Logo PTI Logo FedCSIS

Communication Papers of the 18th Conference on Computer Science and Intelligence Systems

Annals of Computer Science and Information Systems, Volume 37

To propose an attack detection model for enhancing the security of 5G-enabled Vehicle-to-Everything (V2X) communication for smart vehicle


DOI: http://dx.doi.org/10.15439/2023F7757

Citation: Communication Papers of the 18th Conference on Computer Science and Intelligence Systems, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 37, pages 235242 ()

Full text

Abstract. The evolution of 5G technology has revolutionized the communication landscape, enabling faster speeds, low latency, and increased capacity. The integration of 5G technology and the emergence of the 5G-enabled V2X communication network are driving the transformation of the automotive industry. Connected cars and the software-defined vehicle concept enable new business models and enhanced safety measures. However, ensuring the security of the 5G-enabled V2X communication network is crucial to mitigate potential attacks and protect the integrity of the ecosystem. To identify this potential attack, we have proposed a novel deep learning-based attack detection model (ADM) for detecting attack in 5G-enabled V2X communication network. In this we have used correlation coefficient as the feature selection method and used the deep learning-based stacked LSTM model for attack detection. The performance metrices are detection rate, accuracy, precision and F1-score


  1. 5G Connected Cars Changing Automotive Experiences - Ericsson, www.ericsson.com/en/blog/2021/10/powering-connected-cars-with-5g. Accessed 22 May 2023.
  2. Chen, Huimin, et al. "Towards Secure Intra-Vehicle Communications in 5G Advanced and Beyond: Vulnerabilities, Attacks and Countermeasures." Vehicular Communications (2022): 100548.
  3. Dibaei, Mahdi, et al. "Attacks and defences on intelligent connected vehicles: A survey." Digital Communications and Networks 6.4 (2020): 399-421.
  4. Noor-A-Rahim, Md, et al. "6G for vehicle-to-everything (V2X) communications: Enabling technologies, challenges, and opportunities." Proceedings of the IEEE 110.6 (2022): 712-734.
  5. Aloqaily, Moayad, et al. "An intrusion detection system for connected vehicles in smart cities." Ad Hoc Networks 90 (2019): 101842.
  6. Ashraf, Javed, et al. "Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems." IEEE Transactions on Intelligent Transportation Systems 22.7 (2020): 4507-4518.
  7. Ullah, Safi, et al. "HDL-IDS: A hybrid deep learning architecture for intrusion detection in the internet of vehicles." Sensors 22.4 (2022): 1340.
  8. Warraich, Z. S., and W. G. Morsi. "Early detection of cyber–physical attacks on fast charging stations using machine learning considering vehicle-to-grid operation in microgrids." Sustainable Energy, Grids and Networks 34 (2023): 101027.
  9. Song, Hyun Min, Jiyoung Woo, and Huy Kang Kim. "In-vehicle network intrusion detection using deep convolutional neural network." Vehicular Communications 21 (2020): 100198.
  10. Rashid, Mamunur, et al. "A tree-based stacking ensemble technique with feature selection for network intrusion detection." Applied Intelligence 52.9 (2022): 9768-9781.
  11. Li, Jiaqi, Zhifeng Zhao, and Rongpeng Li. "Machine learning‐based IDS for software‐defined 5G network." Iet Networks 7.2 (2018): 53-60.
  12. Sapre, Suchet, Pouyan Ahmadi, and Khondkar Islam. "A robust comparison of the KDDCup99 and NSL-KDD IoT network intrusion detection datasets through various machine learning algorithms." arXiv preprint https://arxiv.org/abs/1912.13204(2019).
  13. Hakak, Saqib, et al. "Autonomous Vehicles in 5G and beyond: A Survey." Vehicular Communications (2022): 100551.
  14. Min, Nay Myat, et al. "OWASP IoT Top 10 based Attack Dataset for Machine Learning." 2022 24th International Conference on Advanced Communication Technology (ICACT). IEEE, 2022.
  15. “Search UNB.” University of New Brunswick Est.1785, www.unb.ca/cic/research/applications.html. Accessed 22 May 2023.
  16. NayMyatMin. “Naymyatmin/Aiot-Sol.” GitHub, github.com/NayMyatMin/AIoT-Sol. Accessed 22 May 2023.
  17. Rani, Preeti, and Rohit Sharma. "Intelligent transportation system for internet of vehicles based vehicular networks for smart cities." Computers and Electrical Engineering 105 (2023): 108543.
  18. Banafshehvaragh, Samira Tahajomi, and Amir Masoud Rahmani. "Intrusion, anomaly, and attack detection in smart vehicles." Microprocessors and Microsystems 96 (2023): 104726.