Li Junjun, Ma Yanyan, Bai Jiahui, Chen Congming, Xu Tingting, Ding Chi
School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou 450001, China.
Longmen Laboratory, Luoyang 471000, China.
Sensors (Basel). 2025 Jul 25;25(15):4622. doi: 10.3390/s25154622.
The rapid integration of complex sensors and electronic control units (ECUs) in autonomous vehicles significantly increases cybersecurity risks in vehicular networks. Although the Controller Area Network (CAN) is efficient, it lacks inherent security mechanisms and is vulnerable to various network attacks. The traditional Intrusion Detection System (IDS) makes it difficult to effectively deal with the dynamics and complexity of emerging threats. To solve these problems, a lightweight vehicular network intrusion detection framework based on Dynamic Feature Fusion Federated Learning (DFF-FL) is proposed. The proposed framework employs a two-stream architecture, including a transformer-augmented autoencoder for abstract feature extraction and a lightweight CNN-LSTM-Attention model for preserving temporal and local patterns. Compared with the traditional theoretical framework of the federated learning, DFF-FL first dynamically fuses the deep feature representation of each node through the transformer attention module to realize the fine-grained cross-node feature interaction in a heterogeneous data environment, thereby eliminating the performance degradation caused by the difference in feature distribution. Secondly, based on the final loss LAEX,X^ index of each node, an adaptive weight adjustment mechanism is used to make the nodes with excellent performance dominate the global model update, which significantly improves robustness against complex attacks. Experimental evaluation on the CAN-Hacking dataset shows that the proposed intrusion detection system achieves more than 99% F1 score with only 1.11 MB of memory and 81,863 trainable parameters, while maintaining low computational overheads and ensuring data privacy, which is very suitable for edge device deployment.
复杂传感器和电子控制单元(ECU)在自动驾驶车辆中的快速集成显著增加了车辆网络中的网络安全风险。尽管控制器局域网(CAN)效率很高,但它缺乏固有的安全机制,容易受到各种网络攻击。传统的入侵检测系统(IDS)难以有效应对新出现威胁的动态性和复杂性。为了解决这些问题,提出了一种基于动态特征融合联邦学习(DFF-FL)的轻量级车辆网络入侵检测框架。所提出的框架采用双流架构,包括用于抽象特征提取的基于Transformer增强的自动编码器和用于保留时间和局部模式的轻量级CNN-LSTM-Attention模型。与传统的联邦学习理论框架相比,DFF-FL首先通过Transformer注意力模块动态融合每个节点的深度特征表示,以在异构数据环境中实现细粒度的跨节点特征交互,从而消除由特征分布差异导致的性能下降。其次,基于每个节点的最终损失LAEX,X^指数,使用自适应权重调整机制使性能优异的节点主导全局模型更新,这显著提高了对复杂攻击的鲁棒性。在CAN-Hacking数据集上的实验评估表明,所提出的入侵检测系统在仅1.11 MB内存和81,863个可训练参数的情况下,F1分数达到99%以上,同时保持低计算开销并确保数据隐私,非常适合边缘设备部署。