E-ISSN: 9663-3691
P-ISSN: 4493-4712
DOI: https://iigdpublishers.com/article/1274
The increasing connectivity of in-vehicle electronic control systems has intensified the need for robust cyber security solutions, especially for the Controller Area Network (CAN) bus. This study proposes a deep learning–based Intrusion Detection System (IDS) utilizing Generative Adversarial Network (GAN) architecture to detect anomalous CAN bus traffic in real time. The GAN model is trained solely on legitimate CAN messages, enabling it to learn the underlying statistical patterns of normal communication without relying on predefined attack signatures. The proposed GAN-IDS demonstrate strong detection performance, achieving an accuracy of 98.7% and an F1-Score of 98.5%, outperforming conventional deep learning baselines. To assess deployment feasibility, the discriminator is optimized using Tensor Flow Lite (TFLite) and deployed on a Raspberry Pi 4 integrated with a PiCAN2 interface. Hardware evaluation confirms real-time operation with a low detection latency of 2.9 milliseconds per message sequence. System interpretability is further enhanced through SHapley Additive exPlanations (SHAP), which identify CAN ID, engine torque, and RPM as the most influential features contributing to anomaly classification. The proposed GAN-based IDS offer a scalable, manufacturer-independent, and non-intrusive cyber security solution for modern Electric Vehicles. Its combination of high detection performance, real-time hardware deployment, and interpretable decision-making marks a significant step toward more intelligent and resilient security mechanisms for future connected and autonomous vehicles.
Bogineni Kasi Pavan Kalyan, Mergu Siri Chandana, Navya Karimalla & Wisam Bukaita
Bai, Rong, Wenqian Shi, & Jia Li (2023). Conditional GAN Framework for Anomaly Synthesis in Automotive CAN Net- works. Proceedings of the ACM Conference on Security of Connected Vehicles, 55–66. https://doi.org/10.1145/3596670.3598082
Choi, W., K. Joo, H. J. Jo, M. C. Park, & D. H. Lee (2018). VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System. IEEE Transactions on Information Forensics and Security 13(8): 2114–2129. https://doi.org/10.1109/TIFS.2018.2812149
Creswell, A., T. White, V. Dumoulin, K. Arulkumaran, B. Sengupta, & A. A. Bharath (2017). Generative Adversarial Networks: An Overview. IEEE Signal Processing Magazine 35(1): 53–65. https://doi.org/10.1109/MSP.2017.2765202
Feng, Yitong, & Ming Zhao (2023). Transformer-Based Temporal Modeling for In-Vehicle CAN Intrusion Detection. IEEE Transactions on Intelligent Transportation Systems 24(9): 11245–11257. https://doi.org/10.1109/TITS.2023.3234567
Groza, B., & P.-S. Murvay (2019). Efficient Intrusion Detection with Bloom Filtering in Controller Area Networks. IEEE Transactions on Information Forensics and Security 14(4): 1037–1051. https://doi.org/10.1109/TIFS.2018.2869351