🔍 Research any topic with AI-powered citations — Try Researchly freeStart Researching
Home/Research/papers on flexray intrusion detection system
AI Research Answer

papers on flexray intrusion detection system

1 cited papers · May 12, 2026 · Powered by Researchly AI

🧠
TL;DR

Modern vehicles rely on a suite of in-vehicle communication protocols — including CAN, LIN, FlexRay, and Automotive Ethernet — to enable data exchange between E…

Modern vehicles rely on a suite of in-vehicle communication protocols — including CAN, LIN, FlexRay, and Automotive Ethernet — to enable data exchange between Electronic Control Units (ECUs). Ostojić & Stankovski (2025) The growing connectivity of these systems has expanded the attack surface, making intrusion detection a critical research priority for automotive cybersecurity.1

Aliwa et al. (2021)

1
CAMES: enabling centralized automotive embedded systems with time-sensitive networkXiangrui Yang, Chenglong Li et al.2021Proceedings of the SIGCOMM '21 Poster and Demo Sessions
View
  • FlexRay Protocol — A specialized deterministic automotive bus used to connect sensors, DCUs, and actuators within and between vehicle domains, alongside CAN and LIN. Yang et al. (2021)
1
  • Intrusion Detection Systems (IDS) — Security mechanisms deployed within vehicle networks to detect anomalous or malicious activity; they operate under constraints such as low bandwidth, small frame sizes, limited computational resources, and real-time sensitivity. Aliwa et al. (2021)
  • In-Vehicle Network Security — Encompasses cryptographic solutions, message authentication, and IDS approaches to address vulnerabilities arising from protocol design limitations and inadequate authentication or encryption mechanisms. Ostojić & Stankovski (2025)
  • Intelligent Transportation Systems (ITS) — A hyper-connected ecosystem of vehicles and infrastructure that supports multiple levels of autonomy, but introduces cybersecurity threats to safety and privacy of road users. Lamssaggad et al. (2021)
1
CAMES: enabling centralized automotive embedded systems with time-sensitive networkXiangrui Yang, Chenglong Li et al.2021Proceedings of the SIGCOMM '21 Poster and Demo Sessions
View
Want to research your own topic? Try it free →
Diagram
+-----------------------------+
| External Connectivity |
| (V2X, OBD-II, Telematics) |
+-------------+---------------+
 |
 v
+-----------------------------+
| In-Vehicle Network Layer |
| +---------+ +-----------+ |
| | FlexRay | | CAN Bus | |
| +---------+ +-----------+ |
| +---------+ +-----------+ |
| | LIN | | Auto Eth. | |
| +---------+ +-----------+ |
+-------------+---------------+
 |
 v
+-----------------------------+
| Domain Control Units (DCU) |
| (CPU + FPGA/GPU per domain)|
+-------------+---------------+
 |
 +-----+------+
 | |
 v v
 [Sensors / [Actuators /
 Cameras / Brake Sys /
 Radars] GPS]
 | |
 +-----+------+
 |
 v
+-----------------------------+
| Security Layer |
| - Message Authentication |
| - Cryptographic Solutions |
| - Intrusion Detection (IDS)|
+-----------------------------+

The retrieved evidence provides partial but relevant coverage of FlexRay IDS research:

Table
AspectDetail
Protocols StudiedCAN, LIN, FlexRay, Automotive Ethernet
Primary IDS ConstraintsLow bandwidth, small frame size, limited compute, real-time sensitivity
Security ApproachesEncryption, authentication, IDS (cryptographic & anomaly-based)
Attack SurfaceBoth internal (in-vehicle) and external (connected car interfaces)
Existing security mechanisms for in-vehicle networks focus on encryption, authentication, and IDS, but operate under significant constraints including real-time sensitivity and limited computational resources. Aliwa et al. (2021) The distributed architecture of automotive embedded systems — where FlexRay connects endpoints across domains — further complicates the deployment of centralized security monitoring.1Yang et al. (2021)1

Contemporary approaches to securing automotive communication include message authentication, intrusion detection systems, and cryptographic solutions, with cybersecurity principles needing to be incorporated at the architecture level. Ostojić & Stankovski (2025)

1
CAMES: enabling centralized automotive embedded systems with time-sensitive networkXiangrui Yang, Chenglong Li et al.2021Proceedings of the SIGCOMM '21 Poster and Demo Sessions
View
Want to research your own topic? Try it free →

The retrieved evidence does not contain papers that focus exclusively on FlexRay-specific IDS with empirical benchmark results or detection accuracy metrics. The surveys cover FlexRay as part of a broader protocol landscape, meaning FlexRay-specific IDS performance data, false positive rates, and detection latency figures cannot be supported from the retrieved papers.

  • FlexRay is identified as a key deterministic automotive bus alongside CAN and LIN, forming part of the critical in-vehicle network infrastructure that requires security protection. Yang et al. (2021)
1
  • CAN Bus is the most studied protocol for IDS, but FlexRay shares the same broader vulnerability landscape due to design-level security gaps. Aliwa et al. (2021)
  • Both cryptographic and IDS-based approaches are surveyed as countermeasures, but all face real-world deployment constraints in automotive environments. Aliwa et al. (2021)
  • Securing connected and autonomous vehicles requires embedding cybersecurity principles at the architectural level, not as an afterthought. Ostojić & Stankovski (2025)
  • The ITS security landscape highlights that expanding connectivity increases the attack surface across all in-vehicle protocols, including FlexRay. Lamssaggad et al. (2021)
1
CAMES: enabling centralized automotive embedded systems with time-sensitive networkXiangrui Yang, Chenglong Li et al.2021Proceedings of the SIGCOMM '21 Poster and Demo Sessions
View
Want to research your own topic? Try it free →
  1. "FlexRay anomaly detection machine learning automotive" — to find ML-based IDS papers specifically targeting FlexRay traffic patterns
  2. "In-vehicle network intrusion detection benchmark CAN FlexRay comparison" — to locate empirical evaluations comparing IDS performance across protocols
  3. "Automotive Ethernet time-sensitive networking security ECU" — to explore next-generation in-vehicle network security as FlexRay transitions to Ethernet-based architectures

Research smarter with AI-powered citations

Researchly finds and cites academic papers for any research topic in seconds. Used by students across India.