{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T16:01:55Z","timestamp":1773331315220,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,3,24]],"date-time":"2022-03-24T00:00:00Z","timestamp":1648080000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,3,24]],"date-time":"2022-03-24T00:00:00Z","timestamp":1648080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012639","name":"Prince Sultan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Vehicular Sensor Networks (VSN) introduced a new paradigm for modern transportation systems by improving traffic management and comfort. However, the increasing adoption of smart sensing technologies with the Internet of Things (IoT) made VSN a high-value target for cybercriminals. In recent years, Machine Learning (ML) and Deep Learning (DL) techniques attracted the research community to develop security solutions for IoT networks. Traditional ML and DL approaches that operate with data stored on a centralized server raise major privacy problems for user data. On the other hand, the resource-constrained nature of a smart sensing network demands lightweight security solutions. To address these issues, this article proposes a Federated Learning (FL)-based attack detection framework for VSN. The proposed scheme utilizes a group of Gated Recurrent Units (GRU) with a Random Forest (RF)-based ensembler unit. The effectiveness of the suggested framework is investigated through multiple performance metrics. Experimental findings indicate that the proposed FL approach successfully detected the cyberattacks in VSN with the highest accuracy of 99.52%. The other performance scores, precision, recall, and F1 are attained as 99.77%, 99.54%, and 99.65%, respectively.<\/jats:p>","DOI":"10.1007\/s40747-022-00705-w","type":"journal-article","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T10:34:41Z","timestamp":1648204481000},"page":"4221-4235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":82,"title":["A federated learning framework for cyberattack detection in vehicular sensor networks"],"prefix":"10.1007","volume":"8","author":[{"given":"Maha","family":"Driss","sequence":"first","affiliation":[]},{"given":"Iman","family":"Almomani","sequence":"additional","affiliation":[]},{"given":"Zil","family":"e Huma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-8248","authenticated-orcid":false,"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,24]]},"reference":[{"issue":"23","key":"705_CR1","doi-asserted-by":"publisher","first-page":"2852","DOI":"10.3390\/rs11232852","volume":"11","author":"FA Ghaleb","year":"2019","unstructured":"Ghaleb FA, Maarof MA, Zainal A, Al-rimy BAS, Alsaeedi A, Boulila W (2019) Ensemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network. Remote Sens 11(23):2852","journal-title":"Remote Sens"},{"issue":"6","key":"705_CR2","doi-asserted-by":"publisher","first-page":"1551","DOI":"10.1109\/TITS.2015.2505407","volume":"17","author":"G Guo","year":"2015","unstructured":"Guo G, Wen S (2015) Communication scheduling and control of a platoon of vehicles in vanets. IEEE Trans Intell Transp Syst 17(6):1551\u20131563","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"22","key":"705_CR3","doi-asserted-by":"publisher","first-page":"13752","DOI":"10.1109\/JSEN.2020.3004275","volume":"20","author":"Z El-Rewini","year":"2020","unstructured":"El-Rewini Z, Sadatsharan K, Sugunaraj N, Selvaraj DF, Plathottam SJ, Ranganathan P (2020) Cybersecurity attacks in vehicular sensors. IEEE Sens J 20(22):13752\u201313767","journal-title":"IEEE Sens J"},{"key":"705_CR4","doi-asserted-by":"crossref","unstructured":"Shu J, Zhou L, Zhang W, Du X, Guizani M (2020) Collaborative intrusion detection for vanets: a deep learning-based distributed sdn approach. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2020.3027390"},{"issue":"7","key":"705_CR5","doi-asserted-by":"publisher","first-page":"2707","DOI":"10.1109\/TITS.2019.2905415","volume":"21","author":"J Liang","year":"2019","unstructured":"Liang J, Lin Q, Chen J, Zhu Y (2019) A filter model based on hidden generalized mixture transition distribution model for intrusion detection system in vehicle ad hoc networks. IEEE Trans Intell Transp Syst 21(7):2707\u20132722","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"705_CR6","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.vehcom.2018.04.005","volume":"12","author":"S Sharma","year":"2018","unstructured":"Sharma S, Kaul A (2018) A survey on intrusion detection systems and honeypot based proactive security mechanisms in vanets and vanet cloud. Vehicular Commun 12:138\u2013164","journal-title":"Vehicular Commun"},{"key":"705_CR7","doi-asserted-by":"crossref","unstructured":"Latif S, Huma Z, Jamal SS, Ahmed F, Ahmad J, Zahid A, Dashtipour K, Aftab MU, Ahmad M, Abbasi QH (2021) Intrusion detection framework for the internet of things using a dense random neural network. IEEE Trans Ind Inf","DOI":"10.1109\/TII.2021.3130248"},{"key":"705_CR8","doi-asserted-by":"crossref","unstructured":"Khan MA, Khan KMA, Latif S, Shah AA, Rehman Mujeeb U, Boulila W, Driss M, Ahmad J (2020) Voting classifier-based intrusion detection for iot networks. In: Advances on Smart and Soft Computing, pp 313\u2013328, Springer","DOI":"10.1007\/978-981-16-5559-3_26"},{"key":"705_CR9","doi-asserted-by":"publisher","first-page":"9383","DOI":"10.1109\/ACCESS.2020.3046528","volume":"9","author":"A Shafique","year":"2020","unstructured":"Shafique A, Ahmed J, Boulila W, Ghandorh H, Ahmad J, Rehman MU (2020) Detecting the security level of various cryptosystems using machine learning models. IEEE Access 9:9383\u20139393","journal-title":"IEEE Access"},{"issue":"1","key":"705_CR10","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/TSIPN.2018.2801622","volume":"4","author":"T Zhang","year":"2018","unstructured":"Zhang T, Zhu Q (2018) Distributed privacy-preserving collaborative intrusion detection systems for vanets. IEEE Trans Signal Inf Process Over Netw 4(1):148\u2013161","journal-title":"IEEE Trans Signal Inf Process Over Netw"},{"issue":"3","key":"705_CR11","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MWC.001.2000428","volume":"28","author":"T Alladi","year":"2021","unstructured":"Alladi T, Kohli V, Chamola V, Yu FR, Guizani M (2021) Artificial intelligence (ai)-empowered intrusion detection architecture for the internet of vehicles. IEEE Wirel Commun 28(3):144\u2013149","journal-title":"IEEE Wirel Commun"},{"key":"705_CR12","doi-asserted-by":"crossref","unstructured":"Bangui H, Ge M, Buhnova B (2021) A hybrid machine learning model for intrusion detection in vanet. Computing, pp 1\u201329","DOI":"10.1016\/j.procs.2021.03.065"},{"key":"705_CR13","doi-asserted-by":"crossref","unstructured":"Raja G, Anbalagan S, Vijayaraghavan G, Theerthagiri S, Suryanarayan SV, Wu X-W (2020) Sp-cids: secure and private collaborative ids for vanets. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2020.3036071"},{"key":"705_CR14","doi-asserted-by":"crossref","unstructured":"Ashraf J, Bakhshi AD, Moustafa N, Khurshid H, Javed A, Beheshti A (2020) Novel deep learning-enabled lstm autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2020.3017882"},{"issue":"2","key":"705_CR15","doi-asserted-by":"publisher","first-page":"450","DOI":"10.3390\/s22020450","volume":"22","author":"HG Abreha","year":"2022","unstructured":"Abreha HG, Hayajneh M, Serhani MA (2022) Federated learning in edge computing: a systematic survey. Sensors 22(2):450","journal-title":"Sensors"},{"key":"705_CR16","doi-asserted-by":"crossref","unstructured":"Hu K, Li Y, Xia M, Wu J, Lu M, Zhang S, Weng L (2021) Federated learning: a distributed shared machine learning method. Complexity","DOI":"10.1155\/2021\/8261663"},{"key":"705_CR17","doi-asserted-by":"crossref","unstructured":"Li L, Fan Y, Tse M, Lin K-Y (2020) A review of applications in federated learning. Comput Ind Eng, pp 106854","DOI":"10.1016\/j.cie.2020.106854"},{"key":"705_CR18","doi-asserted-by":"crossref","unstructured":"Mothukuri V, Khare P, Reza MP, Seyedamin P, Ali D, Gautam S (2021) Federated learning-based anomaly detection for iot security attacks. IEEE Int Things J","DOI":"10.1109\/JIOT.2021.3077803"},{"issue":"11","key":"705_CR19","doi-asserted-by":"publisher","first-page":"1900","DOI":"10.1109\/JSEN.2008.2006452","volume":"8","author":"WJ Fleming","year":"2008","unstructured":"Fleming WJ (2008) New automotive sensors-a review. IEEE Sens J 8(11):1900\u20131921","journal-title":"IEEE Sens J"},{"issue":"8","key":"705_CR20","first-page":"109","volume":"24","author":"C Yan","year":"2016","unstructured":"Yan C, Wenyuan X, Liu J (2016) Can you trust autonomous vehicles: contactless attacks against sensors of self-driving vehicle. Def Con 24(8):109","journal-title":"Def Con"},{"issue":"11","key":"705_CR21","doi-asserted-by":"publisher","first-page":"2898","DOI":"10.1109\/TITS.2017.2665968","volume":"18","author":"S Parkinson","year":"2017","unstructured":"Parkinson S, Ward P, Wilson K, Miller J (2017) Cyber threats facing autonomous and connected vehicles: future challenges. IEEE Trans Intell Transp Syst 18(11):2898\u20132915","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"6","key":"705_CR22","doi-asserted-by":"publisher","first-page":"5015","DOI":"10.1109\/JIOT.2018.2867917","volume":"5","author":"X Wenyuan","year":"2018","unstructured":"Wenyuan X, Yan C, Jia W, Ji X, Liu J (2018) Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles. IEEE Int Things J 5(6):5015\u20135029","journal-title":"IEEE Int Things J"},{"issue":"2015","key":"705_CR23","first-page":"995","volume":"11","author":"J Petit","year":"2015","unstructured":"Petit J, Stottelaar B, Feiri M, Kargl F (2015) Remote attacks on automated vehicles sensors: experiments on camera and lidar. Black Hat Eur 11(2015):995","journal-title":"Black Hat Eur"},{"issue":"1","key":"705_CR24","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MTS.2018.2795093","volume":"37","author":"Y Takefuji","year":"2018","unstructured":"Takefuji Y (2018) Connected vehicle security vulnerabilities [commentary]. IEEE Technol Soc Mag 37(1):15\u201318","journal-title":"IEEE Technol Soc Mag"},{"key":"705_CR25","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.trc.2014.06.007","volume":"46","author":"E Levenberg","year":"2014","unstructured":"Levenberg E (2014) Estimating vehicle speed with embedded inertial sensors. Transp Res Part C: Emerg Technol 46:300\u2013308","journal-title":"Transp Res Part C: Emerg Technol"},{"key":"705_CR26","doi-asserted-by":"crossref","unstructured":"Shoukry Y, Martin P, Yona Y, Diggavi S, Srivastava M (2015) Pycra: physical challenge-response authentication for active sensors under spoofing attacks. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 1004\u20131015","DOI":"10.1145\/2810103.2813679"},{"key":"705_CR27","unstructured":"Rouf I, Miller RD, Mustafa HA, Taylor T, Oh S, Xu W, Gruteser M, Trappe W, Seskar I (2010) Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In USENIX security symposium, vol\u00a010"},{"key":"705_CR28","doi-asserted-by":"crossref","unstructured":"Rehman S, Khaliq M, Imtiaz SI, Rasool A, Shafiq M, Javed AR, Jalil Z, Ali KB (2021) Diddos: An approach for detection and identification of distributed denial of service (ddos) cyberattacks using gated recurrent units (gru). Fut Gen Comput Syst 118:453\u2013466","DOI":"10.1016\/j.future.2021.01.022"},{"key":"705_CR29","doi-asserted-by":"crossref","unstructured":"Boulila W, Ghandorh H, Khan MA, Ahmed F, Ahmad J(2021) A novel cnn-lstm-based approach to predict urban expansion. Ecol Inf pp 101325","DOI":"10.1016\/j.ecoinf.2021.101325"},{"issue":"1","key":"705_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s44196-021-00047-4","volume":"14","author":"Md Al-Imran","year":"2021","unstructured":"Al-Imran Md, Ripon SH (2021) Network intrusion detection: an analytical assessment using deep learning and state-of-the-art machine learning models. Int J Comput Intell Syst 14(1):1\u201320","journal-title":"Int J Comput Intell Syst"},{"issue":"8","key":"705_CR31","doi-asserted-by":"publisher","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","volume":"17","author":"B Li","year":"2020","unstructured":"Li B, Yuhao W, Song J, Rongxing L, Li T, Zhao L (2020) Deepfed: federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans Ind Inf 17(8):5615\u20135624","journal-title":"IEEE Trans Ind Inf"},{"key":"705_CR32","doi-asserted-by":"crossref","unstructured":"Zhou Z-H (2021) Ensemble learning. In: Machine learning, Springer, New York, pp 181\u2013210","DOI":"10.1007\/978-981-15-1967-3_8"},{"key":"705_CR33","doi-asserted-by":"crossref","unstructured":"Abbas A, Khan MA, Latif S, Ajaz M, Shah AA, Ahmad J (2021) A new ensemble-based intrusion detection system for internet of things. Arab J Sci Eng pp 1\u201315","DOI":"10.1007\/s13369-021-06086-5"},{"key":"705_CR34","doi-asserted-by":"crossref","unstructured":"Kang H, Kwak BI, Lee YH, Lee H, Lee H, Kim HK (2021) Car hacking and defense competition on in-vehicle network. In: Workshop on automotive and autonomous vehicle security (AutoSec) vol 2021, pp 25","DOI":"10.14722\/autosec.2021.23035"},{"key":"705_CR35","doi-asserted-by":"crossref","unstructured":"Seo E, Song HM, Kim HK (2018) Gids: gan based intrusion detection system for in-vehicle network. pp 1\u20136","DOI":"10.1109\/PST.2018.8514157"},{"key":"705_CR36","doi-asserted-by":"publisher","first-page":"55595","DOI":"10.1109\/ACCESS.2021.3071766","volume":"9","author":"ZE Huma","year":"2021","unstructured":"Huma ZE, Latif S, Ahmad J, Idrees Z, Ibrar A, Zou Z, Alqahtani F, Baothman F (2021) A hybrid deep random neural network for cyberattack detection in the industrial internet of things. IEEE Access 9:55595\u201355605","journal-title":"IEEE Access"},{"key":"705_CR37","doi-asserted-by":"publisher","first-page":"101933","DOI":"10.1016\/j.mtcomm.2020.101933","volume":"26","author":"S Verma","year":"2021","unstructured":"Verma S, Misra JP, Singh J, Batra U, Kumar Y (2021) Prediction of tensile behavior of fs welded aa7039 using machine learning. Mater Today Commun 26:101933","journal-title":"Mater Today Commun"},{"issue":"5","key":"705_CR38","doi-asserted-by":"publisher","first-page":"5104","DOI":"10.1007\/s11227-020-03467-9","volume":"77","author":"R AlGhamdi","year":"2021","unstructured":"AlGhamdi R, Aziz A, Alshehri M, Pardasani KR, Aziz T (2021) Deep learning model with ensemble techniques to compute the secondary structure of proteins. J Supercomput 77(5):5104\u20135119","journal-title":"J Supercomput"},{"key":"705_CR39","doi-asserted-by":"publisher","first-page":"89337","DOI":"10.1109\/ACCESS.2020.2994079","volume":"8","author":"S Latif","year":"2020","unstructured":"Latif S, Zou Z, Idrees Z, Ahmad J (2020) A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 8:89337\u201389350","journal-title":"IEEE Access"},{"key":"705_CR40","doi-asserted-by":"crossref","unstructured":"Boulila W, Driss M, Alshanqiti E, Al-Sarem M, Saeed F, Krichen M (2022) Weight initialization techniques for deep learning algorithms in remote sensing: Recent trends and future perspectives. Adv Smart Soft Comput, pp 477\u2013484","DOI":"10.1007\/978-981-16-5559-3_39"},{"key":"705_CR41","doi-asserted-by":"crossref","unstructured":"Abdel-Basset M, Moustafa N, Hawash H, Razzak I, Sallam KM, Elkomy OM (2021) Federated intrusion detection in blockchain-based smart transportation systems. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2021.3119968"},{"key":"705_CR42","doi-asserted-by":"crossref","unstructured":"Khan IA, Moustafa N, Pi D, Haider W, Li B, Jolfaei A (2021) An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2021.3105834"},{"issue":"2","key":"705_CR43","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/TVT.2021.3051026","volume":"70","author":"HM Song","year":"2021","unstructured":"Song HM, Kim HK (2021) Self-supervised anomaly detection for in-vehicle network using noised pseudo normal data. IEEE Trans Veh Technol 70(2):1098\u20131108","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"705_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2020.2993522","volume":"4","author":"Z Khan","year":"2020","unstructured":"Khan Z, Chowdhury M, Islam M, Huang C-Y, Rahman M (2020) Long short-term memory neural network-based attack detection model for in-vehicle network security. IEEE Sens Lett 4(6):1\u20134","journal-title":"IEEE Sens Lett"},{"key":"705_CR45","doi-asserted-by":"crossref","unstructured":"Roscher R, Bohn B, Duarte MF, Garcke J (2020) Explainable machine learning for scientific insights and discoveries. IEEE Access 8:42200\u201342216","DOI":"10.1109\/ACCESS.2020.2976199"},{"key":"705_CR46","doi-asserted-by":"crossref","unstructured":"Driss M (2021) Ws-advising: a reusable and reconfigurable microservices-based platform for effective academic advising. J Ambient Intell Hum Comput pp 1\u201312","DOI":"10.1007\/s12652-021-02901-x"},{"key":"705_CR47","doi-asserted-by":"crossref","unstructured":"Driss M, Hasan D, Boulila W, Ahmad J (2021) Microservices in iot security: current solutions, research challenges, and future directions. Procedia Comput Sci 192:2385\u20132395. Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES2021","DOI":"10.1016\/j.procs.2021.09.007"},{"key":"705_CR48","doi-asserted-by":"crossref","unstructured":"Driss M, Atitallah SB, Albalawi A, Boulila W (2021) Req-wscomposer: a novel platform for requirements-driven composition of semantic web services. J Ambient Intell Hum Comput pp 1\u201317","DOI":"10.1007\/s12652-021-02938-y"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00705-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00705-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00705-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T13:54:13Z","timestamp":1664286853000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00705-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,24]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["705"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00705-w","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,24]]},"assertion":[{"value":"11 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Prince Sultan University.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}}]}}