{"title":"A Cyber Resilient Framework for V2X Enabled Roundabouts in Intelligent Transportation Systems","authors":"Waseem Abbass;Nasim Abbas;Uzma Majeed;Waqas Nawaz;Qaiser Abbas;Ashfaq Hussain Farooqi","doi":"10.1109/ACCESS.2025.3604095","DOIUrl":null,"url":null,"abstract":"Vehicle-to-everything (V2X) communication systems are increasingly susceptible to cyber-physical threats that exploit trust assumptions, coordination latency, and semantic inconsistencies across agents. These vulnerabilities, particularly in dense or adversarial environments, undermine the reliability of cooperative perception, anomaly detection, and safety-critical maneuver execution. This paper presents CR-V2XR, a cross-layer, federated, and trust-aware coordination framework designed to enhance resilience in connected and autonomous vehicular networks. CR-V2XR integrates multi-modal anomaly detection with delay-sensitive trust estimation using features extracted from basic safety messages (BSMs), behavioral deviations, entropy shifts, and inter-vehicle trust validation. The architecture employs federated learning for distributed anomaly detection without centralized aggregation and uses a control layer that supports delay-aware trajectory selection. A multi-objective NSGA-III optimizer enables online trade-off adaptation across detection accuracy (DA), collision probability, and communication overhead. Simulations across eleven adversarial scenarios, including Sybil, wormhole, falsification, and replay attacks, demonstrate that CR-V2XR achieves 95% detection accuracy under worst-case attacks, reduces collision probability from 0.61 to 0.27 at 300 vehicles, maintains bounded delay, typically 45–60 ms under nominal load, and remains resilient under high-stress conditions with delays up to 180 ms and communication overhead (<inline-formula> <tex-math>$\\leq 6.1$ </tex-math></inline-formula> MB/s). Compared to centralized IDS and stateless baselines, CR-V2XR improves detection fidelity, scalability, and robustness under non-IID data and partial synchronization. These results establish CR-V2XR as a viable architecture for delay-constrained, trust-centric coordination in federated V2X environments subject to persistent adversarial threats.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"154775-154802"},"PeriodicalIF":3.6000,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11145039","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Access","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11145039/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Vehicle-to-everything (V2X) communication systems are increasingly susceptible to cyber-physical threats that exploit trust assumptions, coordination latency, and semantic inconsistencies across agents. These vulnerabilities, particularly in dense or adversarial environments, undermine the reliability of cooperative perception, anomaly detection, and safety-critical maneuver execution. This paper presents CR-V2XR, a cross-layer, federated, and trust-aware coordination framework designed to enhance resilience in connected and autonomous vehicular networks. CR-V2XR integrates multi-modal anomaly detection with delay-sensitive trust estimation using features extracted from basic safety messages (BSMs), behavioral deviations, entropy shifts, and inter-vehicle trust validation. The architecture employs federated learning for distributed anomaly detection without centralized aggregation and uses a control layer that supports delay-aware trajectory selection. A multi-objective NSGA-III optimizer enables online trade-off adaptation across detection accuracy (DA), collision probability, and communication overhead. Simulations across eleven adversarial scenarios, including Sybil, wormhole, falsification, and replay attacks, demonstrate that CR-V2XR achieves 95% detection accuracy under worst-case attacks, reduces collision probability from 0.61 to 0.27 at 300 vehicles, maintains bounded delay, typically 45–60 ms under nominal load, and remains resilient under high-stress conditions with delays up to 180 ms and communication overhead ($\leq 6.1$ MB/s). Compared to centralized IDS and stateless baselines, CR-V2XR improves detection fidelity, scalability, and robustness under non-IID data and partial synchronization. These results establish CR-V2XR as a viable architecture for delay-constrained, trust-centric coordination in federated V2X environments subject to persistent adversarial threats.
车辆到一切(V2X)通信系统越来越容易受到网络物理威胁的影响,这些威胁利用了信任假设、协调延迟和代理之间的语义不一致。这些漏洞,特别是在密集或敌对的环境中,会破坏协作感知、异常检测和安全关键机动执行的可靠性。本文提出了CR-V2XR,这是一个跨层、联合和信任感知的协调框架,旨在增强连接和自动驾驶汽车网络的弹性。CR-V2XR将多模态异常检测与延迟敏感信任估计相结合,利用从基本安全消息(BSMs)提取的特征、行为偏差、熵移和车辆间信任验证。该体系结构采用联邦学习进行分布式异常检测,而不需要集中聚合,并使用支持延迟感知轨迹选择的控制层。多目标NSGA-III优化器支持在线权衡适应,跨越检测精度(DA)、碰撞概率和通信开销。对包括Sybil、虫洞、伪造和重放攻击在内的11种敌对场景的模拟表明,CR-V2XR达到了95% detection accuracy under worst-case attacks, reduces collision probability from 0.61 to 0.27 at 300 vehicles, maintains bounded delay, typically 45–60 ms under nominal load, and remains resilient under high-stress conditions with delays up to 180 ms and communication overhead ( $\leq 6.1$ MB/s). Compared to centralized IDS and stateless baselines, CR-V2XR improves detection fidelity, scalability, and robustness under non-IID data and partial synchronization. These results establish CR-V2XR as a viable architecture for delay-constrained, trust-centric coordination in federated V2X environments subject to persistent adversarial threats.
IEEE AccessCOMPUTER SCIENCE, INFORMATION SYSTEMSENGIN-ENGINEERING, ELECTRICAL & ELECTRONIC
CiteScore
9.80
自引率
7.70%
发文量
6673
审稿时长
6 weeks
期刊介绍:
IEEE Access® is a multidisciplinary, open access (OA), applications-oriented, all-electronic archival journal that continuously presents the results of original research or development across all of IEEE''s fields of interest.
IEEE Access will publish articles that are of high interest to readers, original, technically correct, and clearly presented. Supported by author publication charges (APC), its hallmarks are a rapid peer review and publication process with open access to all readers. Unlike IEEE''s traditional Transactions or Journals, reviews are "binary", in that reviewers will either Accept or Reject an article in the form it is submitted in order to achieve rapid turnaround. Especially encouraged are submissions on:
Multidisciplinary topics, or applications-oriented articles and negative results that do not fit within the scope of IEEE''s traditional journals.
Practical articles discussing new experiments or measurement techniques, interesting solutions to engineering.
Development of new or improved fabrication or manufacturing techniques.
Reviews or survey articles of new or evolving fields oriented to assist others in understanding the new area.