-
CiteScore
-
Impact Factor
Volume 1, Issue 4, ICCK Transactions on Advanced Computing and Systems
Volume 1, Issue 4, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
ICCK Transactions on Advanced Computing and Systems, Volume 1, Issue 4, 2025: 208-221

Open Access | Research Article | 21 September 2025
Mitigating Message Injection Attacks in Internet of Vehicles Using Deep Learning Based Intrusion Detection System
1 Department of Statistics and Data Science, University of Mianwali, Mianwali 42200, Pakistan
2 Department of Computer Science, Qurtuba University of Science and Information Technology, Peshawar 25000, Pakistan
3 Department of Computer Science and Engineering, Sejong University, Seoul 05006, Republic of Korea
4 Department of Business Informatics, Technical University of Vienna (TU Wien), Vienna, Austria
5 Department of Electrical Engineering, University of Science and Technology, Bannu, Pakistan
* Corresponding Author: Muhammad Hammad Nawaz, [email protected]
Received: 16 May 2025, Accepted: 23 July 2025, Published: 21 September 2025  
Abstract
Real-time communication between autonomous vehicles, infrastructure, and their environment has facilitated the Internet of Vehicles (IoVs). Although this connectivity provides vehicular networks with significant benefits, it also introduces severe security threats, such as message injection attacks, particularly due to the heavy reliance on the Controller Area Network (CAN) protocol, which is inherently vulnerable. Electronic Control Units (ECUs) become primary targets for these attacks, leading to unsafe vehicle behaviors. To address these challenges, an Intrusion Detection System (IDS) based on deep learning architectures, Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU) is proposed for detecting and classifying cyberattacks in vehicular networks. Data preprocessing techniques such as NearMiss, Random Over-Sampling (ROS), and Tomek Links are applied to handle class imbalance in the car hacking dataset. A benchmark Car-Hacking dataset, evaluation metrics including accuracy, precision, recall, and F1 score, are used to assess the performance of the models. The experimental results demonstrate that the GRU model achieves the highest accuracy of 99%, followed by LSTM with 98%, and RNN with 94%. These findings indicate that GRU outperforms the other models and, in certain configurations, detects 100% of the attacks. The proposed IDS exhibits considerable superiority over traditional deep learning approaches, presenting a promising and intelligent solution for enhancing the cybersecurity of modern IoV systems.

Graphical Abstract
Mitigating Message Injection Attacks in Internet of Vehicles Using Deep Learning Based Intrusion Detection System

Keywords
internet of vehicles
car hacking
random over-sampling (Ros)
nearmiss
imbalanced data
intrusion detection systems
deep learning

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Khalil, R. A., Saeed, N., Masood, M., Fard, Y. M., Alouini, M. S., & Al-Naffouri, T. Y. (2021). Deep learning in the industrial internet of things: Potentials, challenges, and emerging applications. IEEE Internet of Things Journal, 8(14), 11016-11040.
    [CrossRef]   [Google Scholar]
  2. Haghighat, A. K., Ravichandra-Mouli, V., Chakraborty, P., Esfandiari, Y., Arabi, S., & Sharma, A. (2020). Applications of deep learning in intelligent transportation systems. Journal of Big Data Analytics in Transportation, 2(2), 115-145.
    [CrossRef]   [Google Scholar]
  3. Birchler, C., Khatiri, S., Bosshard, B., Gambi, A., & Panichella, S. (2023). Machine learning-based test selection for simulation-based testing of self-driving cars software. Empirical Software Engineering, 28(3), 71.
    [CrossRef]   [Google Scholar]
  4. Zayed, S. M., Attiya, G., El-Sayed, A., Sayed, A., & Hemdan, E. E. D. (2023). An efficient fault diagnosis framework for digital twins using optimized machine learning models in smart industrial control systems. International Journal of Computational Intelligence Systems, 16(1), 69.
    [CrossRef]   [Google Scholar]
  5. Raimundo, R. J., & Rosário, A. T. (2022). Cybersecurity in the internet of things in industrial management. Applied Sciences, 12(3), 1598.
    [CrossRef]   [Google Scholar]
  6. Awotunde, J. B., Folorunso, S. O., Imoize, A. L., Odunuga, J. O., Lee, C. C., Li, C. T., & Do, D. T. (2023). An ensemble tree-based model for intrusion detection in industrial internet of things networks. Applied Sciences, 13(4), 2479.
    [CrossRef]   [Google Scholar]
  7. Choudhary, V., Tanwar, S., & Choudhury, T. (2024). Evaluation of contemporary intrusion detection systems for internet of things environment. Multimedia Tools and Applications, 83(3), 7541-7581.
    [CrossRef]   [Google Scholar]
  8. Mehedi, S. T., Anwar, A., Rahman, Z., & Ahmed, K. (2021). Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors, 21(14), 4736.
    [CrossRef]   [Google Scholar]
  9. Yang, L., Moubayed, A., & Shami, A. (2021). MTH-IDS: A multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet of Things Journal, 9(1), 616-632.
    [CrossRef]   [Google Scholar]
  10. Yang, L., & Shami, A. (2022, May). A transfer learning and optimized CNN based intrusion detection system for Internet of Vehicles. In ICC 2022-IEEE International Conference on Communications (pp. 2774-2779). IEEE.
    [CrossRef]   [Google Scholar]
  11. Alshathri, S., Sayed, A., & Hemdan, E. E. D. (2024). An intelligent attack detection framework for the internet of autonomous vehicles with imbalanced car hacking data. World Electric Vehicle Journal, 15(8), 356.
    [CrossRef]   [Google Scholar]
  12. Hossain, M. D., Inoue, H., Ochiai, H., Fall, D., & Kadobayashi, Y. (2020, December). An effective in-vehicle CAN bus intrusion detection system using CNN deep learning approach. In GLOBECOM 2020-2020 IEEE global communications conference (pp. 1-6). IEEE.
    [CrossRef]   [Google Scholar]
  13. Song, H. M., Woo, J., & Kim, H. K. (2020). In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Communications, 21, 100198.
    [CrossRef]   [Google Scholar]
  14. Ding, W., Alrashdi, I., Hawash, H., & Abdel-Basset, M. (2024). DeepSecDrive: An explainable deep learning framework for real-time detection of cyberattack in in-vehicle networks. Information Sciences, 658, 120057.
    [CrossRef]   [Google Scholar]
  15. Khan, I. A., Moustafa, N., Pi, D., Haider, W., Li, B., & Jolfaei, A. (2021). An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles. IEEE Transactions on Intelligent Transportation Systems, 23(12), 25469-25478.
    [CrossRef]   [Google Scholar]
  16. Ashraf, J., Bakhshi, A. D., Moustafa, N., Khurshid, H., Javed, A., & Beheshti, A. (2020). Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Transactions on Intelligent Transportation Systems, 22(7), 4507-4518.
    [CrossRef]   [Google Scholar]
  17. Kim, S. K., & Jang, E. S. (2022). The intelligent blockchain for the protection of smart automobile hacking. Journal of Multimedia Information System, 9(1), 33-42.
    [CrossRef]   [Google Scholar]
  18. Hassan, H. A., Hemdan, E. E. D., El‐Shafai, W., Shokair, M., & Abd El‐Samie, F. E. (2024). Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods. Security and Privacy, 7(2), e350.
    [CrossRef]   [Google Scholar]
  19. Nabil, N., Najib, N., & Abdellah, J. (2024). Leveraging artificial neural networks and LightGBM for enhanced intrusion detection in automotive systems. Arabian Journal for Science and Engineering, 49(9), 12579-12587.
    [CrossRef]   [Google Scholar]
  20. Trovão, J. P. (2024). Advancing Automotive Technologies [Automotive Electronics]. IEEE Vehicular Technology Magazine, 19(1), 106-C3.
    [CrossRef]   [Google Scholar]
  21. Sajid, M., Malik, K. R., Almogren, A., Malik, T. S., Khan, A. H., Tanveer, J., & Rehman, A. U. (2024). Enhancing intrusion detection: a hybrid machine and deep learning approach. Journal of Cloud Computing, 13(1), 123.
    [CrossRef]   [Google Scholar]
  22. Hicks, S. A., Strümke, I., Thambawita, V., Hammou, M., Riegler, M. A., Halvorsen, P., & Parasa, S. (2022). On evaluation metrics for medical applications of artificial intelligence. Scientific reports, 12(1), 5979.
    [CrossRef]   [Google Scholar]
  23. Liang, J., Li, Y., Yin, G., Xu, L., Lu, Y., Feng, J., ... & Cai, G. (2022). A MAS-based hierarchical architecture for the cooperation control of connected and automated vehicles. IEEE Transactions on Vehicular Technology, 72(2), 1559-1573.
    [CrossRef]   [Google Scholar]
  24. Zhang, X., Wang, H., Wu, B., Zhou, Q., & Hu, Y. (2023). A novel data-driven method based on sample reliability assessment and improved CNN for machinery fault diagnosis with non-ideal data. Journal of Intelligent Manufacturing, 34(5), 2449-2462.
    [CrossRef]   [Google Scholar]
  25. Liang, J., Tian, Q., Feng, J., Pi, D., & Yin, G. (2023). A polytopic model-based robust predictive control scheme for path tracking of autonomous vehicles. IEEE Transactions on Intelligent Vehicles, 9(2), 3928-3939.
    [CrossRef]   [Google Scholar]
  26. Alshathri, S., Hemdan, E. E. D., El-Shafai, W., & Sayed, A. (2023). Digital twin-based automated fault diagnosis in industrial IoT applications. Computers, Materials & Continua, 75(1), 183-196.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Nawaz, M. H., Ahsan, A., Khan, I. U., Wang, Y., Ahmad, M., & Akhtar, M. S. (2025). Mitigating Message Injection Attacks in Internet of Vehicles Using Deep Learning Based Intrusion Detection System. ICCK Transactions on Advanced Computing and Systems, 1(4), 208–221. https://doi.org/10.62762/TACS.2025.560376

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 50
PDF Downloads: 8

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and Permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
ICCK Transactions on Advanced Computing and Systems

ICCK Transactions on Advanced Computing and Systems

ISSN: 3068-7969 (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/