A Federated LSTM Autoencoder Framework for Privacy-Preserving Intrusion Detection in V2X Networks

Authors

  • Β. Vishwanath Department of ECE JNTUH, University College of Engineering, Science & Technology Hyderabad, Telangana, India
  • Chandrasekhar P. Reddy Department of ECE JNTUH, University College of Engineering, Science & Technology Hyderabad, Telangana, India
Volume: 16 | Issue: 1 | Pages: 30852-30858 | February 2026 | https://doi.org/10.48084/etasr.13121

Abstract

The fast growth of Vehicle-to-Everything (V2X) networks requires privacy-preserving Intrusion Detection Systems (IDSs) for effective operation. The proposed Federated Long Short-Term Memory Autoencoder (Fed-LSTM-AE) framework allows distributed vehicular clients to perform collaborative anomaly detection through model parameter sharing without exchanging raw data. The framework enables each client to create its own LSTM-based autoencoder model of normal traffic patterns while sharing only model parameters with a central server through federated learning to maintain data privacy and improve system scalability. Experiments using the VeReMi dataset show that Fed-LSTM-AE achieves better performance than the centralized LSTM, one-dimensional Convolutional Neural Network (1D CNN), Random Forest, and Isolation Forest baseline methods in terms of detection accuracy, F1-score, and Area Under the Receiver Operating Characteristic Curve (ROC-AUC) metrics. The framework shows strong detection performance against various attack types while achieving efficient federated training convergence and maintaining stability under non-Independent and Identically Distributed (non-IID) data conditions. The results demonstrate Fed-LSTM-AE's suitability for real-world V2X deployments because it maintains privacy protection while being adaptable and communication-efficient.

Keywords:

V2X security, federated learning, LSTM autoencoder, vehicular networks, privacy preservation, anomaly detection

Downloads

Download data is not yet available.

References

W. A. Mansouri, S. Asklany, S. H. Othman, and A. A. Darem, "New Scheduling Scheme in Cellular V2X Communication," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 14096–14101, June 2024. DOI: https://doi.org/10.48084/etasr.7275

Z. Hussain, A. ur R. Khan, H. Mehdi, and S. M. A. Saleem, "Analysis of Device-to-Device Communication over Double-Generalized Gamma Channels," Engineering, Technology & Applied Science Research, vol. 8, no. 4, pp. 3265–3269, Aug. 2018. DOI: https://doi.org/10.48084/etasr.2230

D. R. K. Raja, Z. A. Abas, C. S. Akula, Y. D. Kumar, G. H. Kumar, and V. Eswari, "Artificial intelligence powered internet of vehicles: securing connected vehicles in 6G," Indonesian Journal of Electrical Engineering and Computer Science, vol. 35, no. 1, pp. 213–221, July 2024. DOI: https://doi.org/10.11591/ijeecs.v35.i1.pp213-221

D. Wang, A. Qiu, Q. Zhou, and H. D. Schotten, "A Survey on the Role of Artificial Intelligence and Machine Learning in 6G-V2X Applications." arXiv, June 12, 2025. DOI: https://doi.org/10.1109/WF-IoT64238.2025.11270555

G. H. Kumar, D. R. Kumar Raja, H. D. Varun, Navyashree, Abhishek, and S. Nandikol, "Optimizing Spatial Efficiency Through Velocity-Responsive Controller in Vehicle Platooning," in 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions, Bengaluru, India, 2024, pp. 1–5. DOI: https://doi.org/10.1109/CSITSS64042.2024.10816902

E. Farsimadan, L. Moradi, and F. Palmieri, "A Review on Security Challenges in V2X Communications Technology for VANETs," IEEE Access, vol. 13, pp. 31069–31094, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3541035

H. Alabdouli, M. S. Hassan, and A. Abdelfatah, "Enhancing Route Guidance with Integrated V2X Communication and Transportation Systems: A Review," Smart Cities, vol. 8, no. 1, Feb. 2025, Art. no. 24. DOI: https://doi.org/10.3390/smartcities8010024

R. Sedar, C. Kalalas, F. Vázquez-Gallego, L. Alonso, and J. Alonso-Zarate, "A Comprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths," IEEE Open Journal of the Communications Society, vol. 4, pp. 325–391, 2023. DOI: https://doi.org/10.1109/OJCOMS.2023.3239115

Z. Pethő, T. M. Kazár, Z. Szalay, and Á. Török, "Quantifying Cyber Risks: The Impact of DoS Attacks on Vehicle Safety in V2X Networks," IEEE Transactions on Intelligent Transportation Systems, vol. 25, no. 11, pp. 18591–18600, Nov. 2024. DOI: https://doi.org/10.1109/TITS.2024.3436840

M. S. Abood et al., "An LSTM-Based Network Slicing Classification Future Predictive Framework for Optimized Resource Allocation in C-V2X," IEEE Access, vol. 11, pp. 129300–129310, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3332225

A. R. Abdellah, A. Muthanna, M. H. Essai, and A. Koucheryavy, "Deep Learning for Predicting Traffic in V2X Networks," Applied Sciences, vol. 12, no. 19, Oct. 2022, Art. no. 10030. DOI: https://doi.org/10.3390/app121910030

F. Khanmohammadi and R. Azmi, "Time-Series Anomaly Detection in Automated Vehicles Using D-CNN-LSTM Autoencoder," IEEE Transactions on Intelligent Transportation Systems, vol. 25, no. 8, pp. 9296–9307, Aug. 2024. DOI: https://doi.org/10.1109/TITS.2024.3380263

C. Xu, H. Wu, Y. Zhang, S. Dai, H. Liu, and J. Tian, "A Real-Time Complex Road AI Perception Based on 5G-V2X for Smart City Security," Wireless Communications and Mobile Computing, vol. 2022, no. 1, Jan. 2022, Art. no. 4405242. DOI: https://doi.org/10.1155/2022/4405242

"VeReMi dataset." Github.io. [Online]. Available: https://veremi-dataset.github.io/.

V. Elangovan, W. Xiang, and S. Liu, "A Real-Time C-V2X Beamforming Selector Based on Effective Sequence to Sequence Prediction Model Using Transitional Matrix Hard Attention," IEEE Access, vol. 11, pp. 10954–10965, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3241130

S. Hossain, S.-M. Senouci, B. Brik, and A. Boualouache, "A privacy-preserving Self-Supervised Learning-based intrusion detection system for 5G-V2X networks," Ad Hoc Networks, vol. 166, Jan. 2025, Art. no. 103674. DOI: https://doi.org/10.1016/j.adhoc.2024.103674

S. Lee, K. Koufos, C. Maple, and M. Dianati, "Application of Unsupervised Learning in Implementation of Joint Power and Index Modulation Access in V2X Systems," IEEE Transactions on Cognitive Communications and Networking, vol. 9, no. 5, pp. 1308–1321, Oct. 2023. DOI: https://doi.org/10.1109/TCCN.2023.3276992

A. Gupta and X. Fernando, "Federated Reinforcement Learning for Collaborative Intelligence in UAV-Assisted C-V2X Communications," Drones, vol. 8, no. 7, July 2024, Art. no. 321. DOI: https://doi.org/10.3390/drones8070321

Y. T. Gebrezgiher, S. R. Jeremiah, S. Gritzalis, and J. H. Park, "VAE-Based Real-Time Anomaly Detection Approach for Enhanced V2X Communication Security," Applied Sciences, vol. 15, no. 12, June 2025, Art. no. 6739. DOI: https://doi.org/10.3390/app15126739

I.-S. Na, A. Haldorai, and N. Naik, "Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security," IEEE Access, vol. 13, pp. 2215–2228, 2025. DOI: https://doi.org/10.1109/ACCESS.2024.3521661

S. K. Kwon, J. H. Seo, J. Y. Yun, and K.-D. Kim, "Driving Behavior Classification and Sharing System Using CNN-LSTM Approaches and V2X Communication," Applied Sciences, vol. 11, no. 21, Nov. 2021, Art. no. 10420. DOI: https://doi.org/10.3390/app112110420

S. A. Abdel Hakeem and H. Kim, "Advancing Intrusion Detection in V2X Networks: A Comprehensive Survey on Machine Learning, Federated Learning, and Edge AI for V2X Security," IEEE Transactions on Intelligent Transportation Systems, vol. 26, no. 8, pp. 11137–11205, Aug. 2025. DOI: https://doi.org/10.1109/TITS.2025.3558849

M. Almehdhar et al., "Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks," IEEE Open Journal of Vehicular Technology, vol. 5, pp. 869–906, 2024. DOI: https://doi.org/10.1109/OJVT.2024.3422253

W. Aljabri, Md. A. Hamid, and R. Mosli, "Lightweight and Adaptive Data-Driven Intrusion Detection System for Autonomous Vehicles," IEEE Transactions on Intelligent Transportation Systems, vol. 26, no. 2, pp. 2282–2292, Feb. 2025. DOI: https://doi.org/10.1109/TITS.2024.3509459

M. Alharthi, F. Medjek, and D. Djenouri, "Ensemble Learning Approaches for Multi-Class Intrusion Detection Systems for the Internet of Vehicles (IoV): A Comprehensive Survey," Future Internet, vol. 17, no. 7, July 2025, Art. no. 317. DOI: https://doi.org/10.3390/fi17070317

Downloads

How to Cite

[1]
Vishwanath Β. and C. P. Reddy, “A Federated LSTM Autoencoder Framework for Privacy-Preserving Intrusion Detection in V2X Networks”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 1, pp. 30852–30858, Feb. 2026.

Metrics

Abstract Views: 121
PDF Downloads: 56

Metrics Information