An Evolutionary Deep Learning-Based Anomaly Detection Model For Securing Vehicles
An Evolutionary Deep Learning-Based Anomaly Detection Model For Securing Vehicles
Abstract— This article proposes a deep learning based By penetrating into the car system, the hackers can not only
approach for cyber attack detection in the vehicles. The proposed disturb the car tasks but can also affect the entire smart city
method is constructed based on generative adversarial network due to the vehicle-2-vehicle and vehicle-2-grid plans available
(GAN) classification to assess the message frames transferring
between the electric control unit (ECU) and other hardware in these systems. In a vehicle, the electric control unit (ECU)
in the vehicle. To this end, two networks called generator (G) is in charge of controlling all hardware units through the
and discriminator (D) will run an adversarial game to fool information gathered from many sensors considered. After
each other. In such a process, the most optimal structure is analyzing these info, the ECU launch some comments to
found which distinguish between the model normal behavior control the vehicle in a protocol bed such as CAN, MOST,
and abnormalities. Due to the instabilities existing in the GAN
model, a new optimization method based on firefly algorithm is Ethernet, LIN or FLexray [7]–[9]. CAN protocol due to
proposed to create a class of generators in a feasible region, i.e. special features was the first most widely used protocol in
the discriminator D. A three-stage modification method is also the car industry since 1986 [10], [11]. This protocol uses
devised to increase the algorithm population diversity and reduce some identifiers (IDs) to escape from message traffic in the
the possibility of falling in local optima. The performance of the vehicle. Unfortunately, the CAN was designed at for simple
model is assessed on the experimental dataset recorded from the
OBD-II port of an undefined vehicle. inaccessible vehicles of those years and is not secure in the
modern vehicles which are equipped with many facilities for
Index Terms— Deep learning, generative adversarial networks, the owners. This has become a vulnerable point of the vehicles
controller-area-networks, firefly algorithm.
in recent years which a review on some of the works is
provided in the rest.
I. I NTRODUCTION In [12], a Tojan attacks the CAN bus protocol as a hidden
Authorized licensed use limited to: Cornell University Library. Downloaded on August 27,2020 at 13:08:52 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
a good method which works based on the randomness flat in II. V EHICLE AS A C OMPLEX C YBER -P HYSICAL
the CAN traffic. In [19], it is suggested to install a firewall S YSTEM (CPS)
between the ECU and communicating modules to check the In-vehicle data communication has improved based on the
health of the message frames based on comparison and look-up progress of vehicles facilities and services. This has caused
table. that the domain of vehicles extends from legacy electronics
As it is inferred from the above literature survey, ECU to new software. In fact, the emerging features in the modern
performance and security is highly dependent on the CAN vehicles such as entertainments or driving assistance systems
bus security, without which the entire vehicle performance are based on interconnected software (cyber) and physi-
is affected. Unfortunately, the research in this area is still cal (electronics) systems rather than mechanical components.
at its infancy and requires much more efforts to get to an There are over 100 million lines of coding in a modern vehicle,
acceptable level. This research article focuses on this challenge which clearly shows the complex nature of these CPSs [19].
and proposes a new deep learning based model for assessing In such a CPS, over a hundreds of programmable ECUs exist
the health of message frames within the car. The suggested which communicate on the bed of CAN protocol. Such a
model makes use of the message frame frequency and ID distributed and assorted nature of vehicles makes them an
number to train generative adversarial network (GAN) when appealing target for the cyber hackers, which emphasizes on
offline. This model can be further used for online checking of the necessity of CPS-oriented defense. CAN in a vehicle
the CAN bus message traffic. GAN [20] belongs to the class of represents the nervous system in our body, without which
deep learning models and is composed of two networks, called the entire system collapse. Technically, CAN is designed
generator (G) and discriminator (D). When generator tries to to control over five hundred million chips. Unfortunately,
mislead the G by generating noisy samples, the discriminator the CAN protocol, designed around 30 years ago, does not
tries to improve its training process by comparing the real data provide the required security for the today modern vehicles.
with the fake data. Through such a process, a powerful clas- Ignoring the confidentiality and authentication mechanisms
sification model with very high appealing is achieved which is a natural disadvantage of this protocol which can attract
can be used as an anomaly detection model in the vehicle. hackers.
In order to get to most optimal structure, an evolutionary GAN This may happen in either a wired or wireless way. In the
based on firefly algorithm (FA) is proposed. This can help to wired cyber attack, OBD-II port can let the hackers penetrate
overcome the instabilities existing in the GAN by generating the car. This port, which is located beneath the steering wheel,
a set of generators {G} instead of a single generator. FA is is originally designed for onboard diagnosis but also provides
a meta-heuristic optimization algorithm which mimics the access to the CAN bus. From there, one can read or write some
mating behavior of firefly insects in the tropical regions [21]. coding on the ECU. In the wireless cyber attack, a smartphone
In addition, a three-stage modification method based on the or the car entertaining service can be the penetration point.
powerful math operators of other algorithms is deployed here In order to write a code on the ECU, one first need to know the
which can improve the search ability of FA. To summarize, message frame structure in the CAN bus protocol. Fig. 1 shows
the main paper contributions can be named as follows: the structure of a CAN message in a vehicle.
Each message has an ID which shows its priority, i.e.
• Recommending a new deep anomaly detection model a lower ID value shows a higher priority. Therefore, when
based on generative adversarial network for cyber-attack multiples of messages arrive to the ECU simultaneously,
detection in the vehicle ECU. The proposed method can message arbitration happens which means a message with a
extract out the main features and provide the most reliable lower priority is analyzed first. In Fig. 1, the message frame
results. consists of several parts: one principal bit as the start of the
• Introducing an evolutionary GAN based on FA for over- frame (SOF), 12 bits as arbitration field, six bit as control
coming the instability issues in the model. The proposed field, data field (in range of 0 to 64 bytes), CRC field with
evolutionary GAN improves the stability of the proposed 16-bits, ACK field with 2-bits, and end of frame (EOF) with
classification model. 7-bit. The message arbitration process is a key point for
• Proposing a three-stage modification solution for FA to hackers to cyber attack to the system. In other words, a hacker
avoid premature convergence and increase the population launches several messages with low ID but high frequency to
diversity. wind the arbitration and run his malicious purposes on the
The experimental dataset of an undefined vehicle is deployed vehicle. In order to stop this event, next section provides a
as the case study and assessing the proposed anomaly detection novel deep learning based cyber attack detection model. The
model performance. The rest of this article is organized as ECUs read messages measured by varied range of sensors and
follows: make relevant processing for varying intentions like pedestrian
This article is organized as follows: In section II, the cyber detection, path planning, auto-parking, collision avoidance,
security of vehicle as a complex cyber-physical system (CPS) etc.
is investigated. In section III, the proposed evolutionary deep
learning anomaly detection model based on GAN and modified III. A NOMALY D ETECTION M ODEL BASED ON D EEP
FA (MFA) is explained. The experimental simulation results G ENERATIVE A DVERSARIAL N ETWORKS
are discussed in Section IV. To finish, the main thoughts and In this section, a deep learning based anomaly detection
conclusions are given in Section V. model is proposed for filtering the CAN bus messages.
Authorized licensed use limited to: Cornell University Library. Downloaded on August 27,2020 at 13:08:52 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
KAVOUSI-FARD et al.: EVOLUTIONARY DEEP LEARNING-BASED ANOMALY DETECTION MODEL FOR SECURING VEHICLES 3
Authorized licensed use limited to: Cornell University Library. Downloaded on August 27,2020 at 13:08:52 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
anomaly detection model. In fact, the case of fooling D net- searching mechanism. In other words, when the population
work by the G is exactly what the vehicle ECU may encounter diversity is enhanced, the algorithm has a higher chance to find
when cyber hacking. Nevertheless, the original GAN has some new fitting solutions in the population rather than trapping in
deficiencies such as instability of performance when facing the local optima. This will not stop but reduce the possibility
highly nonlinear dataset and mode collapse. In order to over- of premature convergence in the algorithm:
come these issues, a new optimization algorithm called MFA -Modification 1: This method is an accelerating movement
is introduced here which produces a set of generators {G}, for improving the convergence rate of the algorithm. To this
instead of a single generator in the discriminator domain. end, the average position of fireflies is first calculated and then
This would help to improve the chance of producing more the position of each firefly is updated based on its distance
qualified noisy data samples and thus a better matching may from the best solution:
be gained with the real data set x. Each solution X represents
X kI t er+1 = X kI t er + TF (X best − M Pop ) (7)
the parameter characteristics of a generator network, θ (G) .
The most fitting generator would be used for serving the -Modification 2: The second modification is a math formu-
discriminator and providing the most suitable classification. lation for improving the position of each firefly based on its
Similar to the other evolutionary algorithms, firefly algo- distance from the most suitable firefly X best . This would help
rithm starts with a random population. Being inspired from the less fitting solutions to upgrade their position sooner top attend
firefly brightening at the tropical regions, FA represents a mix the game.
of guided search and random search which can be very useful X kI t er+1 = X kI t er + × (X best
I
− X kI t er ) (8)
for the optimization purposes. FA works based on three main
ideas: 1) fireflies do not show any gender and are assumed as wherein obeys a Levy movement as follows:
unisex, 2) a firefly attractiveness is determined based on its λ(λ) sin(πλ/2) 1
≈ (s > 0) (9)
brightness seen by other insects and 3) if a firefly does not π s 1+λ
see any other type in its surrounding area, it can fly randomly -Modification 3: The third modification updates the value of
in the space. Compared to the particle swarm optimization, constant parameter α to provide a dynamic randomization in
FA is assumed as its advanced version. After calculating the the FA. It is well accepted in the society that a successful
objective function value for the firefly population, the best optimization algorithm should have a global search at the
solution is picked up and stored. The rest of the population beginning and then focuses on local search as iterations pass.
needs to improve. To this end, first the distance between any Therefore, a dynamic formulation is proposed for as follows:
two fireflies is calculated as follows [21]: 1 1
α I t er+1 = ( )( θ ×I ter ) α I t er ; θ ≥ 100 (10)
θ × I ter
d
ri j = X i − X j = (X i,k − X j,k )2 (4) Fig. 3 shows the flowchart of the proposed MFA.
k=1 Using the above evolutionary deep learning model,
the required toll for a powerful classification is ready. In order
It is clear that as the firefly is further, its attractiveness
to have a criterion for measuring the performance quality of
reduces. The firefly attractiveness can then be calculated as
the anomaly detection model in the vehicles, some indices are
an exponential function as follows [21]:
defined here. The model can make four different decisions
β(r ) = β0 × exp(−γ r m ); m ≥ 1 (5) based on the nature of data (real or fake) and decision
(positive or negative). A decision is called positive when
where β0 shows the initial attractiveness of a firefly at the the model recognize a data as fake data (compromised by
precise locality of another type. Moreover, γ is a constant hacker). A decision is negative when the model recognize
value representing the absorption coefficient. The dimension a data as healthy. A decision is true, when the model has
of each vector is show by d. Then, the firefly population made a correction decision. Therefore, a false decision is a
is motivated to move toward a possible better position as wrong decision by the model. These four decisions appear
follows [21]: on a confusion matrix as shown in Fig. 4. True positive (hit
X j = X j + β0 × exp(−γ r m ) × (X i − X j ) + u j rate or HR), false positive (False alarm Rate or FR), false
1 negative (Miss Rate or MR) and true negative (Correct Reject
u j = α(r and − ) (6) rate or CR) are these four indices.
2
Considering C A and C N as the compromised data and real
In (6), the first term is the previous position of the insect, the data, the above four indices are formulated as follows:
second term is the insect attractiveness and the third term is
|Hi |
the random movement in the air. HR = ; Hi = {Y ∈ D |Y ∈ C A & Y ∈ C O } (11)
The conventional FA is a successful metaheuristic algorithm |C A |
in solving the optimization problems. But still it can get |FA |
FR = ; F A = {Y ∈ D |Y ∈ C N & Y ∈ C O } (12)
improved by the usage of some powerful math operator. |C N |
Therefore, a three-stage modification is proposed in the rest. |Mi |
MR = ; Mi = {Y ∈ D |Y ∈ C A & Y ∈ C I } (13)
The proposed three-phase modification method can avoid |C A |
premature convergence by increasing the diversity of the firefly |C R |
DR = ; C R = {Y ∈ D |Y ∈ C N & Y ∈ C I } (14)
population and thus increasing the chance of a more successful |C N |
Authorized licensed use limited to: Cornell University Library. Downloaded on August 27,2020 at 13:08:52 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
KAVOUSI-FARD et al.: EVOLUTIONARY DEEP LEARNING-BASED ANOMALY DETECTION MODEL FOR SECURING VEHICLES 5
TABLE I
S AMPLE C AN B US M ESSAGE T RAFFIC C HARACTERISTICS [25]
Authorized licensed use limited to: Cornell University Library. Downloaded on August 27,2020 at 13:08:52 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
TABLE II
C ONFUSION M ATRIX VALUES FOR D IFFERENT A NOMALY D ETECTION
M ODEL , C OMPARED TO THE P ROPOSED E VOLUTIONARY GAN
Fig. 5. Convergence curve of the MFA, FA, PSO and GA when optimizing
the detection rate in GAN.
Authorized licensed use limited to: Cornell University Library. Downloaded on August 27,2020 at 13:08:52 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
KAVOUSI-FARD et al.: EVOLUTIONARY DEEP LEARNING-BASED ANOMALY DETECTION MODEL FOR SECURING VEHICLES 7
Fig. 7. Performance of the anomaly detection model for different message IDs in a varied frequencies.
In the last part, the anomaly detection model when facing and RFID car keys or long-range wireless channels such as
message traffic of the same ID but different frequencies are broadcast channels and addressable channels. Be on that, this
shown in Fig. 7. Some of the message IDs which possess a article aimed to propose an evolutionary deep learning based
varied frequency behavior are deployed here. In this figure, anomaly detection model, so called MFA-GAM, to secure the
the feasible frequency domain, within which each message ECU against message flooding attack.
ID frequency is accepted, along with infeasible regions are In comparison with the other anomaly detection models
shown in the same frame. The small green balls show the available in the literature, the proposed model has some special
lower and upper bound of this region for each message ID features as follows:
frequency domain. This figure gives an estimation on the very -Advanced Classification: By developing an evolutionary
wide frequency range of the messages from 40 to 110 whereas deep learning model, a new powerful classification method
the proposed evolutionary GAN anomaly detection model still based on modified firefly algorithm and generative adversarial
shows very good performance. As it can be seen from this networks is devised. The proposed model can be used in a
figure, each message ID has a healthy frequency domain quite quite varied application, not limited to the automotive industry,
different from the other message ID. but power system, electric grids, smart grids, etc. The proposed
Such a heterogeneous and varied features necessitates the deep learning model is benefited from the high learning
use of a powerful deep learning based model for a secured capability of the GAN as well as the random search capability
and reliable performance of the vehicle. of the evolutionary method.
-Secured ECU: Since most of the vehicles internal com-
V. D ISCUSSION munications still rely on the CAN protocol, the proposed
The cyber security of a vehicle is a precious and very classification model could be used a as a powerful anomaly
technical area which needs urgent attention due to the fast detection model which can assess the message traffic in CAN.
growing nature of this industry. With the recent development This will help to secure the ECU and thus the overall car
of the smart city and the appearance of new communication operation. Recording the normal operation of a vehicle from
technologies between the vehicles, this is getting more and starting to driving and stopping will help us to have a clear
more demanding for the future of human life. The automo- picture of the normal message traffic which flows during a
tive industry is experiencing a complex hardware-software normal operation. Any changes in the traffic can activate an
development which is highly computerized to improve its alarm signal which will put the car in an aware model.
services to the customers. On this way, several detection and -Powerful Optimizer: The proposed MFA is a very fast
vision algorithms are introduced by the developers to help converging and high-search capability algorithm which may be
get into this goal. However, still there are some requirements used in many upcoming applications as a powerful optimizer.
for accurate and fast performance of these algorithms, with- This is necessary due to the very complex and nonlinear
out which the vehicle normal operation would be affected. nature of the big data facing in the smart city. For the
Researchers have shown in that there are still several gaps in GAN, by generation a random generators set, it could help
the cars which can let hackers penetrate into the system, either to overcome the GAN drawbacks such as instability and com-
wired methods such as OBD-II and USB or wireless methods plex training. Being equipped with a three-stage modification
such as Bluetooth, remote keyless, entry, tire pressure sensors method, MFA can be widely used in many other applications
Authorized licensed use limited to: Cornell University Library. Downloaded on August 27,2020 at 13:08:52 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
when offline training. Still it should be noted that training is [10] Y. Li, Y. Tu, Q. Fan, C. Dong, and W. Wang, “Influence of cyber-attacks
happening offline, and the trained anomaly detection model is on longitudinal safety of connected and automated vehicles,” Accident
Anal. Prevention, vol. 121, pp. 148–156, Dec. 2018.
then used in some master ECUs for online detection. [11] G. Loukas, “Cyber-physical attacks on implants and vehicles,” in Cyber-
Physical Attacks. London, U.K.: Elsevier, 2015, pp. 59–104.
[12] G. Loukas, E. Karapistoli, E. Panaousis, P. Sarigiannidis, A. Bezemskij,
VI. C ONCLUSION and T. Vuong, “A taxonomy and survey of cyber-physical intrusion
detection approaches for vehicles,” Ad Hoc Netw., vol. 84, pp. 124–147,
This article tried to investigate the cyber security of CAN in Mar. 2019.
the vehicle for the message flooding cyber attacking. To this [13] B. Mohandes, R. Al Hammadi, W. Sanusi, T. Mezher, and S. El Khatib,
“Advancing cyber–physical sustainability through integrated analysis of
end, a deep anomaly detection model based on MFA and smart power systems: A case study on electric vehicles,” Int. J. Crit.
adversarial networks was proposed. Other than getting benefits Infrastruct. Protection, vol. 23, pp. 33–48, Dec. 2018.
of the GAN for deep training and modeling, it is benefited [14] S. Schulze, M. Pukall, G. Saake, T. Hoppe, and J. Dittmann, “On
the need of data management in automotive systems,” in Proc. BTW,
from the high search ability of MFA for finding the most vol. 144, 2009, pp. 217–266.
suitable generator in the GAN. The experimental results on [15] C. Ling and D. Feng, “An algorithm for detection of malicious messages
the recorded CAN message traffic reveals the high capability on can buses,” in Proc. Nat. Conf. Inf. Technol. Comput. Sci. Detroit,
MI, USA: Atlantis Press, 2012, pp. 1–4.
of the model for detecting true cyber attacks with high HR% [16] T. Hoppe, S. Kiltz, and J. Dittmann, “Security threats to automotive CAN
and CR%. Compared to other well-known classification algo- networks–practical examples and selected short-term countermeasures,”
rithms, this is secure model for detecting abnormal behaviors Reliab. Eng. Syst. Saf., vol. 96, no. 1, pp. 11–25, 2011.
[17] H. Oguma, A. Yoshioka, M. Nishikawa, R. Shigetomi, A. Otsuka, and
in the vehicle. It was seen that even though that there is a H. Imai, “New attestation based security architecture for in-vehicle com-
wide range of acceptable frequencies for each message ID, still munication,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM),
the proposed model has appropriate performance for covering Nov./Dec. 2008, pp. 1–6.
[18] M.-J. Kang and J.-W. Kang, “Intrusion detection system using deep
the entire domain. The vey low FP and FN, which generally neural network for in-vehicle network security,” PLoS ONE, vol. 11,
happens at the very neighboring areas of the normal frequency no. 6, Jun. 2016, Art. no. e0155781.
of the vehicle, advocate the high dependability of the proposed [19] L. Pan, X. Zheng, H. X. Chen, T. Luan, H. Bootwala, and L. Batten,
“Cyber security attacks to modern vehicular systems,” J. Inf. Secur.
cyber attack detection model. From the optimization point of Appl., vol. 36, pp. 90–100, Oct. 2017.
view, the high search capability of MFA over original FA, [20] H. M. D. Kabir, A. Khosravi, S. Nahavandi, and A. Kavousi-Fard,
PSO and GA for helping in the training process of GAN was “Partial adversarial training for neural network-based uncertainty quan-
tification,” IEEE Trans. Emerg. Topics Comput. Intell., early access,
demonstrated. The simulation results show that the proposed Sep. 5, 2019, doi: 10.1109/TETCI.2019.2936546.
anomaly detection model is so capable for stopping various [21] A. K. Fard and T. Niknam, “Optimal stochastic capacitor placement
cyber attacks in CAN bus. problem from the reliability and cost views using firefly algorithm,”
IET Sci., Meas. Technol., vol. 8, no. 5, pp. 260–269, 2014.
[22] R. Charette, “This car runs on code,” IEEE Spectr., vol. 46, no. 3, p. 3,
Feb. 2009.
R EFERENCES [23] M. Al-Saud, A. M. Eltamaly, M. A. Mohamed, and A. Kavousi-Fard,
“An intelligent data-driven model to secure intravehicle communications
[1] E. Mousavinejad, F. Yang, Q.-L. Han, X. Ge, and L. Vlacic, “Distributed based on machine learning,” IEEE Trans. Ind. Electron., vol. 67, no. 6,
cyber attacks detection and recovery mechanism for vehicle platoon- pp. 5112–5119, Jun. 2020.
ing,” IEEE Trans. Intell. Transp. Syst., early access, Aug. 21, 2019, [24] K. F. Abdollah, W. Su, and T. Jin, “A machine learning based
doi: 10.1109/TITS.2019.2934481. cyber attack detection model for wireless sensor networks in micro-
[2] S. Dey and M. Khanra, “Cybersecurity of plug-in electric vehicles: grids,” IEEE Trans. Ind. Informat., early access, Jan. 7, 2020,
Cyber attack detection during charging,” IEEE Trans. Ind. Electron., doi: 10.1109/TII.2020.2964704.
early access, Jan. 15, 2020, doi: 10.1109/TIE.2020.2965497. [25] A. Kavousi-Fard, T. Jin, W. Su, and N. Parsa, “An effective
[3] T. Chen, B. Zhang, H. Pourbabak, A. Kavousi-Fard, and W. Su, “Optimal anomaly detection model for securing communications in electric
routing and charging of an electric vehicle fleet for high-efficiency vehicles,” IEEE Trans. Ind. Appl., early access, Jun. 25, 2020,
dynamic transit systems,” IEEE Trans. Smart Grid, vol. 9, no. 4, doi: 10.1109/TIA.2020.3005062.
pp. 3563–3572, Jul. 2018. [26] O. Avatefipour et al., “An intelligent secured framework for cyberattack
[4] A. Kavousi-Fard, A. Abbasi, T. Niknam, and H. Taherpoor, “Multi- detection in electric vehicles’ CAN bus using machine learning,” IEEE
objective probabilistic reconfiguration considering uncertainty and multi- Access, vol. 7, pp. 127580–127592, 2019.
level load model,” IET Sci., Meas. Technol., vol. 9, no. 1, pp. 44–55,
Jan. 2015.
[5] S. Parkinson, P. Ward, K. Wilson, and J. Miller, “Cyber threats Abdollah Kavousi-Fard (Senior Member, IEEE)
facing autonomous and connected vehicles: Future challenges,” IEEE received the B.Sc. degree from the Shiraz University
Transactions on Intelligent Transportation Systems, vol. 18, no. 11, of Technology, Shiraz, Iran, in 2009, the M.Sc.
pp. 2898–2915, Nov. 2017. degree from Shiraz University, Shiraz, in 2011, and
[6] F. van Wyk, Y. Wang, A. Khojandi, and N. Masoud, “Real-time sensor the Ph.D. degree from the Shiraz University of
anomaly detection and identification in automated vehicles,” IEEE Trans. Technology in 2016, all in electrical engineering.
Intell. Transp. Syst., vol. 21, no. 3, pp. 1264–1276, Mar. 2020. He was a Post-Doctoral Research Assistant with the
[7] M. Ghanavati, A. Chakravarthy, and P. P. Menon, “Analysis of auto- University of Michigan, MI, USA, from 2016 to
motive cyber-attacks on highways using partial differential equation 2018. He was a Researcher with the University
models,” IEEE Trans. Control Netw. Syst., vol. 5, no. 4, pp. 1775–1786, of Denver, Denver, CO, USA, from 2015 to 2016,
Dec. 2018. conducting research on microgrids. He is currently
[8] A. Monot, N. Navet, B. Bavoux, and F. Simonot-Lion, “Multisource an Assistant Professor with the Shiraz University of Technology. He has
software on multicore automotive ECUs—Combining runnable sequenc- published more than 100 research papers in prestigious international journals
ing with task scheduling,” IEEE Trans. Ind. Electron., vol. 59, no. 10, and peer-reviewed conference proceedings. His current research interests
pp. 3934–3942, Oct. 2012. include operation, management and cyber security analysis of smart grids,
[9] F. Ahmad, F. Kurugollu, A. Adnane, R. Hussain, and F. Hussain, microgrids, smart city, electric vehicles and protection of power systems,
“MARINE: Man-in-the-Middle attack resistant trust model in connected reliability, artificial intelligence, and machine learning. He is an Associate
vehicles,” IEEE Internet Things J., vol. 7, no. 4, pp. 3310–3322, Editor of ISTE ISI Journal and the IEEE T RANSACTIONS ON I NDUSTRY
Apr. 2020. A PPLICATIONS.
Authorized licensed use limited to: Cornell University Library. Downloaded on August 27,2020 at 13:08:52 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
KAVOUSI-FARD et al.: EVOLUTIONARY DEEP LEARNING-BASED ANOMALY DETECTION MODEL FOR SECURING VEHICLES 9
Authorized licensed use limited to: Cornell University Library. Downloaded on August 27,2020 at 13:08:52 UTC from IEEE Xplore. Restrictions apply.