
method are significantly higher than those of the
Kalman filter when choosing the best F1-Score.
5 CONCLUSION
In conclusion, we proposed a novel framework for at-
tack detection in vehicles with unknown systems. We
exploited a learning-based model to predict and com-
pare observations against expected behavior. There-
fore, compared to the Kalman filter, the proposed ap-
proach based on the UKF is capable of detecting DoS
attacks from the sensor and actuator without prior
knowledge of the system parameters. Accordingly,
by exploiting UKF’s capabilities in handling nonlin-
earity, our proposed algorithm demonstrated a signif-
icant advantage over the traditional Kalman filter for
detecting DoS attacks on sensors and actuators. In
detail, through extensive simulations of our proposed
algorithm, we observed that our method outperforms
the Kalman filter by demonstrating substantial results
in both true positive alarm rate and true negative alarm
rate. Enhancing the filtering design for vehicle in-
cursion detection can be the primary focus of future
research. By precisely simulating intricate dynam-
ics, investigating robust particle filters may improve
anomaly identification even further and strengthen ve-
hicle security. Moreover, the presented framework
can be extended to other types of attacks such as FDI.
ACKNOWLEDGEMENT
We gratefully acknowledge the financial support pro-
vided by BlackBerry and the Natural Sciences and
Engineering Research Council of Canada (NSERC).
Furthermore, we acknowledge BlackBerry QNX’s as-
sistance and cooperation with this study. Their assis-
tance has been crucial to the accomplishment of this
task.
REFERENCES
Al-Jarrah, O. Y., Maple, C., Dianati, M., Oxtoby, D., and
Mouzakitis, A. (2019). Intrusion detection systems
for intra-vehicle networks: A review. Ieee Access,
7:21266–21289.
Aldhyani, T. H. and Alkahtani, H. (2022). Attacks to au-
tomatous vehicles: A deep learning algorithm for cy-
bersecurity. Sensors, 22(1):360.
Banafshehvaragh, S. T. and Rahmani, A. M. (2023). Intru-
sion, anomaly, and attack detection in smart vehicles.
Microprocessors and Microsystems, 96:104726.
Berger, I., Rieke, R., Kolomeets, M., Chechulin, A., and
Kotenko, I. (2018). Comparative study of machine
learning methods for in-vehicle intrusion detection. In
International Workshop on Security and Privacy Re-
quirements Engineering, pages 85–101. Springer.
Bishop, C. M. and Nasrabadi, N. M. (2006). Pattern recog-
nition and machine learning, volume 4. Springer.
Canh, T. N. and HoangVan, X. (2023). Machine learning-
based malicious vehicle detection for security threats
and attacks in vehicle ad-hoc network (vanet) commu-
nications. In 2023 RIVF International Conference on
Computing and Communication Technologies (RIVF),
pages 206–211. IEEE.
Dosovitskiy, A., Ros, G., Codevilla, F., Lopez, A., and
Koltun, V. (2017). Carla: An open urban driving sim-
ulator.
Du, D., Zhu, M., Li, X., Fei, M., Bu, S., Wu, L., and Li, K.
(2022). A review on cybersecurity analysis, attack de-
tection, and attack defense methods in cyber-physical
power systems. Journal of Modern Power Systems and
Clean Energy, 11(3):727–743.
Farsi., M., Bian., S., Azad., N. L., Shi., X., and Walenstein.,
A. (2023). An efficient resilient mpc scheme via con-
straint tightening against cyberattacks: Application to
vehicle cruise control. In Proceedings of the 20th In-
ternational Conference on Informatics in Control, Au-
tomation and Robotics - Volume 1: ICINCO, pages
674–682. INSTICC, SciTePress.
Ju, Z., Zhang, H., Li, X., Chen, X., Han, J., and Yang, M.
(2022). A survey on attack detection and resilience
for connected and automated vehicles: From vehicle
dynamics and control perspective. IEEE Transactions
on Intelligent Vehicles, 7(4):815–837.
Kingma, D. P. and Ba, J. (2014). Adam: A
method for stochastic optimization. arXiv preprint
arXiv:1412.6980.
Labbe, R. (2024). filterpy: Kalman filters and other optimal
and non-optimal estimation filters in python. https:
//github.com/rlabbe/filterpy. Accessed: 20 June 2024.
Liu, Q., Mo, Y., Mo, X., Lv, C., Mihankhah, E., and Wang,
D. (2019). Secure pose estimation for autonomous
vehicles under cyber attacks. In 2019 IEEE Intelligent
Vehicles Symposium (IV), pages 1583–1588. IEEE.
Marcillo, P., Tamayo-Urgil
´
es, D., Valdivieso Caraguay,
´
A. L., and Hern
´
andez-
´
Alvarez, M. (2022). Security
in v2i communications: a systematic literature review.
Sensors, 22(23):9123.
Mirkovic, J. and Reiher, P. (2004). A taxonomy of ddos at-
tack and ddos defense mechanisms. ACM SIGCOMM
Computer Communication Review, 34(2):39–53.
Naqvi, I., Chaudhary, A., and Kumar, A. (2022). A sys-
tematic review of the intrusion detection techniques in
vanets. TEM Journal, 11(2):900.
Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J.,
Chanan, G., Killeen, T., Lin, Z., Gimelshein, N.,
Antiga, L., et al. (2019). Pytorch: An imperative style,
high-performance deep learning library. Advances in
neural information processing systems, 32.
Pawar, Y. S., Honnavalli, P., and Eswaran, S. (2022). Cy-
ber attack detection on self-driving cars using machine
ICINCO 2024 - 21st International Conference on Informatics in Control, Automation and Robotics
722