{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:50:00Z","timestamp":1778169000425,"version":"3.51.4"},"reference-count":57,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T00:00:00Z","timestamp":1681776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Deputyship for Research &amp; Innovation, Ministry of Education in Saudi Arabia","award":["INST047"],"award-info":[{"award-number":["INST047"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Connected and autonomous vehicles (CAVs) present exciting opportunities for the improvement of both the mobility of people and the efficiency of transportation systems. The small computers in autonomous vehicles (CAVs) are referred to as electronic control units (ECUs) and are often perceived as being a component of a broader cyber\u2013physical system. Subsystems of ECUs are often networked together via a variety of in-vehicle networks (IVNs) so that data may be exchanged, and the vehicle can operate more efficiently. The purpose of this work is to explore the use of machine learning and deep learning methods in defence against cyber threats to autonomous cars. Our primary emphasis is on identifying erroneous information implanted in the data buses of various automobiles. In order to categorise this type of erroneous data, the gradient boosting method is used, providing a productive illustration of machine learning. To examine the performance of the proposed model, two real datasets, namely the Car-Hacking and UNSE-NB15 datasets, were used. Real automated vehicle network datasets were used in the verification process of the proposed security solution. These datasets included spoofing, flooding and replay attacks, as well as benign packets. The categorical data were transformed into numerical form via pre-processing. Machine learning and deep learning algorithms, namely k-nearest neighbour (KNN) and decision trees, long short-term memory (LSTM), and deep autoencoders, were employed to detect CAN attacks. According to the findings of the experiments, using the decision tree and KNN algorithms as machine learning approaches resulted in accuracy levels of 98.80% and 99%, respectively. On the other hand, the use of LSTM and deep autoencoder algorithms as deep learning approaches resulted in accuracy levels of 96% and 99.98%, respectively. The maximum accuracy was achieved when using the decision tree and deep autoencoder algorithms. Statistical analysis methods were used to analyse the results of the classification algorithms, and the determination coefficient measurement for the deep autoencoder was found to reach a value of R2 = 95%. The performance of all of the models that were built in this way surpassed that of those already in use, with almost perfect levels of accuracy being achieved. The system developed is able to overcome security issues in IVNs.<\/jats:p>","DOI":"10.3390\/s23084086","type":"journal-article","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T01:39:05Z","timestamp":1681868345000},"page":"4086","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3723-4532","authenticated-orcid":false,"given":"Fawaz Waselallah","family":"Alsaade","sequence":"first","affiliation":[{"name":"College of Computer Science and Information Technology, King Faisal University, P.O. Box 4000, Al-Ahsa 7057, Saudia Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3519-1121","authenticated-orcid":false,"given":"Mosleh Hmoud","family":"Al-Adhaileh","sequence":"additional","affiliation":[{"name":"Deanship of E-Learning and Distance Education, King Faisal University Saudi Arabia, P.O. Box 4000, Al-Ahsa 7057, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1177\/0739456X15613591","article-title":"Planning for cars that drive themselves: Metropolitan Planning Organizations, regional transportation plans, and autonomous vehicles","volume":"36","author":"Guerra","year":"2016","journal-title":"J. Plan. Educ. Res."},{"key":"ref_2","unstructured":"Gov.UK (2022, December 21). Center for Connected and Autonomous Vehicles, Available online: https:\/\/www.gov.uk\/government\/organisations\/centre-for-connected-and-autonomous-vehicles."},{"key":"ref_3","unstructured":"(2023, January 20). Connected and Autonomous Vehicle Research and Development Projects, Available online: https:\/\/www.gov.uk\/government\/publications\/connected-and-autonomous-vehicle-research-and-development-projects."},{"key":"ref_4","unstructured":"(2023, January 15). Connected and Autonomous Vehicles: The Future?. Available online: https:\/\/publications.parliament.uk\/pa\/ld201617\/ldselect\/ldsctech\/115\/115.pdf."},{"key":"ref_5","unstructured":"(2023, January 25). Connected and Autonomous Vehicles Bsi Group. Available online: https:\/\/www.bsigroup.com\/en-GB\/Innovation\/cav\/."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"9151","DOI":"10.1109\/TVT.2019.2929419","article-title":"Tree-based intermittent connection fault diagnosis for controller area network","volume":"68","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MCE.2020.3024512","article-title":"Artificially Intelligent Electronic Money","volume":"10","author":"Fragkos","year":"2021","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"13450","DOI":"10.1109\/TVT.2020.3028880","article-title":"Securing SOME\/IP for in-vehicle service protection","volume":"69","author":"Iorio","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"4757","DOI":"10.1109\/TVT.2018.2810232","article-title":"Identifying ecus using inimitable characteristics of signals in controller area networks","volume":"67","author":"Choi","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"13916","DOI":"10.1109\/TVT.2020.3016352","article-title":"CNN-based adaptive source node identifier for controller area network (CAN)","volume":"69","author":"Jeong","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"5244","DOI":"10.1109\/TVT.2021.3061746","article-title":"Security enhancement for real-time independent in-vehicle CAN-FD messages in vehicular networks","volume":"70","author":"Xie","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_12","first-page":"562","article-title":"Cache agent-based geocasting in VANETs","volume":"7","author":"Kaiwartya","year":"2015","journal-title":"Int. J. Inf. Commun. Technol."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"185489","DOI":"10.1109\/ACCESS.2020.3029307","article-title":"LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications","volume":"8","author":"Hossain","year":"2020","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1162\/neco_a_01199","article-title":"A Review of Recurrent Neural Networks: LSTM Cells and Network Architectures","volume":"31","author":"Yu","year":"2019","journal-title":"Neural Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1109\/TNSE.2021.3059881","article-title":"Canintelliids: Detecting In-vehicle Intrusion Attacks on A Controller Area Network Using CNN and Attention-based GRU","volume":"8","author":"Rehman","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Qassim, H., Verma, A., and Feinzimer, D. (2018, January 8\u201310). Compressed Residual-VGG16 CNN Model for Big Data Places Image Recognition. Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2018.8301729"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1038\/s41467-020-20719-7","article-title":"An Optical Neural Chip for Implementing Complex-valued Neural Network","volume":"12","author":"Zhang","year":"2021","journal-title":"Nat. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1038\/s41467-022-28702-0","article-title":"Space-efficient Optical Computing with an Integrated Chip Diffractive Neural Network","volume":"13","author":"Zhu","year":"2022","journal-title":"Nat. Commun."},{"key":"ref_19","unstructured":"(2019). Autonomous Vehicles|Self-Driving Vehicles Enacted Legislation, NCSL."},{"key":"ref_20","unstructured":"Madrigal, A.C. (The Atlantic, 2017). Inside Waymo\u2019s Secret World for Training Self-Driving Cars, The Atlantic."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Dikmen, M., and Burns, C.M. (2016, January 24\u201326). Autonomous driving in the real world: Experiences with tesla autopilot and summon. Proceedings of the 8th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, Ann Arbor, MI, USA.","DOI":"10.1145\/3003715.3005465"},{"key":"ref_22","unstructured":"Eustice, R. (2015). University of Michigan\u2019s Work Toward Autonomous Cars, Technical Report; University of Michigan."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.tra.2015.04.003","article-title":"Preparing a nation for autonomous vehicles: Opportunities, barriers and policy recommendations","volume":"77","author":"Fagnant","year":"2015","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1016\/j.procs.2020.10.062","article-title":"Deep Real-Time Anomaly Detection for Connected Autonomous Vehicles","volume":"177","author":"Oucheikh","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_25","first-page":"759125","article-title":"A Literature Review of Performance Metrics of Automated Driving Systems for On-Road Vehicles","volume":"2","author":"Narasimhamurthy","year":"2021","journal-title":"Front. Future Transp. Sec. Connect. Mobil. Autom."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"106717","DOI":"10.1016\/j.compeleceng.2020.106717","article-title":"Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review","volume":"86","author":"Gupta","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1007\/s42452-020-03559-4","article-title":"Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge","volume":"2","author":"Radanliev","year":"2020","journal-title":"SN Appl. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"102150","DOI":"10.1016\/j.cose.2020.102150","article-title":"Cybersecurity for autonomous vehicles: Review of attacks and defense","volume":"103","author":"Kim","year":"2021","journal-title":"Comput. Sec."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"6240","DOI":"10.1109\/TITS.2021.3085297","article-title":"A survey on cyber-security of connected and autonomous vehicles (CAVs)","volume":"23","author":"Sun","year":"2021","journal-title":"IEEE Trans. Intell. Transport. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"7572","DOI":"10.1109\/JIOT.2021.3130054","article-title":"Autonomous driving Security: State of the art and challenges","volume":"9","author":"Gao","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_31","unstructured":"Chow, M.C., Ma, M., and Pan, Z. (2021). Internet of Things, Springer."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/978-3-030-63339-4_7","article-title":"Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication","volume":"332","author":"Nguyen","year":"2021","journal-title":"Stud. Syst. Decis. Control."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s10207-021-00545-8","article-title":"Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations","volume":"21","author":"Yaacoub","year":"2022","journal-title":"Int. J. Inf. Secur."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3474552","article-title":"MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures","volume":"54","author":"Ranaweera","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Campisi, T., Severino, A., Al-Rashid, M., and Pau, G. (2021). The development of the smart cities in the connected and autonomous vehicles (CAVs) era: From mobility patterns to scaling in cities. Infrastructures, 6.","DOI":"10.3390\/infrastructures6070100"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1177\/0047287521993578","article-title":"Customer acceptance of autonomous vehicles in travel and tourism","volume":"61","author":"Ribeiro","year":"2022","journal-title":"J. Travel Res."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"102996","DOI":"10.1016\/j.cities.2020.102996","article-title":"Planning the Transition to Autonomous Driving: A Policy Pathway Towards Urban Liveability","volume":"108","author":"Brovarone","year":"2021","journal-title":"Cities"},{"key":"ref_38","unstructured":"Aldakkhelallah, A., and Simic, M. (2021). Smart Innovation, Systems and Technologies, Springer."},{"key":"ref_39","unstructured":"Thayananthan, V. (2023, January 15). Advanced Security Issues of IoT based 5G Plus Wireless Communication for Industry 4.0. ISBN 978-1-53615-538-9. Available online: https:\/\/novapublishers.com\/shop\/advanced-security-issues-of-iot-based-5g-plus-wireless-communication-for-industry-4-0\/."},{"key":"ref_40","unstructured":"Shaikh, R.A., and Thayananthan, V. (2019). Trust Evaluation Wireless Network for Routing Data Packets. (10225708B2), U.S. Patent, Available online: https:\/\/patents.google.com\/patent\/US10225708B2."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Algarni, A., and Thayananthan, V. (2021). Improvement of 5G transportation services with SDN-based security solutions and beyond 5G. Electronics, 10.","DOI":"10.3390\/electronics10202490"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Shaikh, R.A., and Thayananthan, V. (2019). Risk-based decision methods for vehicular networks. Electronics, 8.","DOI":"10.3390\/electronics8060627"},{"key":"ref_43","unstructured":"Thayananthan, V., and Yazdani, J. (2019). Secure Cyber-Physical Systems for Smart Cities, Advances in Computer and Electrical Engineering; IGI Global."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MCE.2022.3154346","article-title":"Roadmap for Cybersecurity in Autonomous Vehicles","volume":"11","author":"Kukkala","year":"2022","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"He, H., Gray, J., Cangelosi, A., Meng, Q., McGinnity, T., and Mehnen, J. (2020, January 10\u201312). The challenges and opportunities of artificial intelligence in implementing trustworthy robotics and autonomous systems. Proceedings of the 3rd International Conference on Intelligent Robotic and Control Engineering, Oxford, UK.","DOI":"10.1109\/IRCE50905.2020.9199244"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Panda, S., Rass, S., Moschoyiannis, S., Liang, K., Loukas, G., and Panaousis, E. (2021). HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. arXiv.","DOI":"10.1109\/ACCESS.2022.3210117"},{"key":"ref_47","unstructured":"Basnet, M., and Ali, M. (2021). A Deep Learning Perspective on Connected Automated Vehicle (CAV) Cybersecurity and Threat Intelligence. arXiv."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"8868355","DOI":"10.1155\/2021\/8868355","article-title":"Machine learning technologies for secure vehicular communication in internet of vehicles: Recent advances and applications","volume":"2021","author":"Ali","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Liu, W., Xu, X., Qi, L., Zhang, X., and Dou, W. (2021, January 5\u201310). GoDeep: Intelligent IoV Service Deployment and Execution with Privacy Preservation in Cloud-edge Computing. Proceedings of the 2021 IEEE International Conference on Web Services (ICWS), Chicago, IL, USA.","DOI":"10.1109\/ICWS53863.2021.00079"},{"key":"ref_50","unstructured":"Mohseni, S., Pitale, M., Singh, V., and Wang, Z. (2019). Practical solutions for machine learning safety in autonomous vehicles. arXiv."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"4507","DOI":"10.1109\/TITS.2020.3017882","article-title":"Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events from Intelligent Transportation Systems","volume":"22","author":"Ashraf","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Aldhyani, T.H.H., and Alkahtani, H. (2022). Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity. Sensors, 22.","DOI":"10.3390\/s22010360"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Alkahtani, H., and Aldhyani, T.H.H. (2022). Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices. Sensors, 22.","DOI":"10.3390\/s22062268"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Alkahtani, H., and Aldhyani, T.H.H. (2022). Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems. Electronics, 11.","DOI":"10.3390\/electronics11111717"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"4275","DOI":"10.1109\/TVT.2019.2907269","article-title":"Mobile Edge Assisted Literal Multi-Dimensional Anomaly Detection of In-Vehicle Network Using LSTM","volume":"68","author":"Zhu","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Yang, Y., Duan, Z., and Tehranipoor, M. (2020). Identify a Spoofing Attack on an In-Vehicle CAN Bus Based on the Deep Features of an ECU Fingerprint Signal. Smart Cities, 3.","DOI":"10.3390\/smartcities3010002"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"127580","DOI":"10.1109\/ACCESS.2019.2937576","article-title":"An Intelligent Secured Framework for Cyberattack Detection in Electric Vehicles\u2019 CAN Bus Using Machine Learning","volume":"7","author":"Avatefipour","year":"2019","journal-title":"IEEE Access"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/8\/4086\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:18:32Z","timestamp":1760123912000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/8\/4086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,18]]},"references-count":57,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2023,4]]}},"alternative-id":["s23084086"],"URL":"https:\/\/doi.org\/10.3390\/s23084086","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,18]]}}}