SMART VEHICLE CYBERSECURITY: IMPLEMENTING AN AUTONOMOUS AND ADAPTIVE INTRUSION RESPONSE SYSTEM
DOI:
https://doi.org/10.11113/aej.v15.24631Keywords:
Autonomous vehicles, Intrusion response system, Cybersecurity, Intelligent vehicles, Linear Programming, AI-based mechanisms.Abstract
As smart vehicles are becoming more common, protecting them from cyberattacks has become very important. To address this issue, this paper introduces an automatic intrusion response system (IRS) designed especially for intelligent vehicles. The system is able to quickly analyze the effect of a cyberattack and choose the best response method in real time, making vehicle operations more secure. The proposed IRS offers several key features. First, it provides a clear analysis of different response methods that can be used during cyber intrusions. Second, it introduces a framework that evaluates both the cost and the impact of each response. Third, it applies decision-making tools such as Simple Additive Weighting (SAW), Linear Programming (LP), game theory, and artificial intelligence–based approaches to select the most effective response strategy. Extensive testing shows that the system performs strongly in terms of response quality, time efficiency, and resource usage. This study proposes a hybrid SAW-LP method that combines rapid multi-criteria ranking with constraint-based optimization. Experimental evaluation shows that the hybrid approach reduced response selection time by 32% and improved decision accuracy by 12% compared to standalone algorithms.
References
Zhao, J., Zhao, W., Deng, B., Wang, Z., Zhang, F., Zheng, W., Cao, W., Nan, J., Lian, Y., & Burke, A. F. 2024. Autonomous driving system: A comprehensive survey. Expert Systems with Applications, 242: 122836. DOI: https://doi.org/10.1016/j.eswa.2023.122836
El-Rewini, Z., Sadatsharan, K., Selvaraj, D. F., Plathottam, S. J., & Ranganathan, P. 2020. Cybersecurity challenges in vehicular communications. Vehicular Communications, 23: 100214. DOI: https://doi.org/10.1016/j.vehcom.2019.100214
Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. 2019. Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity, 2(1): 1-22. DOI: https://doi.org/10.1186/s42400-019-0038-7
Khan, F. I., Amyotte, P. R., & Amin, M. T. 2019. Advanced methods of risk assessment and management: An overview. Methods in Chemical Process Safety, 4: 1-34. DOI: https://doi.org/10.1016/bs.mcps.2020.03.002
Kopalle, P. K., Pauwels, K., Akella, L. Y., & Gangwar, M. 2023. Dynamic pricing: Definition, implications for managers, and future research directions. Journal of Retailing, 99(4): 580-593. DOI: https://doi.org/10.1016/j.jretai.2023.11.003
samados, A., Aggarwal, N., Cowls, J. et al. 2022. The ethics of algorithms: key problems and solutions. AI & Society, Journal of Knowledge, Culture and Communication 37: 215–230 DOI: https://doi.org/10.1007/s00146-021-01154-8
Kim, K., Kim, J. S., Jeong, S., Park, J., & Kim, H. K. 2021. Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103: 102150. DOI: https://doi.org/10.1016/j.cose.2020.102150
Nisha, Nasib Singh Gill, Preeti Gulia. 2024. A review on machine learning based intrusion detection system for internet of thingsenabled environment, International Journal of Electrical and Computer Engineering (IJECE) 14(2): 1890-1898.
Chunduru, Anilkumar & Robbi, Jyothsna & Sattaru, Vandana & Gothai, E. 2023. Deep Learning-Based Yoga Posture Specification Using OpenCV and Media Pipe. Applied and Computational Engineering. 8: 80-86. DOI: https://doi.org/10.54254/2755-2721/8/20230085.
Qian, Y., Joshi, J., Tipper, D., & Krishnamurthy, P. 2007. Information Assurance. Information Assurance, 1-15. DOI: https://doi.org/10.1016/B978-012373566-9.50003-3
Baddu Naik Bhukya, V. Venkataiah, S. Mani.Kuchibhatla, S. Koteswari, R V S Lakshmi Kumari, and Yallapragada Ravi Raju, 2024. "Integrating the Internet of Things to Protect Electric Vehicle Control Systems from Cyber Attacks," IAENG International Journal of Applied Mathematics, 54(3): 433-440
Shinde, N., & Kulkarni, P. 2020. Cyber incident response and planning: A flexible approach. Computer Fraud & Security, 2021(1): 14-19. DOI: https://doi.org/10.1016/S1361-3723(21)00009-9
Khan, Firoz & Ramasamy, Lakshmana & Kadry, Seifedine & Meqdad, Maytham N. & Nam, Yunyoung. 2021. Autonomous vehicles: A study of implementation and security. International Journal of Electrical and Computer Engineering. 11: 3013-3021. DOI: https://doi.org/10.11591/ijece. v11i4.pp3013-3021.
Yazici, İ., Shayea, I., & Din, J. 2023. A survey of applications of artificial intelligence and machine learning in future mobile networks-enabled systems. Engineering Science and Technology, an International Journal, 44: 101455. DOI: https://doi.org/10.1016/j.jestch.2023.101455
Moneerh Aleedy, Hadil Shaiba and Marija Bezbradica. 2019. “Generating and Analyzing Chatbot Responses using Natural Language Processing”. International Journal of Advanced Computer Science and Applications (IJACSA) 10(9). DOI: http://dx.doi.org/10.14569/IJACSA.2019.0100910
Micale, D., Matteucci, I., Fenzl, F. et al. 2024. A context-aware on-board intrusion detection system for smart vehicles. International Journal of Information Security, 23: 2203–2223. DOI: https://doi.org/10.1007/s10207-024-00821-3
Baddu Naik Bhukya, Vutukuri Sarvani Duti Rekha, Venkata Krishnakanth Paruchuri, Ashok Kumar Kavuru, Kadiyala Sudhakar, 2023. “Internet of Things for Effort Estimation and Controlling the State of an Electric Vehicle in a Cyber Attack Environment” Journal of Theoretical and Applied Information Technology. 101(10): 4033–4040
Wang, Shaoqiang & Wang, Yizhe & Zheng, Baosen & Cheng, Jiahui & Su, Yu & Dai, Yinfei. 2024. Intrusion Detection System for Vehicular Networks Based on MobileNetV3. IEEE Access. 1-1. DOI: https://doi.org/ 10.1109/ACCESS.2024.3437416.
Inayat, Z., Gani, A., Anuar, N. B., Khan, M. K., & Anwar, S. (2016). Intrusion response systems: Foundations, design, and challenges. Journal of Network and Computer Applications, 62: 53-74. DOI: https://doi.org/10.1016/j.jnca.2015.12.006
Adnan Yusuf, S., Khan, A., & Souissi, R. 2023. Vehicle-to-everything (V2X) in the autonomous vehicles domain – A technical review of communication, sensor, and AI technologies for road user safety. Transportation Research Interdisciplinary Perspectives, 23: 100980. DOI: https://doi.org/10.1016/j.trip.2023.100980
Ghraizi, D., Talj, R., & Francis, C. 2022. An Overview of Decision-Making in Autonomous Vehicles. IFAC-PapersOnLine, 56(2): 10971-10983. DOI: https://doi.org/10.1016/j.ifacol.2023.10.793
Taherdoost, Hamed. (2023). Analysis of Simple Additive Weighting Method (SAW) as a MultiAttribute Decision-Making Technique: A Step-by-Step Guide. Journal of Management Science & Engineering Research. 6(1): 21-24. 6. 10.30564/jmser. v6i1.5400.
Kunwar, Rajendra & Sapkota, Hari. 2022. An Introduction to Linear Programming Problems with Some Real-Life Applications. European Journal of Mathematics and Statistics. 3: 21-27. DOI: 10.24018/ejmath.2022.3.2.108.
Hanley, John. 2021. GAMES, game theory and artificial intelligence. Journal of Defense Analytics and Logistics. 5(2): 114–130. DOI: https://doi.org/10.1108/JDAL-10-2021-001
Sarker, I.H. 2022 AI-Based Modeling: Techniques, Applications and Research Issues Towards Automation, Intelligent and Smart Systems. SN Computer Science 3: 158. DOI: https://doi.org/10.1007/s42979-022-01043-x
Naik, B., Bhukya, Sarvani, V., Rekha, D., Paruchuri, V.K., Kavuru, A.K., & Sudhakar, K. 2023, “Internet of Things for Effort Estimation and Controlling the State of an Electric Vehicle in A Cyber Attack Environment”, Journal of Theoretical and Applied Information Technology, 101(10): 4033–4040.
Abdallaoui, S., Ikaouassen, H., Kribèche, A., Chaibet, A., & Aglzim, H. 2023. Advancing autonomous vehicle control systems: An in-depth overview of decision-making and manoeuvre execution state of the art. The Journal of Engineering, 2023(11): e12333. DOI: https://doi.org/10.1049/tje2.12333
Nagarajan, J., Mansourian, P., Shahid, M.A. et al. 2023. Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey. Peer-to-Peer Networking and Applications. 16: 2153–2185 DOI: https://doi.org/10.1007/s12083-023-01508-7













