SMART VEHICLE CYBERSECURITY: IMPLEMENTING AN AUTONOMOUS AND ADAPTIVE INTRUSION RESPONSE SYSTEM

Authors

  • Swarupa Rani Bondalapati Department of Electrical and Electronics Engineering, Siddhartha Academy of Higher Education, (Deemed to be University), Vijayawada, Andhra Pradesh, India
  • Sirisha Narkedamilli Department of Electrical and Electronics Engineering, Aditya College of Engineering and Technology, Surampalem, Andhra Pradesh, India
  • R. V. S. Lakshmi Kumari cDepartment of Electrical and Electronics Engineering, Gayatri Vidya Parishad College of Engineering for Women, Visakhapatnam, Andhra Pradesh, India
  • Venkata Subba Reddy Department of Information Technology, Vjdya Jyothi Institute of Technology, Hyderabad, Telangana, India
  • Nagamani Chippada Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India
  • Jagan Mohan Reddy Danda Department of Artificial Intelligence and Machine Learning, Gokaraju Rangaraju Institute of Engineering & Technology, Hyderabad, Telangana, India
  • P. S. Subhashini Pedalanka Department of Electronics and Communication Engineering, R. V. R. & J. C College of Engineering, Chowdavaram, Guntur, Andhra Pradesh, India

DOI:

https://doi.org/10.11113/aej.v15.24631

Keywords:

Autonomous vehicles, Intrusion response system, Cybersecurity, Intelligent vehicles, Linear Programming, AI-based mechanisms.

Abstract

As smart vehicles are becoming more common, protecting them from cyberattacks has become very important. To address this issue, this paper introduces an automatic intrusion response system (IRS) designed especially for intelligent vehicles. The system is able to quickly analyze the effect of a cyberattack and choose the best response method in real time, making vehicle operations more secure. The proposed IRS offers several key features. First, it provides a clear analysis of different response methods that can be used during cyber intrusions. Second, it introduces a framework that evaluates both the cost and the impact of each response. Third, it applies decision-making tools such as Simple Additive Weighting (SAW), Linear Programming (LP), game theory, and artificial intelligence–based approaches to select the most effective response strategy. Extensive testing shows that the system performs strongly in terms of response quality, time efficiency, and resource usage. This study proposes a hybrid SAW-LP method that combines rapid multi-criteria ranking with constraint-based optimization. Experimental evaluation shows that the hybrid approach reduced response selection time by 32% and improved decision accuracy by 12% compared to standalone algorithms.

References

Zhao, J., Zhao, W., Deng, B., Wang, Z., Zhang, F., Zheng, W., Cao, W., Nan, J., Lian, Y., & Burke, A. F. 2024. Autonomous driving system: A comprehensive survey. Expert Systems with Applications, 242: 122836. DOI: https://doi.org/10.1016/j.eswa.2023.122836

El-Rewini, Z., Sadatsharan, K., Selvaraj, D. F., Plathottam, S. J., & Ranganathan, P. 2020. Cybersecurity challenges in vehicular communications. Vehicular Communications, 23: 100214. DOI: https://doi.org/10.1016/j.vehcom.2019.100214

Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. 2019. Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity, 2(1): 1-22. DOI: https://doi.org/10.1186/s42400-019-0038-7

Khan, F. I., Amyotte, P. R., & Amin, M. T. 2019. Advanced methods of risk assessment and management: An overview. Methods in Chemical Process Safety, 4: 1-34. DOI: https://doi.org/10.1016/bs.mcps.2020.03.002

Kopalle, P. K., Pauwels, K., Akella, L. Y., & Gangwar, M. 2023. Dynamic pricing: Definition, implications for managers, and future research directions. Journal of Retailing, 99(4): 580-593. DOI: https://doi.org/10.1016/j.jretai.2023.11.003

samados, A., Aggarwal, N., Cowls, J. et al. 2022. The ethics of algorithms: key problems and solutions. AI & Society, Journal of Knowledge, Culture and Communication 37: 215–230 DOI: https://doi.org/10.1007/s00146-021-01154-8

Kim, K., Kim, J. S., Jeong, S., Park, J., & Kim, H. K. 2021. Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103: 102150. DOI: https://doi.org/10.1016/j.cose.2020.102150

Nisha, Nasib Singh Gill, Preeti Gulia. 2024. A review on machine learning based intrusion detection system for internet of thingsenabled environment, International Journal of Electrical and Computer Engineering (IJECE) 14(2): 1890-1898.

Chunduru, Anilkumar & Robbi, Jyothsna & Sattaru, Vandana & Gothai, E. 2023. Deep Learning-Based Yoga Posture Specification Using OpenCV and Media Pipe. Applied and Computational Engineering. 8: 80-86. DOI: https://doi.org/10.54254/2755-2721/8/20230085.

Qian, Y., Joshi, J., Tipper, D., & Krishnamurthy, P. 2007. Information Assurance. Information Assurance, 1-15. DOI: https://doi.org/10.1016/B978-012373566-9.50003-3

Baddu Naik Bhukya, V. Venkataiah, S. Mani.Kuchibhatla, S. Koteswari, R V S Lakshmi Kumari, and Yallapragada Ravi Raju, 2024. "Integrating the Internet of Things to Protect Electric Vehicle Control Systems from Cyber Attacks," IAENG International Journal of Applied Mathematics, 54(3): 433-440

Shinde, N., & Kulkarni, P. 2020. Cyber incident response and planning: A flexible approach. Computer Fraud & Security, 2021(1): 14-19. DOI: https://doi.org/10.1016/S1361-3723(21)00009-9

Khan, Firoz & Ramasamy, Lakshmana & Kadry, Seifedine & Meqdad, Maytham N. & Nam, Yunyoung. 2021. Autonomous vehicles: A study of implementation and security. International Journal of Electrical and Computer Engineering. 11: 3013-3021. DOI: https://doi.org/10.11591/ijece. v11i4.pp3013-3021.

Yazici, İ., Shayea, I., & Din, J. 2023. A survey of applications of artificial intelligence and machine learning in future mobile networks-enabled systems. Engineering Science and Technology, an International Journal, 44: 101455. DOI: https://doi.org/10.1016/j.jestch.2023.101455

Moneerh Aleedy, Hadil Shaiba and Marija Bezbradica. 2019. “Generating and Analyzing Chatbot Responses using Natural Language Processing”. International Journal of Advanced Computer Science and Applications (IJACSA) 10(9). DOI: http://dx.doi.org/10.14569/IJACSA.2019.0100910

Micale, D., Matteucci, I., Fenzl, F. et al. 2024. A context-aware on-board intrusion detection system for smart vehicles. International Journal of Information Security, 23: 2203–2223. DOI: https://doi.org/10.1007/s10207-024-00821-3

Baddu Naik Bhukya, Vutukuri Sarvani Duti Rekha, Venkata Krishnakanth Paruchuri, Ashok Kumar Kavuru, Kadiyala Sudhakar, 2023. “Internet of Things for Effort Estimation and Controlling the State of an Electric Vehicle in a Cyber Attack Environment” Journal of Theoretical and Applied Information Technology. 101(10): 4033–4040

Wang, Shaoqiang & Wang, Yizhe & Zheng, Baosen & Cheng, Jiahui & Su, Yu & Dai, Yinfei. 2024. Intrusion Detection System for Vehicular Networks Based on MobileNetV3. IEEE Access. 1-1. DOI: https://doi.org/ 10.1109/ACCESS.2024.3437416.

Inayat, Z., Gani, A., Anuar, N. B., Khan, M. K., & Anwar, S. (2016). Intrusion response systems: Foundations, design, and challenges. Journal of Network and Computer Applications, 62: 53-74. DOI: https://doi.org/10.1016/j.jnca.2015.12.006

Adnan Yusuf, S., Khan, A., & Souissi, R. 2023. Vehicle-to-everything (V2X) in the autonomous vehicles domain – A technical review of communication, sensor, and AI technologies for road user safety. Transportation Research Interdisciplinary Perspectives, 23: 100980. DOI: https://doi.org/10.1016/j.trip.2023.100980

Ghraizi, D., Talj, R., & Francis, C. 2022. An Overview of Decision-Making in Autonomous Vehicles. IFAC-PapersOnLine, 56(2): 10971-10983. DOI: https://doi.org/10.1016/j.ifacol.2023.10.793

Taherdoost, Hamed. (2023). Analysis of Simple Additive Weighting Method (SAW) as a MultiAttribute Decision-Making Technique: A Step-by-Step Guide. Journal of Management Science & Engineering Research. 6(1): 21-24. 6. 10.30564/jmser. v6i1.5400.

Kunwar, Rajendra & Sapkota, Hari. 2022. An Introduction to Linear Programming Problems with Some Real-Life Applications. European Journal of Mathematics and Statistics. 3: 21-27. DOI: 10.24018/ejmath.2022.3.2.108.

Hanley, John. 2021. GAMES, game theory and artificial intelligence. Journal of Defense Analytics and Logistics. 5(2): 114–130. DOI: https://doi.org/10.1108/JDAL-10-2021-001

Sarker, I.H. 2022 AI-Based Modeling: Techniques, Applications and Research Issues Towards Automation, Intelligent and Smart Systems. SN Computer Science 3: 158. DOI: https://doi.org/10.1007/s42979-022-01043-x

Naik, B., Bhukya, Sarvani, V., Rekha, D., Paruchuri, V.K., Kavuru, A.K., & Sudhakar, K. 2023, “Internet of Things for Effort Estimation and Controlling the State of an Electric Vehicle in A Cyber Attack Environment”, Journal of Theoretical and Applied Information Technology, 101(10): 4033–4040.

Abdallaoui, S., Ikaouassen, H., Kribèche, A., Chaibet, A., & Aglzim, H. 2023. Advancing autonomous vehicle control systems: An in-depth overview of decision-making and manoeuvre execution state of the art. The Journal of Engineering, 2023(11): e12333. DOI: https://doi.org/10.1049/tje2.12333

Nagarajan, J., Mansourian, P., Shahid, M.A. et al. 2023. Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey. Peer-to-Peer Networking and Applications. 16: 2153–2185 DOI: https://doi.org/10.1007/s12083-023-01508-7

Downloads

Published

2025-12-01

Issue

Section

Articles

How to Cite

SMART VEHICLE CYBERSECURITY: IMPLEMENTING AN AUTONOMOUS AND ADAPTIVE INTRUSION RESPONSE SYSTEM. (2025). ASEAN Engineering Journal, 15(4), 221-228. https://doi.org/10.11113/aej.v15.24631