An Efficient Cybersecurity Spoofing Attacks Detection‎Framework in Vehicular Networks Using Hybridized ‎Dilated and Attention-Based Network

  • Authors

    https://doi.org/10.14419/m4s0q161

    Received date: July 14, 2025

    Accepted date: August 24, 2025

    Published date: September 4, 2025

  • Cybersecurity Spoofing Attack Detection; Vehicular Network; Fitness Entrenched Coronavirus Mask Protection Algorithm; ‎Restricted Boltzmann Machine; Hybrid Dilated and Attention-Based Network; Deep Temporal Convolution Network; Residual ‎Long Short Term Memory network.
  • Abstract

    Due to the growing cybersecurity threats, the privacy and security of modern vehicles have become increasingly significant. ‎Cyber offenses in vehicular networks are recognized using an Intrusion Detection System (IDS). The rapid growth of multimedia technologies has made cybersecurity an essential concern.. Automated and internet-connected cars are exposed to spoofing ‎and jammer attacks. GPS location spoofing is an imminent danger to Connected and Autonomous Vehicles (CAV), threatening ‎security and even exposing motorists and pedestrians to risk. Because of flawed protocol design and increased interconnectivity ‎among modern autonomous vehicles, the Controller Area Network (CAN) bus is insecure. The identification of spoofing ‎attacks on the CAN bus is critical. Hence, it is necessary to develop an efficient spoofing attack detection method to address the ‎limitations of existing models. The major phases of the developed framework are (a) Data Collection, (b) Data Pre-processing, ‎‎(c) Weighted Feature Selection, and (d) Attack Detection. At first, essential data utilized for the validation is collected in the ‎standard dataset. Further, the gathered time series data is given as input to the data pre-processing phase. Later, the attained pre-‎processed data is utilized to collect the essential features. Further, in the weighted feature selection phase, the Restricted Boltz-‎mann Machine (RBM) technique is utilized to attain the significant features. Unlike the conventional CMPA, the proposed FE-CMPA introduces a fitness-entrenchment mechanism that improves the optimization of RBM feature weights and enhances ‎relief score maximization. Subsequently, the acquired weighted RBM features are provided for the attack detection phase. Fur-‎Furthermore, the spoofing attacks are detected using the developed Hybrid Dilated and Attention-based Network (HD-ANet), ‎which holds the Deep Temporal Convolution Network (DTCN) and Residual Long Short Term Memory (RLSTM) network ‎for effective validation. Hence, the implemented spoofing attack detection model is more secure and achieves a comparatively ‎higher detection rate than traditional approaches in various experimental evaluations.

  • References

    1. Baldini, G. 2022. “Detection of cybersecurity spoofing attacks in vehicular networks with recurrence quantification analysis.” Computer Communications 191:486-499. https://doi.org/10.1016/j.comcom.2022.05.021.
    2. Baldoni, S., Battisti, F., and Neri. A. 2020. “On the Use of Differential Correction Clustering for Facing Spoofing Attacks to GNSS Augmentation Networks.” IEEE Access 8 :219903-219922. https://doi.org/10.1109/ACCESS.2020.3042469.
    3. Cai, X., Hu, S., and Lin, X. 2012. “Feature extraction using Restricted Boltzmann Machine for stock price prediction.” IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China, 2012:80-83. https://doi.org/10.1109/CSAE.2012.6272913.
    4. Chang, J., Zhang, L., Hsu, L. -T., Xu, B., Huang, F and Xu. D. 2022. “Analytic Models of a Loosely Coupled GNSS/INS/LiDAR Kalman Filter Considering Update Frequency Under a Spoofing Attack.” IEEE Sensors Journal 22(23):23341-23355. https://doi.org/10.1109/JSEN.2022.3212977.
    5. Chauhan S. V. S., and Gao. G. X. 2021. “Synchrophasor Data Under GPS Spoofing: Attack Detection and Mitigation Using Residuals.” IEEE Transactions on Smart Grid 12(4):3415-3424. https://doi.org/10.1109/TSG.2021.3051926.
    6. Dasgupta, S., Ghosh, T and Rahman. M. 2022b. “A Reinforcement Learning Approach for Global Navigation Satellite System Spoofing Attack Detection in Autonomous Vehicles.” arXiv pre print 2676 12. https://doi.org/10.1177/03611981221095509.
    7. Dasgupta, S., Rahman, M., Islam, M and Chowdhury. M. 2022a. “A Sensor Fusion-Based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles.” IEEE Transactions on Intelligent Transportation Systems 23(12):23559-23572. https://doi.org/10.1109/TITS.2022.3197817.
    8. Demir, M. Ö., Kurt, G. K., and Pusane, A. E. 2023. “A Pseudorange-Based GPS Spoofing Detection Using Hyperbola Equations.” IEEE Transactions on Vehicular Technology 72(8):10770-10783. https://doi.org/10.1109/TVT.2023.3257228.
    9. Dora, V.R.S and Naga Lakshmi, V. 2024. ORCID Icon "Smart network security using advanced ensemble-DDoS attack detection and hybrid JA-SLOA-linked optimal routing-based mitigation", Australian Journal of Electrical and Electronics Engineering 21. doi: https://doi.org/10.1080/1448837X.2024.2335797.
    10. Fan, Y., Zhang, Z., Trinkle, M., Dimitrovski, A. D., Song, J. B., and Li, H. 2015. “A Cross-Layer Defense Mechanism Against GPS Spoofing Attacks on PMUs in Smart Grids.” IEEE Transactions on Smart Grid 6(6):2659-2668. https://doi.org/10.1109/TSG.2014.2346088.
    11. Fazil, M., Sah, A.K and Abulaish, M. 2021.“DeepSBD: A Deep Neural Network Model With Attention Mechanism for SocialBot Detection.” IEEE Transactions on information forensics and security 4211-4223 16. https://doi.org/10.1109/TIFS.2021.3102498.
    12. Gers, Felix, A., Nicol, N. Schraudolph, and Schmidhuber, J. 2002."Learning precise timing with LSTM recurrent networks." Journal of machine learning research 3:115-143.
    13. Hoang, T. M., van Chien, T., van Luong, T., Chatzinotas, S., B. Ottersten and L. Hanzo. 2022. “Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders.” IEEE Transactions on Information Forensics and Security 17:1010-1023, https://doi.org/10.1109/TIFS.2022.3155970.
    14. Jang, Beakcheol, Kim, M., Harerimana, G., Kang, S and Kim, J. W. 2020 . "Bi-LSTM model to increase accuracy in text classification: Combining Word2vec CNN and attention mechanism." Applied Sciences 10:5841: 17. https://doi.org/10.3390/app10175841.
    15. Jannu, C and Vanambathina, S.D. 2023a. “An Overview of Speech Enhancement Based on Deep Learning Techniques", International Journal of Image and Graphics. https://doi.org/10.1142/S0219467825500019.
    16. Jannu, C., and Vanambathina, SD. 2023b. “An attention based densely connected U-NET with convolutional GRU for speech enhancement.” 2023 3rd International conference on Artificial Intelligence and Signal Processing (AISP)):1-5. https://doi.org/10.1109/AISP57993.2023.10134933.
    17. Kaveh, A and Eslamlou, A.D. 2020. "Water strider algorithm: A new metaheuristic and applications." In Structures 25:520-541. Elsevier, https://doi.org/10.1016/j.istruc.2020.03.033.
    18. Kim, C., Chang, S. -Y., Lee, D., Kim, J., Park, K and Kim, J. 2023. “Reliable Detection of Location Spoofing and Variation Attacks.” IEEE Access 11:10813-10825. https://doi.org/10.1109/ACCESS.2023.3241236.
    19. Kim, J., El-Khamy, M., Lee, J. 2017. “Residual LSTM: Design of a Deep Recurrent Architecture for Distant SpeechRecognition.” arXiv:1701.03360v3 [cs.LG]. https://doi.org/10.21437/Interspeech.2017-477.
    20. Kumari, T.L and Babu, A.R. 2024. “Genetic fuzzy rules and hybrid QDCNN-F-DSAE for detecting attacker behavior with tuning of firewall", Australian Journal of Electrical and Electronics Engineering. https://doi.org/10.1080/1448837X.2024.2373528.
    21. Li, N., Xia, S., Tao, X., Zhang, Z & Wang, X. 2020. “An area-based physical layer authentication framework to detect spoofing attacks.” Science China Information Sciences 63 222302. https://doi.org/10.1007/s11432-019-2802-x.
    22. Li, W., Wang, N., Jiao, L., and Zeng. K. 2021. “Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks.” IEEE Access 9:60419-60432. https://doi.org/10.1109/ACCESS.2021.3073115.
    23. Li, Yanyu, Yuan, G., Wen, Y., Hu, J., Evangelidis, G., Tulyakov, S., Wang, Y and Ren, J. 2022. "Efficientformer: Vision transformers at mobilenet speed." Advances in Neural Information Processing Systems 35 12934-12949.
    24. Liu, X., Li, B., Chen, H., Sun, Z., Liang, Y. C and Zhao C. 2019. “Detecting Pilot Spoofing Attack in MISO Systems With Trusted User.” IEEE Communications Letters 23(2):314-317. https://doi.org/10.1109/LCOMM.2018.2889491.
    25. Naghdiani, Maryam, Jahanshahi, M and Matin, R.K. 2023. "A Garter Snake Optimization Algorithm for Constrained Optimization." Research square. https://doi.org/10.21203/rs.3.rs-2899298/v1.
    26. Pham, C., Nguyen, L., Nguyen, A., Nguyen, N., Van-Toi, Nguyen. 2021. “Combining skeleton and accelerometer data for human fine-grained activity recognition and abnormal behavior detection with deep temporal convolutional networks.” Multimedia Tools and Applications 80:28919–28940. https://doi.org/10.1007/s11042-021-11058-w.
    27. Pinto, A., Schwartz, W. R., Pedrini, H., and Rocha, A. d. R. 2015. “Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks.” IEEE Transactions on Information Forensics and Security 10(5):1025-1038. https://doi.org/10.1109/TIFS.2015.2395139.
    28. Qiu, W., Li, C., Tang, Q., Sun, K., Liu, Y., and Yao. W. 2022. “Attack Detection for Spoofed Synchrophasor Measurements Using Segmentation Network.” CSEE Journal of Power and Energy Systems 8(5):1327-1337. https://doi.org/10.17775/CSEEJPES.2021.02780.
    29. Qiu, W., Tang, Q., Wang, Y., Zhan, L., Liu, Y and Yao. W. 2020. “Multi-View Convolutional Neural Network for Data Spoofing Cyber-Attack Detection in Distribution synchrophasors.” IEEE Transactions on Smart Grid 11(4):3457-3468. https://doi.org/10.1109/TSG.2020.2971148
    30. Rattani, A., Scheirer, W. J., and Ross, A. 2015. “Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials.” IEEE Transactions on Information Forensics and Security 10(11):2447-2460. https://doi.org/10.1109/TIFS.2015.2464772.
    31. Salim, A., Jummar, W.K., Jasim, F.M and Yousif, M. 2022. “Eurasian oystercatcher optimiser: New meta-heuristic algorithm.” From the journal Journal of Intelligent System. https://doi.org/10.1515/jisys-2022-0017
    32. Sanders, C and Wang, Y. 2020. “Localizing Spoofing Attacks on Vehicular GPS Using Vehicle-to-Vehicle Communications.” IEEE Transactions on Vehicular Technology 69(12):15656-15667. https://doi.org/10.1109/TVT.2020.3031576.
    33. Schmidt, E., Gatsis, N., and Akopian, D. 2020. “A GPS Spoofing Detection and Classification Correlator-Based Technique Using the LASSO.” IEEE Transactions on Aerospace and Electronic Systems 56(6):4224-4237. https://doi.org/10.1109/TAES.2020.2990149.
    34. Shabbir, M., Kamal, M., Ullah, Z and Khan M. M. 2023. “Securing Autonomous Vehicles Against GPS Spoofing Attacks: A Deep Learning Approach.” IEEE Access 11:105513-105526. https://doi.org/10.1109/ACCESS.2023.3319514.
    35. Shiaeles S. N., and M. Papadaki. 2015. “FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks.” the Computer Journal 58(4):892-903. https://doi.org/10.1093/comjnl/bxu007.
    36. Theyazn, H., Aldhyani, H and Alkahtani. H. 2022. “Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity" 22(360). doi: https://doi.org/10.3390/s22010360.
    37. Valderrama, W., Magadán, A., Vergara, O. O., Ruiz, J., Pinto, R and Reyes, G. 2022. “Detection of Facial Spoofing Attacks in Uncontrolled Environments Using ELBP and Color Models.” IEEE Latin America Transactions 20(6):875-883. https://doi.org/10.1109/TLA.2022.9757369.
    38. Vitale, C., Piperigkos, N., Laoudias, C., Ellinas, G., Casademont, J., Escrig, J, Kloukiniotis, A., Lalos, A.S., Moustakas, K., Rodriguez, R.D., Baños. D., Crusats, G.R., Kapsalas, P., Hofmann, K & Khodashenas, PS. 2021. “CARAMEL: results on a secure architecture for connected and autonomous vehicles detecting GPS spoofing attacks.” EURASIP Journal on Wireless Communications and Networking 115, https://doi.org/10.1186/s13638-021-01971-x.
    39. Xiong, Q., Liang, Y. -C., Li, K. H and Gong, Y. 2015. “An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems.” IEEE Transactions on Information Forensics and Security 10(5):932-940. https://doi.org/10.1109/TIFS.2015.2392564.
    40. Yang, Y., Duan, Z and Tehranipoor, M. 2020. “Identify a Spoofing Attack on an In-Vehicle CAN Bus Based on the Deep Features of an ECU Fingerprint Signal.” Smart Cities 3(1):17-30. https://doi.org/10.3390/smartcities3010002
    41. Yuan, Y., Shen, Q., Wang, S., Ren, J., Yang, D., Yang, Q., Fan, J & Mu. X. 2023. “Coronavirus Mask Protection Algorithm: A New Bio-inspired Optimization Algorithm and Its Applications.” Journal of Bionic Engineering 20:1747–1765. https://doi.org/10.1007/s42235-023-00359-5
    42. Zhang, J ., Lu, C., Wang, J., Wang, L and Yue X. 2019 . “Concrete Cracks Detection Based on FCN with Dilated Convolution.” Applied Science 9:2686. https://doi.org/10.3390/app9132686
    43. D. Y. Bhadane, I. S. Borse, “An Intelligent Ensemble Deep Learning Techniques with Improved Owl Search Algorithm-Aided Optimal Feature Selection for Predicting the Presence of Heart Diseases”, International Journal of Image and Graphic, 2025 https://doi.org/10.1142/S0219467827500215
    44. R. V. Patil, R. M. Patil, D. Y. Bhadane, G. M. Poddar, A. L. Wakekar, & S. R. Patil, “Adaptive Cheetah Optimization-Driven CNN: A Hybrid Approach for Robust Image Segmentation.”, International Journal of Basic and Applied Sciences, 14(2), 691-702, Aug. 2025. https://doi.org/10.14419/c62avh78.
    45. Chetan Gode, Bhushan Marutirao Nanche, Dharmesh Dhabliya, Rahul Dnyanoba Shelke, , Rajendra V Patil. & Shushma Bhosle, “Dynamic neural architecture search : A pathway to efficiently optimized deep learning models” , Journal of Information and Optimization Sciences, 46:4-A, 1117–1127, 2025, https://doi.org/10.47974/JIOS-1896.
    46. A. Hidayat, A. Nurfikri, D. V. Priya, R. V. Patil, V. R. Hire and N. S, "Statistical Methods for Big Data Analysis in Technological Systems," 2025 International Conference on Frontier Technologies and Solutions (ICFTS), Chennai, India, 2025, pp. 1-7, https://doi.org/10.1109/ICFTS62006.2025.11031562.
    47. J. S. R, R. V. Patil, Y. S, P. M, S. S and R. Maranan, "Spilled Deep Capsule Neural Network with Skill Optimization Algorithm for Breast Cancer Recognition in Mammograms," 2025 International Conference on Inventive Computation Technologies (ICICT), Kirtipur, Nepal, 2025, pp. 632-637, https://doi.org/10.1109/ICICT64420.2025.11004784
    48. B. Gudivaka, N. Anute, Y. Ramaswamy, V. N. Sankaran, R. V. Patil and J. N, "Fog and Edge Computing: Bridging the Gap Between Cloud and IoT," 2025 International Conference on Frontier Technologies and Solutions (ICFTS), Chennai, India, 2025, pp. 1-7, https://doi.org/10.1109/ICFTS62006.2025.11031558.
  • Downloads

  • How to Cite

    Deshmukh, V. R. ., & Borse, D. I. S. . (2025). An Efficient Cybersecurity Spoofing Attacks Detection‎Framework in Vehicular Networks Using Hybridized ‎Dilated and Attention-Based Network. International Journal of Basic and Applied Sciences, 14(5), 114-130. https://doi.org/10.14419/m4s0q161