{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:10:06Z","timestamp":1759147806320,"version":"3.44.0"},"reference-count":36,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:00:00Z","timestamp":1758844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62562006"],"award-info":[{"award-number":["62562006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100012547","name":"Natural Science Foundation of Guangxi Zhuang Autonomous Region","doi-asserted-by":"crossref","award":["2024GXNSFAA010242"],"award-info":[{"award-number":["2024GXNSFAA010242"]}],"id":[{"id":"10.13039\/100012547","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangxi Education Department Program","award":["2025KY0343"],"award-info":[{"award-number":["2025KY0343"]}]},{"name":"Guangxi Key Research and Development Program Projects","award":["GuiKe AB24010309"],"award-info":[{"award-number":["GuiKe AB24010309"]}]}],"content-domain":{"domain":["www.mdpi.com"],"crossmark-restriction":true},"short-container-title":["BDCC"],"abstract":"<jats:p>With the rapid development of intelligent connected vehicle technology, false data injection (FDI) attacks have become a major challenge in the Internet of Vehicles (IoV). While deep learning methods can effectively identify such attacks, the dynamic, distributed architecture of the IoV and limited computing resources hinder both privacy protection and lightweight computation. To address this, we propose FedIFD, a federated learning (FL)-based detection method for false data injection attacks. The lightweight threat detection model utilizes basic safety messages (BSM) for local incremental training, and the Q-FedCG algorithm compresses gradients for global aggregation. Original features are reshaped using a time window. To ensure temporal and spatial consistency, a sliding average strategy aligns samples before spatial feature extraction. A dual-branch architecture enables parallel extraction of spatiotemporal features: a three-layer stacked Bidirectional Long Short-Term Memory (BiLSTM) captures temporal dependencies, and a lightweight Transformer models spatial relationships. A dynamic feature fusion weight matrix calculates attention scores for adaptive feature weighting. Finally, a differentiated pooling strategy is applied to emphasize critical features. Experiments on the VeReMi dataset show that the accuracy reaches 97.8%.<\/jats:p>","DOI":"10.3390\/bdcc9100246","type":"journal-article","created":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T14:50:38Z","timestamp":1758898238000},"page":"246","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FedIFD: Identifying False Data Injection Attacks in Internet of Vehicles Based on Federated Learning"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9688-6242","authenticated-orcid":false,"given":"Huan","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Guangxi University of Science and Technology, Liuzhou 545006, China"},{"name":"Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing, Guangxi University of Science and Technology, Liuzhou 545006, China"},{"name":"Cybersecurity Monitoring Center for Guangxi Education System, Liuzhou 545006, China"}]},{"given":"Junying","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Guangxi University of Science and Technology, Liuzhou 545006, China"},{"name":"Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing, Guangxi University of Science and Technology, Liuzhou 545006, China"},{"name":"Cybersecurity Monitoring Center for Guangxi Education System, Liuzhou 545006, China"}]},{"given":"Jing","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Guangxi University of Science and Technology, Liuzhou 545006, China"},{"name":"Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing, Guangxi University of Science and Technology, Liuzhou 545006, China"},{"name":"Cybersecurity Monitoring Center for Guangxi Education System, Liuzhou 545006, China"}]},{"given":"Zhe","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Guangxi University of Science and Technology, Liuzhou 545006, China"},{"name":"Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing, Guangxi University of Science and Technology, Liuzhou 545006, China"},{"name":"Cybersecurity Monitoring Center for Guangxi Education System, Liuzhou 545006, China"}]},{"given":"Qingzheng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Guangxi University of Science and Technology, Liuzhou 545006, China"},{"name":"Guangxi Colleges and Universities Key Laboratory of Intelligent Computing and Distributed Information Processing, Guangxi University of Science and Technology, Liuzhou 545006, China"},{"name":"Cybersecurity Monitoring Center for Guangxi Education System, Liuzhou 545006, China"}]},{"given":"Shaoxuan","family":"Luo","sequence":"additional","affiliation":[{"name":"Liuzhou Huating New Energy Technology Co., Ltd., Liuzhou 545006, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"8692","DOI":"10.1109\/TITS.2021.3085196","article-title":"False data injection attack in a platoon of CACC: Real-time detection and isolation with a PDE approach","volume":"23","author":"Biroon","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_2","first-page":"23","article-title":"Resilient self-triggered model predictive control of discrete-time nonlinear cyberphysical systems against false data injection attacks","volume":"16","author":"He","year":"2023","journal-title":"IEEE Intell. Transp. Syst. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3310","DOI":"10.1109\/JIOT.2020.2967568","article-title":"MARINE: Man-in-the-middle attack resistant trust model in connected vehicles","volume":"7","author":"Ahmad","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"107744","DOI":"10.1016\/j.comnet.2020.107744","article-title":"Convolutional Neural Networks for forecasting flood process in Internet-of-Things enabled smart city","volume":"186","author":"Chen","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"87535","DOI":"10.1109\/ACCESS.2022.3199689","article-title":"A comprehensive review on artificial intelligence\/machine learning algorithms for empowering the future IoT toward 6G era","volume":"10","author":"Mahmood","year":"2022","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1186\/s40537-021-00448-4","article-title":"Intrusion detection systems using long short-term memory (LSTM)","volume":"8","author":"Laghrissi","year":"2021","journal-title":"J. Big Data"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.future.2020.07.042","article-title":"Genetic convolutional neural network for intrusion detection systems","volume":"113","author":"Nguyen","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"110560","DOI":"10.1016\/j.comnet.2024.110560","article-title":"Private and utility enhanced intrusion detection based on attack behavior analysis with local differential privacy on IoV","volume":"250","author":"Chen","year":"2024","journal-title":"Comput. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"22386","DOI":"10.1109\/TITS.2021.3102983","article-title":"Learning dynamic and hierarchical traffic spatiotemporal features with transformer","volume":"23","author":"Yan","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/TIFS.2022.3158062","article-title":"Learning multi-granularity temporal characteristics for face anti-spoofing","volume":"17","author":"Wang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"100809","DOI":"10.1016\/j.iot.2023.100809","article-title":"Security issues in Internet of Vehicles (IoV): A comprehensive survey","volume":"22","author":"Taslimasa","year":"2023","journal-title":"Internet Things"},{"key":"ref_12","first-page":"2016","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council","volume":"679","author":"Regulation","year":"2016","journal-title":"Regulation"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Qiu, M., Zhu, D., Xue, Z., Xiong, J., and Liu, M. (2019, January 27\u201329). DeepVCM: A deep learning based intrusion detection method in VANET. Proceedings of the 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Washington DC, USA.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00060"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"105881","DOI":"10.1016\/j.engappai.2023.105881","article-title":"Privacy enabled driver behavior analysis in heterogeneous IoV using federated learning","volume":"120","author":"Chhabra","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"105380","DOI":"10.1016\/j.engappai.2022.105380","article-title":"A misbehavior detection system to detect novel position falsification attacks in the internet of vehicles","volume":"116","author":"Ilango","year":"2022","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.icte.2022.06.003","article-title":"Novel hyper-tuned ensemble random forest algorithm for the detection of false basic safety messages in internet of vehicles","volume":"9","author":"Anyanwu","year":"2023","journal-title":"ICT Express"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"4275","DOI":"10.1109\/TVT.2019.2907269","article-title":"Mobile edge assisted literal multi-dimensional anomaly detection of in-vehicle network using LSTM","volume":"68","author":"Zhu","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/s10207-022-00632-4","article-title":"An intrusion detection approach based on incremental long short-term memory","volume":"22","author":"Zhou","year":"2023","journal-title":"Int. J. Inf. Secur."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"116740","DOI":"10.1016\/j.measurement.2025.116740","article-title":"Cyber-attack detection for lateral control system of cloud-based intelligent connected vehicle based on BiLSTM-Attention network","volume":"247","author":"He","year":"2025","journal-title":"Measurement"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"55389","DOI":"10.1109\/ACCESS.2023.3282110","article-title":"Transformer-based attention network for in-vehicle intrusion detection","volume":"11","author":"Nguyen","year":"2023","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"11534","DOI":"10.1109\/TITS.2024.3369974","article-title":"Malicious Vehicle Detection Scheme Based on Spatio-Temporal Features of Traffic Flow Under Cloud-Fog Computing-Based IoVs","volume":"25","author":"Gu","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"121706","DOI":"10.1016\/j.eswa.2023.121706","article-title":"Detection of false data injection attack in power grid based on spatial-temporal transformer network","volume":"238","author":"Li","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"9532","DOI":"10.1002\/int.23012","article-title":"STC-IDS: Spatial\u2013temporal correlation feature analyzing based intrusion detection system for intelligent connected vehicles","volume":"37","author":"Cheng","year":"2022","journal-title":"Int. J. Intell. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Xing, L., Wang, K., Wu, H., Ma, H., and Zhang, X. (2023). Intrusion detection method for internet of vehicles based on parallel analysis of spatio-temporal features. Sensors, 23.","DOI":"10.3390\/s23094399"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Uprety, A., Rawat, D.B., and Li, J. (2021, January 9\u201312). Privacy preserving misbehavior detection in IoV using federated machine learning. Proceedings of the 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC49032.2021.9369513"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3936","DOI":"10.1109\/TNSM.2022.3220779","article-title":"Misbehavior detection in vehicular ad hoc networks based on privacy-preserving federated learning and blockchain","volume":"19","author":"Lv","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Bonfim, K.A., Dutra, F.D.S., Siqueira, C.E.T., Meneguette, R.I., Dos Santos, A.L., and J\u00fanior, L.A.P. (2023, January 20\u201323). Federated learning-based architecture for detecting position spoofing in basic safety messages. Proceedings of the 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), Florence, Italy.","DOI":"10.1109\/VTC2023-Spring57618.2023.10199980"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"106612","DOI":"10.1016\/j.engappai.2023.106612","article-title":"Train a central traffic prediction model using local data: A spatio-temporal network based on federated learning","volume":"125","author":"Huang","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"8738","DOI":"10.1109\/TITS.2022.3157056","article-title":"Fedstn: Graph representation driven federated learning for edge computing enabled urban traffic flow prediction","volume":"24","author":"Yuan","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"8945","DOI":"10.1109\/TMC.2025.3559066","article-title":"FedSTDN: A Federated Learning-Enabled Spatial-Temporal Prediction Model for Wireless Traffic Prediction","volume":"24","author":"Li","year":"2025","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"97194","DOI":"10.1109\/ACCESS.2025.3575849","article-title":"Spatial-temporal cooperative in-vehicle network intrusion detection method based on federated learning","volume":"13","author":"Tao","year":"2025","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"5446","DOI":"10.1109\/TMC.2023.3309497","article-title":"Federated learning with client selection and gradient compression in heterogeneous edge systems","volume":"23","author":"Xu","year":"2023","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Van Der Heijden, R.W., Lukaseder, T., and Kargl, F. (2018, January 8\u201310). Veremi: A dataset for comparable evaluation of misbehavior detection in vanets. Proceedings of the Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore. Proceedings, Part I.","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"103677","DOI":"10.1016\/j.adhoc.2024.103677","article-title":"A distributed intrusion detection framework for vehicular ad hoc networks via federated learning and blockchain","volume":"167","author":"Mansouri","year":"2025","journal-title":"Ad Hoc Netw."},{"key":"ref_35","unstructured":"Ahsan, S.I., Legg, P., and Alam, S. (2024). Privacy-preserving intrusion detection in software-defined VANET using federated learning with BERT. arXiv."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"101127","DOI":"10.1016\/j.iot.2024.101127","article-title":"Misbehavior detection in intelligent transportation systems based on federated learning","volume":"25","author":"Campos","year":"2024","journal-title":"Internt Things"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/10\/246\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:57:23Z","timestamp":1759147043000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/10\/246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,26]]},"references-count":36,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["bdcc9100246"],"URL":"https:\/\/doi.org\/10.3390\/bdcc9100246","relation":{},"ISSN":["2504-2289"],"issn-type":[{"type":"electronic","value":"2504-2289"}],"subject":[],"published":{"date-parts":[[2025,9,26]]}}}