Skip to main content

Abstract

The innovations in the interconnectivity of vehicles enable both expediency and insecurity. Surely, the convenience of gathering real-time information on traffic and weather conditions, the vehicle maintenance status, and the prevailing condition of the transport system at a macro level for infrastructure planning purposes is a boon to society. However, this newly found conveniences present unintended consequences. Specifically, the advancements on automation and connectivity are outpacing the developments in security and safety. We simply cannot afford to make the same mistakes similar to those that are prevalent in our critical infrastructures. Starting at the lowest level, numerous vulnerabilities have been identified in the internal communication network of vehicles. This study is a contribution towards the broad effort of securing the communication network of vehicles through the use of Machine Learning.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Karahasanovic A (2016) Automotive cyber security. Chalmers University of Technology, Gotehnburg, Sweden

    Google Scholar 

  2. Gemalto (2018) Securing vehicle to everything [Online]. Available: https://www.gemalto.com/brochures-site/download-site/Documents/auto-V2X.pdf. Accessed 13 April 2020

  3. Francia GA (2020) Connected Vehicle Security. In: 15th international conference on cyber warfare and security (ICCWS 2020), Norfolk

    Google Scholar 

  4. Torre GD, Rad P, Choo KR (2020) Driverless vehicle security: challenges and future research opportunities. Future Gener Comput Syst 108:1092–1111

    Google Scholar 

  5. Devir N (2019) Applying machine learning for identifying attacks at run-time [Online]. Available: https://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2019/MSC/MSC-2019-06.pdf. Accessed 13 April 2020

  6. Avatefipour O, Al-Sumaiti AS, El-Sherbeeny AM, Awwad EM, Elmeligy MA, Mohamed MA, Malik H (2019) An intelligent secured framework for cyberattack detection in electric vehicles’ CAN bus using machine learning. IEEE Access 7:127580–127592. https://doi.org/10.1109/ACCESS.2019.2937576

  7. Vasistha DK (August 2017) Detecting anomalies in controller area network (CAN) for automobiles [Online]. Available: https://cesg.tamu.edu/wp-content/uploads/2012/01/VASISTHA-THESIS-2017.pdf. Accessed 13 April 2020

  8. Zhou A, Li Z, Shen Y (2019) Anomaly detection of CAN bus messages using a deep neural network for autonomous vehicles. Appl Sci 9:3174

    Google Scholar 

  9. Lokman S, Othman AT, Abu-Bakar M (2019) Intrusion detection system for automotive controller area network (CAN) bus system: a review. J Wireless Com Network 184 https://doi.org/10.1186/s13638-019-1484-3

  10. Kang MJ, Kang JW (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS One 11(6)

    Google Scholar 

  11. Taylor A, LeBlanc S, Japkowiz N (2016) Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 international conference on data science and advanced analytics (DSAA), Montreal

    Google Scholar 

  12. Wasicek A, Weimerskirch (2015) Recognizing manipulated electronic control units. SAE

    Google Scholar 

  13. Jaynes M, Dantu R, Varriale R, Evans N (2016) Automating ECU identification for vehicle security. In: 2016 15th IEEE international conference on machine learning and applications (ICMLA), Anaheim, CA

    Google Scholar 

  14. Kumar S, Singh K, Kumar S, Kaiwartya O, Cao Y, Zhao H (2019) Delimitated anti jammer scheme for internet of vehicle: machine learning based security approach. IEEE Access 7:113311–113323

    Google Scholar 

  15. Corrigan S (2016) Introduction to the controller area network (CAN). Texas Instruments, Dallas, TX

    Google Scholar 

  16. Maggi F (2017) A vulnerability in modern automotive standards and how we exploited it. Trend Micro

    Google Scholar 

  17. Bishop CM (2007) Patern recognition and machine learning. Springer, Belrin

    Google Scholar 

  18. Kim J, Francia G (2018) A comparative study of neural network training algorithms for the intelligent security monitoring of industrial control systems. In: Computer and network security essentials. Springer International Publishing AG, pp 521–538

    Google Scholar 

  19. De Boer P, Kroese DK, Mannor S, Rubinstein RY (2005) A tutorial on the cross-entropy method. Ann Oper Res 134:19–67

    Article  MathSciNet  Google Scholar 

  20. McCaffrey J (2014) Neural network cross entropy error. Vis Studio Mag 04:11

    Google Scholar 

  21. Marquardt D (1963) An algorithm for least-squares estimation of nonlinear parameters. SIAM J Appl Math 11(2):431–441

    Article  MathSciNet  Google Scholar 

  22. Dennis JE, Schnabel RB (1983) Numerical methods for unconstrained optimization and nonlinear equations. Prentice-Hall, Englewoods Cliffs, NJ

    MATH  Google Scholar 

  23. Riedmiller M, Braun H (1993) A direct adaptive method for faster backpropagation learning: the RPROP algorithm. In: Proceedings of the IEEE international conference on neural networks

    Google Scholar 

  24. Moller M (1993) A scaled conjugate gradient algorithm for fast supervised learning. Neural Netw 6:525–533

    Article  Google Scholar 

  25. Hagan MT, Demuth HB, Beale MH (1996) Neural network design. PWS Publishing, Boston

    Google Scholar 

  26. Scales L (1985) Introduction to non-linear optimization. Springer-Verlag, New York

    Book  Google Scholar 

  27. Magnus JR, Neudecker H (1999) Matrix differential calculus. John Wiley & Sons Ltd., Chichester

    MATH  Google Scholar 

  28. Han ML, Kwak BI, Kim HK (2018) Anomaly intrusion detection method for vehicular networks based on survival analysis. Veh Commun 14:52–63

    Google Scholar 

  29. Crow D, Graham S, Borghetti B (2020) Fingerprinting vehicles with CAN Bus data samples. In: Proceedings of the 15th international conference on cyber warfare and security (ICCWS 2020), Norfolk, VA

    Google Scholar 

  30. Weinberg GM (5 Feb 2017) Fuzz testing and fuzz history [Online]. Available: https://secretsofconsulting.blogspot.com/2017/02/fuzz-testing-and-fuzz-history.html. Accessed 6 April 2020

  31. Stone B, Graham S, Mullins B, Kabban C (2018) Enabling auditing and intrusion detection for proprietary controller area networks. Ph.D. Dissertation, Air Force Institute of Technology, Dayton, OH

    Google Scholar 

Download references

Acknowledgements

This work is partially supported by the Florida Center for Cybersecurity, under grant # 3901-1009-00-A (2019 Collaborative SEED Program) and the National Security Agency under Grant Number H98230-19-1-0333. The United States Government is authorized to reproduce and distribute reprints notwithstanding any copyright notation herein.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guillermo A. Francia III .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Francia, G.A., El-Sheikh, E. (2021). Applied Machine Learning to Vehicle Security. In: Maleh, Y., Shojafar, M., Alazab, M., Baddi, Y. (eds) Machine Intelligence and Big Data Analytics for Cybersecurity Applications. Studies in Computational Intelligence, vol 919. Springer, Cham. https://doi.org/10.1007/978-3-030-57024-8_19

Download citation

Publish with us

Policies and ethics