{"id":"https://openalex.org/W4413267776","doi":"https://doi.org/10.1109/jiot.2025.3590966","title":"A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles","display_name":"A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles","publication_year":2025,"publication_date":"2025-07-28","ids":{"openalex":"https://openalex.org/W4413267776","doi":"https://doi.org/10.1109/jiot.2025.3590966"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3590966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3590966","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2505.16215","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065107822","display_name":"Md. Ashraf Uddin","orcid":"https://orcid.org/0000-0002-4316-4975"},"institutions":[{"id":"https://openalex.org/I1340949323","display_name":"Crown College","ror":"https://ror.org/059617j81","country_code":"US","type":"education","lineage":["https://openalex.org/I1340949323"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Ashraf Uddin","raw_affiliation_strings":["School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia","School of Information Technology, Crown Institute of Higher Education, Australia"],"raw_orcid":"https://orcid.org/0000-0002-4316-4975","affiliations":[{"raw_affiliation_string":"School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia","institution_ids":[]},{"raw_affiliation_string":"School of Information Technology, Crown Institute of Higher Education, Australia","institution_ids":["https://openalex.org/I1340949323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052317784","display_name":"Nam H. Chu","orcid":"https://orcid.org/0000-0001-5652-7408"},"institutions":[{"id":"https://openalex.org/I1340949323","display_name":"Crown College","ror":"https://ror.org/059617j81","country_code":"US","type":"education","lineage":["https://openalex.org/I1340949323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nam H. Chu","raw_affiliation_strings":["School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia","School of Information Technology, Crown Institute of Higher Education, Australia"],"raw_orcid":"https://orcid.org/0000-0001-5652-7408","affiliations":[{"raw_affiliation_string":"School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia","institution_ids":[]},{"raw_affiliation_string":"School of Information Technology, Crown Institute of Higher Education, Australia","institution_ids":["https://openalex.org/I1340949323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078027689","display_name":"Reza Rafeh","orcid":null},"institutions":[{"id":"https://openalex.org/I1340949323","display_name":"Crown College","ror":"https://ror.org/059617j81","country_code":"US","type":"education","lineage":["https://openalex.org/I1340949323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Reza Rafeh","raw_affiliation_strings":["School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia","School of Information Technology, Crown Institute of Higher Education, Australia"],"raw_orcid":"https://orcid.org/0000-0001-5141-0534","affiliations":[{"raw_affiliation_string":"School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia","institution_ids":[]},{"raw_affiliation_string":"School of Information Technology, Crown Institute of Higher Education, Australia","institution_ids":["https://openalex.org/I1340949323"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042548094","display_name":"Mutaz Barika","orcid":"https://orcid.org/0000-0002-9146-2459"},"institutions":[{"id":"https://openalex.org/I1340949323","display_name":"Crown College","ror":"https://ror.org/059617j81","country_code":"US","type":"education","lineage":["https://openalex.org/I1340949323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mutaz Barika","raw_affiliation_strings":["School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia","School of Information Technology, Crown Institute of Higher Education, Australia"],"raw_orcid":"https://orcid.org/0000-0002-9146-2459","affiliations":[{"raw_affiliation_string":"School of Information Technology, Crown Institute of Higher Education, North Sydney, NSW, Australia","institution_ids":[]},{"raw_affiliation_string":"School of Information Technology, Crown Institute of Higher Education, Australia","institution_ids":["https://openalex.org/I1340949323"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5065107822"],"corresponding_institution_ids":["https://openalex.org/I1340949323"],"apc_list":null,"apc_paid":null,"fwci":7.8625,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.97391328,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":"20","first_page":"41591","last_page":"41607"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9437000155448914,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7921350002288818},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7089848518371582},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6292819380760193},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5338044762611389},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47338834404945374},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.45998021960258484},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4406222701072693},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3620259761810303},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1489327847957611}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7921350002288818},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7089848518371582},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6292819380760193},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5338044762611389},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47338834404945374},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.45998021960258484},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4406222701072693},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3620259761810303},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1489327847957611}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/jiot.2025.3590966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3590966","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2505.16215","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2505.16215","pdf_url":"https://arxiv.org/pdf/2505.16215","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:figshare.com:article/29906366","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2505.16215","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2505.16215","pdf_url":"https://arxiv.org/pdf/2505.16215","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413267776.pdf","grobid_xml":"https://content.openalex.org/works/W4413267776.grobid-xml"},"referenced_works_count":53,"referenced_works":["https://openalex.org/W1994896443","https://openalex.org/W2099940443","https://openalex.org/W2135046866","https://openalex.org/W2143426320","https://openalex.org/W2296509296","https://openalex.org/W2509527900","https://openalex.org/W2790544619","https://openalex.org/W2897929592","https://openalex.org/W2905365817","https://openalex.org/W2944675796","https://openalex.org/W2959120033","https://openalex.org/W2969863169","https://openalex.org/W2977730413","https://openalex.org/W2982682021","https://openalex.org/W2997591727","https://openalex.org/W3003727567","https://openalex.org/W3012893977","https://openalex.org/W3016326653","https://openalex.org/W3017293089","https://openalex.org/W3023238316","https://openalex.org/W3034951268","https://openalex.org/W3041194909","https://openalex.org/W3042715689","https://openalex.org/W3110819044","https://openalex.org/W3132842072","https://openalex.org/W3161501844","https://openalex.org/W3162956350","https://openalex.org/W3164321464","https://openalex.org/W3174174440","https://openalex.org/W3188319173","https://openalex.org/W3189163924","https://openalex.org/W3192721019","https://openalex.org/W3206599325","https://openalex.org/W3209227865","https://openalex.org/W4306760877","https://openalex.org/W4310153191","https://openalex.org/W4311399005","https://openalex.org/W4352976871","https://openalex.org/W4379409137","https://openalex.org/W4388326161","https://openalex.org/W4396707597","https://openalex.org/W4396785485","https://openalex.org/W4399675630","https://openalex.org/W4402002228","https://openalex.org/W4403079902","https://openalex.org/W4403448273","https://openalex.org/W4403637510","https://openalex.org/W4404356815","https://openalex.org/W4404612232","https://openalex.org/W4404656028","https://openalex.org/W4407272473","https://openalex.org/W4409171541","https://openalex.org/W4409342644"],"related_works":["https://openalex.org/W1982914007","https://openalex.org/W2159583675","https://openalex.org/W2392603527","https://openalex.org/W1824242903","https://openalex.org/W1493858311","https://openalex.org/W2155470929","https://openalex.org/W2390009783","https://openalex.org/W2111125783","https://openalex.org/W2394465510","https://openalex.org/W2348767155"],"abstract_inverted_index":{"Due":[0,88],"to":[1,18,53,57,89,102,109,124,154,166,208,269],"its":[2,84],"nature":[3],"of":[4,13,22,29,171,198,241,257],"dynamic,":[5],"mobility,":[6],"and":[7,33,55,61,126,130,157,192,212,229,239,255,272,284],"wireless":[8],"data":[9,210],"transfer,":[10],"the":[11,45,114,121,195,203,223,237,253,277,279],"Internet":[12],"Vehicles":[14],"(IoV)":[15],"is":[16],"susceptible":[17],"a":[19,40,298],"wide":[20],"range":[21],"cyber":[23,104],"threats,":[24,105],"including":[25],"spoofing,":[26],"Distributed":[27],"Denial":[28],"Service":[30],"(DDoS)":[31],"attacks,":[32],"malware.":[34],"intrusion":[35,258],"detection":[36,182,259,267],"systems":[37,96,314],"(IDS)":[38],"play":[39],"vital":[41],"role":[42],"in":[43,64,244,260,307],"protecting":[44],"IoV":[46,148,225,246,262],"ecosystem":[47],"by":[48],"continuously":[49],"monitoring":[50],"network":[51,285],"traffic":[52],"detect":[54,103],"respond":[56],"intrusions,":[58],"malicious":[59],"activities,":[60],"policy":[62],"violations":[63],"real":[65],"time.":[66],"However,":[67],"most":[68],"existing":[69],"research":[70],"has":[71],"focused":[72],"on":[73,99],"centralized,":[74],"machine":[75],"learning":[76,132],"(ML)-based":[77],"IDS":[78],"solutions":[79],"for":[80,147,187,276,301],"IoV,":[81],"often":[82,97],"overlooking":[83],"inherently":[85],"distributed":[86,261],"architecture.":[87],"their":[90],"high":[91],"computational":[92],"demands,":[93],"these":[94],"centralized":[95,313],"depend":[98],"Cloud":[100,185],"resources":[101,123],"which":[106],"can":[107,178,281,296],"lead":[108],"increased":[110],"response":[111,290],"delays.":[112],"On":[113],"other":[115],"hand,":[116],"Edge":[117,164,176,199,270],"nodes":[118,165,177,186,271],"typically":[119],"lack":[120],"necessary":[122],"train":[125],"deploy":[127],"complex":[128],"ML":[129],"deep":[131],"algorithms.":[133],"To":[134,216],"address":[135],"this":[136,138,174],"issue,":[137],"article":[139],"proposes":[140],"an":[141],"effective":[142],"hierarchical":[143,249],"classification":[144,151],"framework":[145,250],"designed":[146],"networks.":[149,247],"Hierarchical":[150],"enables":[152],"classifiers":[153],"be":[155],"trained":[156],"deployed":[158],"across":[159],"multiple":[160],"levels.":[161],"This":[162,248],"allows":[163],"independently":[167],"identify":[168],"specific":[169],"types":[170],"attacks.":[172],"With":[173],"approach,":[175],"conduct":[179],"targeted":[180],"attack":[181],"while":[183],"utilizing":[184],"more":[188,291],"comprehensive":[189],"threat":[190,289],"analysis":[191,275],"coordination.":[193],"Considering":[194],"resource":[196],"limitations":[197],"nodes,":[200],"we":[201,221],"employ":[202],"Boruta":[204],"feature":[205],"selection":[206],"method":[207],"reduce":[209,282],"dimensionality":[211],"enhance":[213],"processing":[214],"efficiency.":[215],"evaluate":[217],"our":[218,242],"proposed":[219,294],"framework,":[220],"utilize":[222],"latest":[224],"security":[226],"dataset":[227],"CIC-IoV2024":[228],"CIC-DDoS2019":[230],"datasets,":[231],"achieving":[232],"promising":[233],"results":[234],"that":[235],"demonstrate":[236],"feasibility":[238],"effectiveness":[240],"models":[243],"securing":[245],"might":[251],"improve":[252],"scalability":[254],"responsiveness":[256],"environments.":[263],"By":[264],"offloading":[265],"lightweight":[266],"tasks":[268],"reserving":[273],"deeper":[274],"Cloud,":[278],"model":[280],"latency":[283],"load,":[286],"making":[287],"real-time":[288],"feasible.":[292],"The":[293],"approach":[295],"offer":[297],"practical":[299],"solution":[300],"deploying":[302],"effective,":[303],"resource-aware":[304],"cybersecurity":[305],"mechanisms":[306],"real-world":[308],"vehicular":[309],"networks,":[310],"where":[311],"traditional":[312],"fall":[315],"short.":[316]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":3}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
