papers on flexray intrusion detection system
1 cited papers · May 12, 2026 · Powered by Researchly AI
Modern vehicles rely on a suite of in-vehicle communication protocols — including CAN, LIN, FlexRay, and Automotive Ethernet — to enable data exchange between E…
Aliwa et al. (2021)
- FlexRay Protocol — A specialized deterministic automotive bus used to connect sensors, DCUs, and actuators within and between vehicle domains, alongside CAN and LIN. Yang et al. (2021)
- Intrusion Detection Systems (IDS) — Security mechanisms deployed within vehicle networks to detect anomalous or malicious activity; they operate under constraints such as low bandwidth, small frame sizes, limited computational resources, and real-time sensitivity. Aliwa et al. (2021)
- In-Vehicle Network Security — Encompasses cryptographic solutions, message authentication, and IDS approaches to address vulnerabilities arising from protocol design limitations and inadequate authentication or encryption mechanisms. Ostojić & Stankovski (2025)
- Intelligent Transportation Systems (ITS) — A hyper-connected ecosystem of vehicles and infrastructure that supports multiple levels of autonomy, but introduces cybersecurity threats to safety and privacy of road users. Lamssaggad et al. (2021)
+-----------------------------+ | External Connectivity | | (V2X, OBD-II, Telematics) | +-------------+---------------+ | v +-----------------------------+ | In-Vehicle Network Layer | | +---------+ +-----------+ | | | FlexRay | | CAN Bus | | | +---------+ +-----------+ | | +---------+ +-----------+ | | | LIN | | Auto Eth. | | | +---------+ +-----------+ | +-------------+---------------+ | v +-----------------------------+ | Domain Control Units (DCU) | | (CPU + FPGA/GPU per domain)| +-------------+---------------+ | +-----+------+ | | v v [Sensors / [Actuators / Cameras / Brake Sys / Radars] GPS] | | +-----+------+ | v +-----------------------------+ | Security Layer | | - Message Authentication | | - Cryptographic Solutions | | - Intrusion Detection (IDS)| +-----------------------------+
The retrieved evidence provides partial but relevant coverage of FlexRay IDS research:
| Aspect | Detail |
|---|---|
| Protocols Studied | CAN, LIN, FlexRay, Automotive Ethernet |
| Primary IDS Constraints | Low bandwidth, small frame size, limited compute, real-time sensitivity |
| Security Approaches | Encryption, authentication, IDS (cryptographic & anomaly-based) |
| Attack Surface | Both internal (in-vehicle) and external (connected car interfaces) |
Contemporary approaches to securing automotive communication include message authentication, intrusion detection systems, and cryptographic solutions, with cybersecurity principles needing to be incorporated at the architecture level. Ostojić & Stankovski (2025)
The retrieved evidence does not contain papers that focus exclusively on FlexRay-specific IDS with empirical benchmark results or detection accuracy metrics. The surveys cover FlexRay as part of a broader protocol landscape, meaning FlexRay-specific IDS performance data, false positive rates, and detection latency figures cannot be supported from the retrieved papers.
- FlexRay is identified as a key deterministic automotive bus alongside CAN and LIN, forming part of the critical in-vehicle network infrastructure that requires security protection. Yang et al. (2021)
- CAN Bus is the most studied protocol for IDS, but FlexRay shares the same broader vulnerability landscape due to design-level security gaps. Aliwa et al. (2021)
- Both cryptographic and IDS-based approaches are surveyed as countermeasures, but all face real-world deployment constraints in automotive environments. Aliwa et al. (2021)
- Securing connected and autonomous vehicles requires embedding cybersecurity principles at the architectural level, not as an afterthought. Ostojić & Stankovski (2025)
- The ITS security landscape highlights that expanding connectivity increases the attack surface across all in-vehicle protocols, including FlexRay. Lamssaggad et al. (2021)
- "FlexRay anomaly detection machine learning automotive" — to find ML-based IDS papers specifically targeting FlexRay traffic patterns
- "In-vehicle network intrusion detection benchmark CAN FlexRay comparison" — to locate empirical evaluations comparing IDS performance across protocols
- "Automotive Ethernet time-sensitive networking security ECU" — to explore next-generation in-vehicle network security as FlexRay transitions to Ethernet-based architectures
Research smarter with AI-powered citations
Researchly finds and cites academic papers for any research topic in seconds. Used by students across India.