI-Driven Solutions for Cyber-Threat Detection. AI 2024, 5, 2279–2299. [CrossRef]
17. Pascale, F.; Adinolfi, E.A.; Coppola, S.; Santonicola, E. Cybersecurity in automotive: An intrusion detection system in connected
vehicles. Electronics 2021, 10, 1765. [CrossRef]
18. Luo, F.; Zhang, X.; Yang, Z.; Jiang, Y.; Wang, J.; Wu, M.; Feng, W. Cybersecurity testing for automotive domain: A survey. Sensors
2022, 22, 9211. [CrossRef]
19. Kifor, C.V.; Popescu, A. Automotive cybersecurity: A Survey on frameworks, standards, and testing and monitoring technologies.
Sensors 2024, 24, 6139. [CrossRef]
20. Fernandez de Arroyabe, I.; Watson, T.; Phillips, I. Cybersecurity Maintenance in the Automotive Industry Challenges and
Solutions: A Technology Adoption Approach. Future Internet 2024, 16, 395. [CrossRef]
21. Jiang, S. Vehicle E/E Architecture and Its Adaptation to New Technical Trends; Technical report, SAE Technical Paper; SAE: Warrendale,
PA, USA, 2019.
22. Guissouma, H.; Hohl, C.P.; Lesniak, F.; Schindewolf, M.; Becker, J.; Sax, E. Lifecycle management of automotive safety-critical
over the air updates: A systems approach. IEEE Access 2022, 10, 57696–57717. [CrossRef]
23. Mariño, A.G.; Fons, F.; Arostegui, J.M.M. The future roadmap of in-vehicle network processing: A HW-centric (R-) evolution.
IEEE Access 2022, 10, 69223–69249. [CrossRef]
24. Hussein, H.M.; Ibrahim, A.M.; Taha, R.A.; Rafin, S.S.; Abdelrahman, M.S.; Kharchouf, I.; Mohammed, O.A. State-of-the-Art
Electric Vehicle Modeling: Architectures, Control, and Regulations. Electronics 2024, 13, 3578. [CrossRef]
25. ISO 17987; Road Vehicles—Local Interconnect Network (LIN). ISO: Geneva, Switzerland, 2016.
26. ISO 21806; Road Vehicles—Media Oriented Systems Transport (MOST). ISO: Geneva, Switzerland, 2020.
27. ISO 17458; Road Vehicles—FlexRay Communications System. ISO: Geneva, Switzerland, 2013.
28. ISO 21111; Road Vehicles—In-Vehicle Ethernet. ISO: Geneva, Switzerland, 2020.
29. ISO/IEC/IEEE 8802-1BA; Information Technology—Telecommunications and Information Exchange Between Systems—Local
and Metropolitan Area Networks—Specific Requirements-Part 1BA: Audio Video Bridging (AVB) Systems. ISO: Geneva,
Switzerland, 2023.
30. ISO 11898; Road Vehicles—Controller Area Network (CAN). ISO: Geneva, Switzerland, 2024.
31. Schulte, W. TSN-Time-Sensitive Networking; VDE Verlag GmbH: Berlin, Germany, 2020.
32. Rodríguez, B.; Sanjurjo, E.; Tranchero, M.; Romano, C.; González, F. Thermal parameter and state estimation for digital twins of
e-powertrain components. IEEE Access 2021, 9, 97384–97400. [CrossRef]
33. Lin, M.; Xie, H.; Shan, M. A hybrid multiscale permutation entropy-based fault diagnosis and inconsistency evaluation approach
for lithium battery of E-vehicles. IEEE Access 2022, 10, 104757–104768. [CrossRef]
34. Karopoulos, G.; Kambourakis, G.; Chatzoglou, E.; Hernández-Ramos, J.L.; Kouliaridis, V. Demystifying in-vehicle intrusion
detection systems: A survey of surveys and a meta-taxonomy. Electronics 2022, 11, 1072. [CrossRef]
35. Otoum, Y.; Nayak, A. As-ids: Anomaly and signature based ids for the internet of things. J. Netw. Syst. Manag. 2021, 29, 23.
[CrossRef]
36. Dini, P.; Elhanashi, A.; Begni, A.; Saponara, S.; Zheng, Q.; Gasmi, K. Overview on intrusion detection systems design exploiting
machine learning for networking cybersecurity. Appl. Sci. 2023, 13, 7507. [CrossRef]
37. Wang, D.; Ganesan, S. Automotive domain controller. In Proceedings of the 2020 International Conference on Computing and
Information Technology (ICCIT-1441), Tabuk, Saudi Arabia, 9–10 September 2020; pp. 1–5.
38. Kilian, P.; Koller, O.; Van Bergen, P.; Gebauer, C.; Dazer, M. Safety-related availability in the power supply domain. IEEE Access
2022, 10, 47869–47880. [CrossRef]
39. ISO 26262; Road Vehicles—Functional Safety. ISO: Geneva, Switzerland, 2018.
40. Vdovic, H.; Babic, J.; Podobnik, V. Automotive software in connected and autonomous electric vehicles: A review. IEEE Access
2019, 7, 166365–166379. [CrossRef]
41. De Gelder, E.; Elrofai, H.; Saberi, A.K.; Paardekooper, J.P.; Den Camp, O.O.; De Schutter, B. Risk quantification for automated
driving systems in real-world driving scenarios. IEEE Access 2021, 9, 168953–168970. [CrossRef]
42. Ranjbar, B.; Safaei, B.; Ejlali, A.; Kumar, A. FANTOM: Fault tolerant task-drop aware scheduling for mixed-criticality systems.
IEEE Access 2020, 8, 187232–187248. [CrossRef]
43. Canino, N.; Di Matteo, S.; Rossi, D.; Saponara, S. HW-SW interface design and implementation for error logging and reporting
for RAS improvement. IEEE Access 2024, 12, 60081–60094. [CrossRef]
Electronics 2025, 14, 471 27 of 29
44. Girdhar, M.; You, Y.; Song, T.J.; Ghosh, S.; Hong, J. Post-Accident Cyberattack Event Analysis for Connected and Automated
Vehicles. IEEE Access 2022, 10, 83176–83194. [CrossRef]
45. Sharma, P.; Gillanders, J. Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art.
IEEE Access 2022, 10, 108979–108996. [CrossRef]
46. ISO/SAE 21434; Road Vehicles—Cybersecurity Engineering. ISO: Geneva, Switzerland; SAE: Warrendale, PA, USA, 2018.
47. Costantino, G.; De Vincenzi, M.; Matteucci, I. A comparative analysis of unece wp. 29 r155 and ISO/SAE 21434. In Proceedings of
the 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy, 6–10 June 2022; pp. 340–347.
48. Macher, G.; Schmittner, C.; Veledar, O.; Brenner, E. ISO/SAE DIS 21434 automotive cybersecurity standard-in a nutshell. In
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops: DECSoS 2020, DepDevOps 2020,
USDAI 2020, and WAISE 2020, Lisbon, Portugal, 15 September 2020; Proceedings 39; Springer: Berlin/Heidelberg, Germany,
2020; pp. 123–135.
49. UNECE. UN Regulation No.155-Cyber Security and Cyber Security Management System; UNECE: Geneva, Switzerland, 2021.
50. UNECE. UN Regulation No.156-Software Update and Software Update Management System; UNECE: Geneva, Switzerland, 2021.
51. Miller, C. Remote exploitation of an unaltered passenger vehicle. In Proceedings of the Black Hat USA, Las Vegas, NV, USA, 1–6
August 2015.
52. Jing, P.; Cai, Z.; Cao, Y.; Yu, L.; Du, Y.; Zhang, W.; Qian, C.; Luo, X.; Nie, S.; Wu, S. Revisiting automotive attack surfaces: A
practitioners’ perspective. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA,
19–23 May 2024; pp. 2348–2365.
53. Marksteiner, S.; Priller, P. A model-driven methodology for automotive cybersecurity test case generation. In Proceedings of
the 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Vienna, Austria, 7–11 September 2021;
pp. 129–135.
54. Cho, K.T.; Shin, K.G. Error handling of in-vehicle networks makes them vulnerable. In Proceedings of the 2016 ACM SIGSAC
Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 1044–1055.
55. Gumrukcu, E.; Arsalan, A.; Muriithi, G.; Joglekar, C.; Aboulebdeh, A.; Zehir, M.A.; Papari, B.; Monti, A. Impact of cyber-attacks
on EV charging coordination: The case of single point of failure. In Proceedings of the 2022 4th Global Power, Energy and
Communication Conference (GPECOM), Cappadocia, Turkey, 14–17 June 2022; pp. 506–511.
56. Specification, C. Bosch. Robert Bosch Gmbh Postfach 1991, 50, 15.
57. Koscher, K.; Czeskis, A.; Roesner, F.; Patel, S.; Kohno, T.; Checkoway, S.; McCoy, D.; Kantor, B.; Anderson, D.; Shacham, H.; et al.
Experimental security analysis of a modern automobile. In Proceedings of the 2010 IEEE Symposium on Security and Privacy,
Oakland, CA, USA, 16–19 May 2010; pp. 447–462.
58. Jo, H.J.; Choi, W. A survey of attacks on controller area networks and corresponding countermeasures. IEEE Trans. Intell. Transp.
Syst. 2021, 23, 6123–6141. [CrossRef]
59. Perraud, E. Machine learning algorithm of detection of DoS attacks on an automotive telematic unit. Int. J. Comput. Netw.
Commun. (IJCNC) 2019, 11, 27–43. [CrossRef]
60. Jedh, M.; Othmane, L.B.; Ahmed, N.; Bhargava, B. Detection of message injection attacks onto the can bus using similarities of
successive messages-sequence graphs. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4133–4146. [CrossRef]
61. Lee, H.; Choi, K.; Chung, K.; Kim, J.; Yim, K. Fuzzing can packets into automobiles. In Proceedings of the 2015 IEEE 29th
International Conference on Advanced Information Networking and Applications, Gwangiu, Republic of Korea, 24–27 March
2015; pp. 817–821.
62. Csikor, L.; Lim, H.W.; Wong, J.W.; Ramesh, S.; Parameswarath, R.P.; Chan, M.C. Rollback: A new time-agnostic replay attack
against the automotive remote keyless entry systems. ACM Trans. Cyber-Phys. Syst. 2024, 8, 1–25. [CrossRef]
63. Van Der Merwe, J.R.; Zubizarreta, X.; Lukčin, I.; Rügamer, A.; Felber, W. Classification of spoofing attack types. In Proceedings of
the 2018 European Navigation Conference (ENC), Gothenburg, Sweden, 14–17 May 2018; pp. 91–99.
64. Lee, S.; Choi, W.; Jo, H.J.; Lee, D.H. ErrIDS: An enhanced cumulative timing error-based automotive intrusion detection system.
IEEE Trans. Intell. Transp. Syst. 2023, 24, 12406–12421. [CrossRef]
65. Jo, H.J.; Kim, J.H.; Choi, H.Y.; Choi, W.; Lee, D.H.; Lee, I. Mauth-can: Masquerade-attack-proof authentication for in-vehicle
networks. IEEE Trans. Veh. Technol. 2019, 69, 2204–2218. [CrossRef]
66. Rajapaksha, S.; Kalutarage, H.; Al-Kadri, M.O.; Petrovski, A.; Madzudzo, G.; Cheah, M. Ai-based intrusion detection systems for
in-vehicle networks: A survey. ACM Comput. Surv. 2023, 55, 1–40. [CrossRef]
67. Studnia, I.; Alata, E.; Nicomette, V.; Kaâniche, M.; Laarouchi, Y. A language-based intrusion detection approach for automotive
embedded networks. Int. J. Embed. Syst. 2018, 10, 1–12. [CrossRef]
68. Jin, S.; Chung, J.G.; Xu, Y. Signature-based intrusion detection system (IDS) for in-vehicle CAN bus network. In Proceedings of
the 2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Republic of Korea, 22–28 May 2021; pp. 1–5.
69. Tomandl, A.; Fuchs, K.P.; Federrath, H. REST-Net: A dynamic rule-based IDS for VANETs. In Proceedings of the 2014 7th IFIP
Wireless and Mobile Networking Conference (WMNC), Vilamoura, Portugal, 20–22 May 2014; pp. 1–8.
Electronics 2025, 14, 471 28 of 29
70. Groza, B.; Murvay, P.S. Efficient intrusion detection with bloom filtering in controller area networks. IEEE Trans. Inf. Forensics
Secur. 2018, 14, 1037–1051. [CrossRef]
71. Aliyu, I.; Feliciano, M.C.; Van Engelenburg, S.; Kim, D.O.; Lim, C.G. A blockchain-based federated forest for SDN-enabled
in-vehicle network intrusion detection system. IEEE Access 2021, 9, 102593–102608. [CrossRef]
72. Dini, P.; Begni, A.; Ciavarella, S.; De Paoli, E.; Fiorelli, G.; Silvestro, C.; Saponara, S. Design and testing novel one-class classifier
based on polynomial interpolation with application to networking security. IEEE Access 2022, 10, 67910–67924. [CrossRef]
73. Dini, P.; Saponara, S. Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive
Cybersecurity. Sensors 2023, 23, 9231. [CrossRef]
74. Cho, K.T.; Shin, K.G. Fingerprinting electronic control units for vehicle intrusion detection. In Proceedings of the 25th USENIX
Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016; pp. 911–927.
75. Hafeez, A.; Rehman, K.; Malik, H. State of the Art Survey on Comparison of Physical Fingerprinting-Based Intrusion Detection Techniques
for In-Vehicle Security; Technical report, SAE Technical Paper; SAE: Warrendale, PA, USA, 2020.
76. Choi, W.; Joo, K.; Jo, H.J.; Park, M.C.; Lee, D.H. VoltageIDS: Low-level communication characteristics for automotive intrusion
detection system. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2114–2129. [CrossRef]
77. Zhao, Y.; Xun, Y.; Liu, J. ClockIDS: A real-time vehicle intrusion detection system based on clock skew. IEEE Internet Things J.
2022, 9, 15593–15606. [CrossRef]
78. Rosadini, C.; Chiarelli, S.; Cornelio, A.; Nesci, W.; Saponara, S.; Dini, P.; Gagliardi, A. Method for Protection from Cyber Attacks
to a Vehicle Based Upon Time Analysis, and Corresponding Device. U.S. Patent Application 18/163,488, 2 February 2023.
79. Wang, C.; Zhao, Z.; Gong, L.; Zhu, L.; Liu, Z.; Cheng, X. A distributed anomaly detection system for in-vehicle network using
HTM. IEEE Access 2018, 6, 9091–9098. [CrossRef]
80. Adadi, A.; Berrada, M. Peeking inside the black-box: A survey on explainable artificial intelligence (XAI). IEEE Access 2018,
6, 52138–52160. [CrossRef]
81. Zhang, Z.; Li, J. A review of artificial intelligence in embedded systems. Micromachines 2023, 14, 897. [CrossRef] [PubMed]
82. Lee, H.; Jeong, S.H.; Kim, H.K. OTIDS: A novel intrusion detection system for in-vehicle network by using remote frame. In
Proceedings of the 2017 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, AB, Canada, 28–30 August 2017;
pp. 57–5709.
83. Dupont, G.; Lekidis, A.; Den Hartog, J.; Etalle, S. Automotive Controller Area Network (CAN) Bus Intrusion Dataset v2. Version
2. 4TU.ResearchData. Dataset 2019. [CrossRef]
84. Hanselmann, M.; Strauss, T.; Dormann, K.; Ulmer, H. CANet: An Unsupervised Intrusion Detection System for High Dimensional
CAN Bus Data. IEEE Access 2020, 8, 58194–58205. [CrossRef]
85. Kang, H.; Kwak, B.I.; Lee, Y.H.; Lee, H.; Lee, H.; Kim, H.K. Car hacking and defense competition on in-vehicle network. In
Proceedings of the Workshop on Automotive and Autonomous Vehicle Security (AutoSec), Online, 25 February 2021; Volume 2021,
p. 25.
86. Verma, M.E.; Iannacone, M.D.; Bridges, R.A.; Hollifield, S.C.; Moriano, P.; Kay, B.; Combs, F.L. Addressing the lack of comparability
& testing in can intrusion detection research: A comprehensive guide to can ids data & introduction of the road dataset. arXiv
2020, arXiv:2012.14600.
87. Gazdag, A.; Ferenc, R.; Buttyán, L. CrySyS dataset of CAN traffic logs containing fabrication and masquerade attacks. Sci. Data
2023, 10, 903. [CrossRef]
88. Rajapaksha, S.; Madzudzo, G.; Kalutarage, H.; Petrovski, A.; Al-Kadri, M.O. CAN-MIRGU: A Comprehensive CAN Bus Attack
Dataset from Moving Vehicles for Intrusion Detection System Evaluation. In Proceedings of the Symposium on Vehicles Security
and Privacy. Internet Society, San Diego, CA, USA, 26 February 2024.
89. Jeong, S.; Lee, S.; Lee, H.; Kim, H.K. X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area
Network-Based In-Vehicle Network. IEEE Trans. Veh. Technol. 2024, 73, 3230–3246. [CrossRef]
90. Islam, R.; Devnath, M.K.; Samad, M.D.; Al Kadry, S.M.J. GGNB: Graph-based Gaussian naive Bayes intrusion detection system
for CAN bus. Veh. Commun. 2022, 33, 100442. [CrossRef]
91. Lampe, B.; Meng, W. Intrusion Detection in the Automotive Domain: A Comprehensive Review. IEEE Commun. Surv. Tutor. 2023,
25, 2356–2426. [CrossRef]
92. Anthony, C.; Elgenaidi, W.; Rao, M. Intrusion detection system for autonomous vehicles using non-tree based machine learning
algorithms. Electronics 2024, 13, 809. [CrossRef]
93. Kousar, A.; Ahmed, S.; Altamimi, A.; Khan, Z.A. A Novel Light-Weight Machine Learning Classifier for Intrusion Detection in
Controller Area Network in Smart Cars. Smart Cities 2024, 7, 3289–3314. [CrossRef]
94. Dakic, P.; Zivkovic, M.; Jovanovic, L.; Bacanin, N.; Antonijevic, M.; Kaljevic, J.; Simic, V. Intrusion detection using metaheuristic
optimization within IoT/IIoT systems and software of autonomous vehicles. Sci. Rep. 2024, 14, 22884. [CrossRef] [PubMed]
95. Bi, Z.; Xu, G.; Xu, G.; Wang, C.; Zhang, S. Bit-level automotive controller area network message reverse framework based on
linear regression. Sensors 2022, 22, 981. [CrossRef] [PubMed]
Electronics 2025, 14, 471 29 of 29
96. Azam, Z.; Islam, M.M.; Huda, M.N. Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model
Analysis Through Decision Tree. IEEE Access 2023, 11, 80348–80391. [CrossRef]
97. Sowka, K.; Palade, V.; Jadidbonab, H.; Wooderson, P.; Nguyen, H. A review on automatic generation of attack trees and its
application to automotive cybersecurity. In Artificial Intelligence and Cyber Security in Industry 4.0; Springer: Berlin/Heidelberg,
Germany, 2023; pp. 165–193.
98. Avatefipour, O.; Al-Sumaiti, A.S.; El-Sherbeeny, A.M.; Awwad, E.M.; Elmeligy, M.A.; Mohamed, M.A.; Malik, H. An Intelligent
Secured Framework for Cyberattack Detection in Electric Vehicles’ CAN Bus Using Machine Learning. IEEE Access 2019,
7, 127580–127592. [CrossRef]
99. Ashraf, M.W.A.; Singh, A.R.; Pandian, A.; Rathore, R.S.; Bajaj, M.; Zaitsev, I. A hybrid approach using support vector machine
rule-based system: Detecting cyber threats in internet of things. Sci. Rep. 2024, 14, 27058. [CrossRef] [PubMed]
100. Caivano, D.; Catalano, C.; De Vincentiis, M.; Lako, A.; Pagano, A. MaREA: Multi-class Random Forest for Automotive Intrusion
Detection. In Proceedings of the International Conference on Product-Focused Software Process Improvement, Dornbirn, Austria,
10–13 December 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 23–34.
101. Reddy, C.M.; Anbarasi, A.; Mohankumar, N.; Ishwarya, M.V.; Murugan, S. Cloud-Based Road Safety for Real-Time Vehicle
Rash Driving Alerts with Random Forest Algorithm. In Proceedings of the 2024 3rd International Conference for Innovation in
Technology (INOCON), Bangalore, India, 1–3 March 2024; pp. 1–6. [CrossRef]
102. Longari, S.; Nova Valcarcel, D.H.; Zago, M.; Carminati, M.; Zanero, S. CANnolo: An Anomaly Detection System Based on LSTM
Autoencoders for Controller Area Network. IEEE Trans. Netw. Serv. Manag. 2021, 18, 1913–1924. [CrossRef]
103. Zhang, H.; Kang, C.; Xiao, Y. Research on network security situation awareness based on the LSTM-DT model. Sensors 2021,
21, 4788. [CrossRef]
104. Chougule, A.; Kulkarni, I.; Alladi, T.; Chamola, V.; Yu, F.R. HybridSecNet: In-Vehicle Security on Controller Area Networks
Through a Hybrid Two-Step LSTM-CNN Model. IEEE Trans. Veh. Technol. 2024, 73, 14580–14591. [CrossRef]
105. Na, I.S.; Haldorai, A.; Naik, N. Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication
Network Security. IEEE Access 2025, 13, 2215–2228. [CrossRef]
106. Wei, P.; Wang, B.; Dai, X.; Li, L.; He, F. A novel intrusion detection model for the CAN bus packet of in-vehicle network based on
attention mechanism and autoencoder. Digit. Commun. Netw. 2023, 9, 14–21. [CrossRef]
107. Kim, T.; Kim, J.; You, I. An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network.
Electronics 2023, 12, 3543. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.