In-Vehicle Networking/Autonomous Vehicle Security for Internet of Things/Vehicles, 2nd Edition

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (15 April 2024) | Viewed by 888

Special Issue Editor


E-Mail Website
Guest Editor
Department of Software and Computer Engineering, Ajou University, Suwon 16499, Republic of Korea
Interests: in-vehicle network security; industrial control system security; digital forensics; anomaly detection algorithm
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In recent years, vehicles have become one of the most common examples in the area of ICT convergence applications and services. In simple terms, this means that a vehicle system is composed of various internet and communication technologies such as in-vehicle networking, wireless communications like 4G/LTE, 5G, 802.11x, and Bluetooth that enables Internet access, including cloud and V2X communications (Vehicle to Everything) such as Vehicle to Vehicle (V2V), Vehicle to Pedestrian (V2P) Vehicle to Devices (V2D), Vehicle to Grid (V2G), and Vehicle to Infrastructure (V2I). In addition, in-vehicle system performance and user-provided services are ever-advancing by adopting artificial intelligence technologies with deep learning methods. They offer a variety of improved features that allow vehicles to inter-work with the outside world based on high-speed and high-capacity internet technology being accelerated by 5G. At the same time, potential cybersecurity threats on vehicle systems and networks are rapidly growing, such as user privacy and payment information disclosure, unauthorized vehicle software updates, the theft of smart keys/passwords, vehicle communication protocol forgery and injection, DoS/DDoS, physical jamming, etc. In order to provide more secure and reliable services for vehicles, both security and safety should be carefully considered.

The objective of this Special Issue is to focus on the technical contribution, analysis, design, performance simulation, and implementation of in-vehicle networking, autonomous network security for the internet of things/vehicles, safety detection, safety, and security on the virtualized automotive platform.

This Special Issue is a continuation of Part I and seeks to publish outstanding papers that reflect the latest developments in the field of automotive security and privacy.

Topics of interest include, but are not limited to, the following:

  • Automotive networking;
  • In-vehicle network security and privacy;
  • Autonomous vehicle security and privacy;
  • V2X applications and services for security;
  • Industrial Internet of Things for vehicle security;
  • Safety detection and fault management;
  • Security and safety on an automotive virtualized platform;
  • Performance and fault simulation.

Prof. Dr. Taeshik Shon
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • in-vehicle networking
  • autonomous vehicle security
  • V2X applications and services for security
  • industrial Internet of Things for vehicle security
  • Internet of Vehicles
  • virtualization of an automotive computing platform
  • autonomous safety detection and control
  • platform reusability

Related Special Issue

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 569 KiB  
Article
An Effective Ensemble Learning-Based Real-Time Intrusion Detection Scheme for an In-Vehicle Network
by Easa Alalwany and Imad Mahgoub
Electronics 2024, 13(5), 919; https://doi.org/10.3390/electronics13050919 - 28 Feb 2024
Cited by 1 | Viewed by 631
Abstract
The emergence of connected and autonomous vehicles has led to complex network architectures for electronic control unit (ECU) communication. The controller area network (CAN) enables the transmission of data inside vehicle networks. However, although it has low latency and enjoys data broadcast capability, [...] Read more.
The emergence of connected and autonomous vehicles has led to complex network architectures for electronic control unit (ECU) communication. The controller area network (CAN) enables the transmission of data inside vehicle networks. However, although it has low latency and enjoys data broadcast capability, it is vulnerable to attacks on security. The lack of effectiveness of conventional security mechanisms in addressing these vulnerabilities poses a danger to vehicle safety. This study presents an intrusion detection system (IDS) that accurately detects and classifies CAN bus attacks in real-time using ensemble techniques and the Kappa Architecture. The Kappa Architecture enables real-time attack detection, while ensemble learning combines multiple machine learning classifiers to enhance the accuracy of attack detection. The scheme utilizes ensemble methods with Kappa Architecture’s real-time data analysis to detect common CAN bus attacks. This study entails the development and evaluation of supervised models, which are further enhanced using ensemble techniques. The accuracy, precision, recall, and F1 score are used to measure the scheme’s effectiveness. The stacking ensemble technique outperformed individual supervised models and other ensembles with accuracy, precision, recall, and F1 of 0.985, 0.987, and 0.985, respectively. Full article
Show Figures

Figure 1

Back to TopTop