Applied Sciences
Applied Sciences
sciences
Review
Explainable Artificial Intelligence (XAI) for Intrusion Detection
and Mitigation in Intelligent Connected Vehicles: A Review
Cosmas Ifeanyi Nwakanma 1 , Love Allen Chijioke Ahakonye 2 , Judith Nkechinyere Njoku 2 ,
Jacinta Chioma Odirichukwu 3 , Stanley Adiele Okolie 3 , Chinebuli Uzondu 4 ,
Christiana Chidimma Ndubuisi Nweke 5 and Dong-Seong Kim 2, *
1 ICT-Convergence Research Center, Kumoh National Institute of Technology, Gumi 39177, Republic of Korea
2 Department of IT Convergence Engineering, Kumoh National Institute of Technology,
Gumi 39177, Republic of Korea
3 Department of Computer Science, Federal University of Technology, Owerri 340110, Nigeria
4 Department of Transport Management Technology, Federal University of Technology, Owerri 340110, Nigeria
5 Department of Big Data Solution Architecture, Conestoga College, Kitchener, ON N2G 4M4, Canada
* Correspondence: dskim@kumoh.ac.kr
Abstract: The potential for an intelligent transportation system (ITS) has been made possible by the
growth of the Internet of things (IoT) and artificial intelligence (AI), resulting in the integration of
IoT and ITS—known as the Internet of vehicles (IoV). To achieve the goal of automatic driving and
efficient mobility, IoV is now combined with modern communication technologies (such as 5G) to
achieve intelligent connected vehicles (ICVs). However, IoV is challenged with security risks in the
following five (5) domains: ICV security, intelligent device security, service platform security, V2X
communication security, and data security. Numerous AI models have been developed to mitigate
the impact of intrusion threats on ICVs. On the other hand, the rise in explainable AI (XAI) results
from the requirement to inject confidence, transparency, and repeatability into the development of AI
Citation: Nwakanma, C.I.;
for the security of ICV and to provide a safe ITS. As a result, the scope of this review covered the XAI
Ahakonye, L.A.C.; Njoku, J.N.;
models used in ICV intrusion detection systems (IDSs), their taxonomies, and outstanding research
Odirichukwu, J.C.; Okolie, S.A.;
problems. The results of the study show that XAI though in its infancy of application to ICV, is a
Uzondu, C.; Ndubuisi Nweke, C.C.;
promising research direction in the quest for improving the network efficiency of ICVs. The paper
Kim, D.-S. Explainable Artificial
Intelligence (XAI) for Intrusion
further reveals that XAI increased transparency will foster its acceptability in the automobile industry.
Detection and Mitigation in
Intelligent Connected Vehicles: A Keywords: intelligent connected vehicle; intrusion detection; safety; security; XAI
Review. Appl. Sci. 2023, 13, 1252.
https://doi.org/10.3390/
app13031252
1. Introduction
Academic Editors: Agostino Marcello
Mangini and Michele Roccotelli Most major cities across the world are faced with transportation, traffic, logistic,
and environmental sustainability problems as a result of the rapid development of the
Received: 14 December 2022 human population and the rise in the number of vehicles on the road [1,2]. Technology has
Revised: 13 January 2023
been shown to be a huge help in managing transportation systems sustainably. For instance,
Accepted: 16 January 2023
the fifth-generation (5G) communication network is an enabler for intelligent transportation
Published: 17 January 2023
systems (ITSs) in smart cities [3]. A recent approach to solving the growing demand
for sustainable transportation is the introduction of intelligent connected vehicles (ICVs)
reliable for managing road capacity and fuel consumption [1,2]. Another 5G-enabled
Copyright: © 2023 by the authors.
technology is the single-circuit-board user interface solutions that can collect real-time data
Licensee MDPI, Basel, Switzerland. from moving cars for traffic control, routing, and trip planning are used [3,4]. This system
This article is an open access article aids in the effective and efficient delivery of products and services both inside and outside
distributed under the terms and the nation and can address the problem plaguing transportation systems [5]. Some 5G
conditions of the Creative Commons technology and communication protocols such as wireless access in vehicular environment
Attribution (CC BY) license (https:// (WAVE) and dedicated short-range communication (DSRC) allow for data collection and
creativecommons.org/licenses/by/ sharing between vehicles and in vehicle [6]. Between- and in-vehicle data sharing is known
4.0/). as “cooperative sensing” or “collective perception”, thus “cooperative ITS” (C-ITS) [6,7].
The CAR 2 CAR Communication Consortium members build their C-ITS deployment
plans on the cooperative vehicle to “other things” (V2X) short-range communications that
perform everywhere at any time via local ad hoc networks in the 5.9 GHz band. This coop-
erative V2X (C-V2X) communication uses the European standard ETSI ITS G5 [7] which is
based on the US market IEEE 802.11p WLAN standard specially designed for automotive
applications in addition to the WAVE/DSRC, and long-term evolution-advanced (LTE-A)
delivering quality of service for most V2X applications [8]. The successor standard, IEEE
802.11 bd, offers improved performance and seamless evolution of the radio technology
which ensures efficient use of the allocated spectrum, and continuous operation of im-
plemented services [4,9]. Cooperative V2X systems in vehicles analyze the data received
and warn the driver against dangers. By this principle, critical road safety situations and
resulting accidents can be avoided [7]. The performance requirements for basic road safety
and advanced V2X services are adapted from [10] and summarized in Table 1.
Table 1. Performance Requirements for the Basic Road Safety and Advanced V2X Services [10].
Maximum
Transmission Latency Reliability Communication
Use Case Group Data Rate
Mode (ms) (%) Range (m)
(Mbps)
Basic road safety
services supported by Broadcast 10–100 90 31.7 100–300
3GPP Rel-14/Rel-15
Broadcast, less than 100;
Vehicles Platooning groupcast 10-25 90–[99.99] [65] [5–10] s max
and unicast relative speed
[5–10] s max
Advanced driving Broadcast [3–100] [99.99]–[99.999] [50]
relative speed
Extended sensor Broadcast 3–100 [90–99.999] 1000 [5–1000]
Uplink: 25 Same as cellular
Remote driving Unicast [5–20] [99.999]
Downlink: 1 Uplink and Downlink
and the Internet of vehicles (IoVs), were raised [16]. While it is a debate to determine the
causes for the misbehavior of ICVs, one of the potential causes is the possibility of intrusion
and the potential harm that can occur from compromising ICVs/IoVs. In addition, the use
of the “black box” approach in the design of traditional AI solutions makes investigation
difficult [17].
AI is an innovative technology used for developing sophisticated systems that can
understand and learn things effectively, just like humans do. Real-world problems such as
securing traditional transportation and ITS can be solved with more accuracy and speed
with AI and big data algorithms [4,9,13,18]. AI systems are capable of learning new things
and making accurate decisions through the help of machine learning algorithms, and artifi-
cial neural networks (ANN) [19]. The introduction of AI has redefined the transport sector
resulting in the ITS. ITS is recognized as a type of AI-based mobility technology that can
comprehend and provide satisfaction to end users, markets, and society at large [20]. ANNs,
genetic algorithms, simulated annealing, fuzzy logic models, and ant colony optimizers are
some examples of AI technologies that support transportation that is deemed innovative,
disruptive, and emerging by the World Economic Forum. These technologies are used
to address problems with transportation management such as congestion, guaranteeing
that journeying times are reasonable for passengers, and boosting the efficiency of the
entire transportation network [21]. In addition, AI helps to resolve some of the problems
affecting the transportation industry’s sub-systems, including traffic management, public
transportation, safety management, manufacturing, and logistics [22].
AI growth has resulted in enormous models being used to meet the daily needs of
mankind, including safe ITS [23]. However, AI models are challenged by the need for trans-
parency, “simulability”, fidelity, and compactness, despite their benefits. The drawback is
a result of the systems’ “black-box” design, which enables accurate decision-making but
leaves out the justification for the decision being made. This then led to the development
of “explainable AI” (XAI), a revolutionary technology. This novel idea enhances the de-
pendability and openness of AI-based systems [24]. The concept of XAI was put up as a
means of increasing AI’s transparency and fostering its acceptability in some important
industries [25]. XAI reduces the complexity of AI while increasing the application of AI
systems in sectors such as security, healthcare, and transportation [26]. Consequently,
several research works have been published on XAI. One common challenge of the plethora
of publications on XAI is the difficulty to situate growth in XAI with specific sector unique
demands. To address this, several review papers on XAI have been published. However,
a general review of XAI still leaves stakeholders with the problem to grapple with their
sector-specific needs. Consequently, in this review, we have articulated all XAI models and
how they have addressed the unique demand of securing ITS.
Intrusion detection is the process of monitoring and analyzing events in a system
or network [27] for indications of potential events, which are breaches or vulnerabilities
of security regulations, and acceptable use of standard security practices [28]. Intrusion
detection techniques are usually grouped based on the identified activities and the ap-
proach used to identify intrusions. Intrusion detection systems (IDS) can be host-based or
network-based. Specification-based, signature-based, and anomaly-based detection are
the focal intrusion detection approaches. Aside from event monitoring and assessment,
IDS normally collects activity information, alerts of critical occurrences via warnings and
alarms, and provides relevant reports [23]. IDS is an essential security tool to safeguard
networks against adversarial and non-adversarial attacks from malicious traffic [29]. In re-
cent times, machine learning (ML) has aided the development of IDS research. According
to the IoT Analytics [30], in August 2022, Nozomi researchers identified three security
holes (CVE-2022-29831, CVE-2022-29832, and CVE-2022-29833) that could allow an at-
tacker to obtain information from Mitsubishi GX Works3 (configuration and programming
software for certain Mitsubishi PLCs) project files to compromise connected safety CPU
modules. Guan et al. [31] also revealed that researchers found 14 vulnerabilities in the
infotainment system of several BMW series. A critical part of modern ITSs is the possibility
Appl. Sci. 2023, 13, 1252 4 of 29
to give sufficient consideration to road safety features in the design and construction of
roads [39].
More people are becoming aware of the significance of promoting safety in order to
achieve successful policy goals. Over the years, various measures aimed at reducing RTCs
have been adopted in different countries across the world, most of which have been targeted
toward improving behavior, infrastructure, and vehicles. In the past decade, the traditional
methods of improving traffic safety by merely deploying traffic lights and signs, using
traffic police, etc., have become less efficient and not achieving the intended results as
could be seen in increasing crash numbers and associated injury rates. However, recent
advances in information and communication technology have contributed to providing
other new possibilities, ways, and effective solutions to the transport safety problem. One
of these is to use ITS technology, which can be applied in different transport modes and
encompasses a very wide range of technologies to deal with different transport issues
including transport safety. One of the several advantages when applying ITS technology
to transportation projects is to prioritize the safety of all road users, bolster transportation
infrastructure, and give road users vital information on safety [40]. This could be done
through the integration of advanced communications technologies which focus on both the
infrastructure and vehicles including integrated applications between them. It contributes
to modifying the way motorists drive by providing information on safety and travel time
needed to make informed decisions. It can gather the information required, for instance,
to estimate the probability of a collision, identify and confirm accidents, speed up the
reaction to traffic incidents, and send out safety messages to road users if an incident
happened on their route.
In developed nations such as Japan, South Korea, Singapore, the United States, and the
United Kingdom, ITSs are being used and implemented more frequently to increase the effi-
cacy, efficiency, and safety of road transportation systems [41]. However, this is not the case
in developing countries where most governments are yet to adopt and implement policies
to readily integrate ITSs into the current transport system. Considering the increasing rate
of RTCs and associated injury rates recorded in developing countries annually, it is very
important and urgent that ITS-based measures are adopted and must be designed to suit
the traffic safety situation of these countries by considering their unique socio-economic
and environmental conditions [41].
Figure 1. Three-Layer Structure of the IoV and the Associated Functionalities Enabling the Emergence
of Connected Vehilces.
Since the IoV is a form of the IoT, it is faced with challenges related to efficient
communication between thousands of integrated vehicles, the decision in data processing at
the onboard unit, big data integration with IoV, intrusion detection and mitigation, etc. [48].
Additionally, the ability to process the vast amount of data to reduce road congestion,
improve the management of traffic, and ensure road safety are parts of the issues in the
future IoV trends [49,50]. Hence, AI technology coupled with ML algorithms is capable of
improving the network efficiency of the IoV [23]. With ML algorithms, data processing at
the onboard units (OBUs), fog level, or cloud level can be resolved. Further issues such
as the rapid topology of the IoV, channel modeling, optimization quality of experience,
energy, and time can be solved with ML algorithms [50]. To resolve the intrusion challenges,
several authors have developed AI and ML models [23,32,47,49]. However, recent works
have become devoted to the concept of XAI to resolve the inadequacies of traditional AI.
To classify an AI as XAI, the following requirements should be present:
1. Fidelity: For instance, it is not enough that AI-IDS for securing an ITS performed with
high accuracy, it is now a research concern to know the details of the datasets and how
it affected the systems. Is there any element of bias? How are individuals or persons
affected by the decisions of AI-based decisions in response to the EU general data
protection regulation [35]?
2. Simulability: Common questions that are now asked are “can a third party check the
correctness of the model?” and “Is it possible to repeat the simulation and arrive at
similar results?”
3. Completeness: “Explainability” is not enough. It is encouraging to have proper docu-
mentation of the model development for a sustainable enhancement of the system [17].
4. Compactness: Give human users the knowledge they need to comprehend, properly
trust, and successfully manage the new generation of AI partners.
These attacks occur at the different layers of the IoV architecture and the open systems
interconnection (OSI) layers [51,52]. The most common ICV/IoV attacks [54] are as follows:
1. Man-in-the-middle (MiM): This attack occurs when the intruder intercepts network
traffic information by gaining access between communication units. It is carried out
by monitoring the network, injecting anomalies in the transmission, and forwarding
the same to the recipient. A successful attempt assumes the session maintains the
connection while the spoofing keeps the attacker unrecognized. This attack can be
with SSLStrip, Evilgrade, and Ettercap [28,55,56].
2. Denial of service and distributed denial of service (DoS/DDoS): In this attack sce-
nario, an authorized user is denied access to resources by attacking the availability
requirement of network resources [57]. A compromised RTU sends arbitrary packets
to the MTU, thereby depleting the network bandwidth and constraining resource
availability to users. It disrupts the communication link between the RTU and MTU,
making control and process monitoring difficult. It can be with attack tools known as
Low Orbit Ion Cannon (LOIC), Slowloris, and GoldenEye [28,58,59].
3. Eavesdrop: This attack comes in two ways, namely, active and passive eavesdropping.
An eavesdropping device assesses the wired or wireless network with the aid of
tcpdump, dsniff, or Wireshark [28,55,56].
4. Reconnaissance: These attacks seek information about a network and its equipment
features. As a result, it is critical to safeguard the sensor measurements from the
physical process. Response injection attacks inject misleading inputs into a control
system, causing control algorithms to make wrong choices. Fake control commands
enter the control system in a command injection attack. It can occur as a consequence
of human interference, which results in incorrect control action, or as a result of the
injection of false commands, which results in the overwriting of RTU software and
field device register values [60].
These IoV vulnerabilities can be grouped into the following five (5) domains: ICV
security, intelligent device security, service platform security, V2X communication security,
and data security. The ICV intrusion can also be classified based on attacks on the network,
software, and hardware connections [52] as follows:
1. Network connection attack: Intrusion on the IoV communication transverse transport,
network, and application layers. It targets the exploitation of the OSI model and
violates the security goals such as availability, authentication, integrity, and confiden-
tiality.
2. Hardware attack: In this case, the intruder gains unauthorized entry to the IoV system
units and violates their operations. Access control is the most difficult aspect of
securing hardware.
3. Software attack: The ICV/IoV system uses a range of software to improve its efficiency
by satisfying operational demands. Nevertheless, it is prone to trojan horse, SQL
injection, and buffer overflow attacks due to inadequate implementation. Since the
mobile application is gradually becoming an essential part of the IoV, it has become a
hot spot of attack for attackers [61].
Consequently, the need for IDSs, lightweight firewall, hardware encryption, and
trusted execution environment have been canvased by stakeholders, as shown in
Figure 2 [61].
Appl. Sci. 2023, 13, 1252 8 of 29
Figure 2. Various approaches to mitigating ICVs’ vulnerability to attacks highlighting the role of
IDSs, among others [61].
The national institute of standards (NIST), part of the U.S. Department of Commerce,
enumerated five types of “explanations” for AI. These were enumerated in [69] as follows:
1. Inform the subject of an algorithm: In the case of the IDS for ITS, an explanation of
how the AI model guarantees the security of the system from intruders is critical.
2. Comply with compliance or regulatory requirements: As AI algorithms gain im-
portance in regulated industries, they must be able to show that they follow rules.
For instance, self-driving AI algorithms should detail how they adhere to any applica-
ble traffic laws.
3. Build social trust in AI systems by using explanations that support the model and
approach rather than focusing on specific outputs. This could involve detailing the
algorithm’s goals, development process, data used, and sources, as well as its advantages
and disadvantages [70].
4. Help with future system development: In order to improve an AI system, technical
employees must comprehend where and why a system produces incorrect results.
5. Benefit the owner of the algorithm: Businesses are implementing AI across all sectors
in the hope of reaping considerable rewards. For instance, a streaming service benefits
from recommendations that are easy to understand and keep people subscribed.
previous XAI reviews in that it is the first to systematically survey research works and
directions in the use of XAI for the security of ITS limited to IDS.
3. Review Methodology
This section offers a systematic description used for the detailed review. The innovative
reviewing methodologies in this study are inspired by the meta-analysis (PRISMA) [98,99]
and the “mentefacto conceptual design” [100]. Articles published between 2017 and 2022
Appl. Sci. 2023, 13, 1252 12 of 29
were given priority during selection. Nonetheless, the year of publication is irrelevant
when the need arises for a historical perspective in the review. According to [101], computer
science and engineering-related studies can preferably come from the following databases:
IEEE Xplore, ScienceDirect, Wiley, Springer, Taylor and Francis, and select social sites such
as Academia and Researchgate, Sage, and Google Scholar. In addition, only papers written
in the English language we considered for final analysis. Using the key search “ITS”, “IoV”,
“ICV”, “IDS”, “AI”, and “XAI”, a summary of papers according to the database source
is listed in Table 2. Similarly, the PRISMA flow diagram for the systematic reviews and
the basis for the final selection of articles are shown in Figure 4. Quantitative analysis
was done using only XAI papers for IDS. Therefore, the results of the screened literature
were systematically summarized and reported by a narrative comprehensive analysis.
Specifically, the steps of this analysis include determining the review problem, sorting out
and comparing the data, and drawing conclusions [97]. The inclusion criteria for papers
used in the survey are:
1. Articles must be original articles published in journals, arXiv, or conference proceedings.
2. Except for the purpose of history or background, only papers published between 2017
and 2023 were considered for final inclusion for discussion.
3. For qualitative analysis, only papers that addressed the issues and concerns of ITS
and ICV security using AI/XAI were considered.
4. In comparing this review paper with recent review works, ICVs, security, and AI must
be covered to qualify for comparison.
5. The papers have to be written entirely in English.
6. Finally, the papers whose databases had access restrictions were excluded because the
authors could not access them.
Figure 4. PRISMA flow showing the process of the final selection of the 137 papers at the reference
and the 7 specific articles that focused on XAI for IDS in ICV.
Appl. Sci. 2023, 13, 1252 13 of 29
The summary of document search and usage are summarized in Table 2 and Figure 4,
respectively. A total of 393 (337 + 56) documents were identified by the search. A total of
97 documents were excluded due to duplication, leaving a total of 296 for screening. Sixty-
seven were further excluded after screening for relevance and elimination of papers with
open abstracts but restricted access to full paper content. Of the 162 documents remaining,
25 were excluded using the inclusion criteria above. Thus, a total of 137 documents were
used for the survey. A total of 130 of these were used for qualitative analysis, while the
other 7 (see Table 3) were used for the specific review since they were strictly papers on XAI
for IDSs, while 10 papers (see Table 4) served the purpose of the XAI framework details for
background studies.
Table 3. Cont.
Table 4. Cont.
Interestingly, the authors of [104] proposed novel XAI-based deep learning solutions
for IDSs in the IoT generally not limited to the IoV. However, the approach is similar to
other authors as they used SHAP and RuleFit. The use of SHAP has enjoyed dominance due
to its ease of use and flexibility in generating the basis for the visualization of explainable
results [86].
4.3.1. What Is SHAP and What Is Its Applicability to IDSs for ICVs?
SHAP is a method for explaining the output of any machine learning model [54,72].
The concept of Shapley values from cooperative game theory [72,85] allows a fair dis-
tribution of values among a group of individuals. The method assigns each feature an
importance value for a particular prediction. The values can be for both global and local
interpretation of a model’s predictions, and it is considered a state-of-the-art method for
feature importance in XAI. It is also model-agnostic, meaning that it can explain the output
of any machine learning model, regardless of its architecture. SHAP aids the perception
of the contribution of each data feature to the particular prediction made by a machine
learning model. Intrusion detection in ICV is a critical task, as it helps ensure the vehicle’s
security and safety and its passengers. SHAP explains the decisions made by an IDS in
ICVs, which can help to improve transparency and trust in the system. Applying SHAP
aids the understanding of the feature importance and contribution of each feature to the
predictions made by the model for detecting intrusion attempts.
Based on the SHAP values approach, the following criteria are used for providing both
global and local explanations for XAI models [54]: SHAP Force Plots, SHAP Importance
Plots, SHAP Summary Plots, and SHAP Dependence Plots. SHAP Summary Plots give
a global summary of the features of the SHAP values distribution in the dataset. They
demonstrate how each feature’s relevance is distributed. This makes it easier to see the
dataset’s features.
Dependence plots, according to [54], are deemed to be the most straightforward global
interpretation plots. The link between the value of a feature and the related Shapley
values for each instance in the dataset is displayed in the dependence charts. The SHAP
dependence plots display the precise structure of the relationship, whereas summary plots
only display the relationship between a feature value and its influence on the prediction.
The SHAP Force Plots aid in the visualization of feature attributions of specific oc-
currences, where each feature value is a force that either confirms or refutes a prediction.
The Force Plots were utilized by the authors of [54] to depict the packet flow characteristics
that support or refute the hypothesis made by our IDS model. The size or effect that each
feature has on the forecast is also displayed through Force Plots.
Additionally, SHAP Importance Plots for Shapley values are employed to determine
the level of importance or significance of instances in the dataset. Large absolute Shapley
values in this plot are classified as key features since they have a greater average impact on
the model output [54].
4.3.2. What Are TRUST and LIME and What Is Their Applicability to IDSs for ICVs?
TRUSTvs. LIME: TRUST is a framework for assessing AI models’ transparency,
robustness, and fairness [108]. It evaluates the comprehensibility and interpretability of
intrusion detection models for ICV, considered black boxes because they are difficult to
interpret [108]. Applying TRUST to the trained IDS model facilitates the transparency of the
model’s decision-making process and identifies how well the model can detect intrusion
attempts. TRUST’s feature importance and decision path analysis aid in understanding the
most important features and how it makes its predictions. The framework includes several
robustness assessment techniques for evaluating IDS in ICVs, such as robustness testing
and adversarial example generation [93,108]. It enables the interpretability of the model’s
generalization to new and unseen data and its resistance to adversarial examples [93,108].
TRUST can also evaluate the model’s fairness by assessing the demographic parity and
equalized odds. It assists in clarifying the model’s fair treatment of various features and
identifies potential bias in the model [93,108]. It is helpful for intrusion detection in ICVs
as it provides more interpretable and transparent explanations of the decision-making
process of the IDS, which can help to improve the security and safety of the vehicle and its
occupants by ensuring the robustness and fairness of the model.
Appl. Sci. 2023, 13, 1252 20 of 29
Similarly, LIME is a technique for explaining the predictions of any machine learning
model by approximating the model locally with an interpretable model. It is model-agnostic,
following the ability to explain the output of any machine learning model, regardless of its
architecture [107]. It is a common approach for interpretability because it provides human-
understandable explanations for complex models [107]. LIME enables a more intuitive and
interpretable comprehension of the complex decision-making process of IDS models, which
is vital for building trust in the model and its predictions [107]. Its utilization enhances the
understanding of the significant features relevant to intrusion detection predictions, which
improves the security and safety of the ICV and its user.
The benchmark XAI explainer model is known as the Local Interpretable Model-
agnostic Explanations (LIME), introduced by [107]. This model, however, was outper-
formed by the Transparency Relying Upon Statistical Theory TRUST) explainer introduced
by [108]. It achieved 25 times faster results and is a promising candidate for real-time
and critical applications such as the ITS. In addition, the TRUST model took care of the
computational complexity deficiency of SHAP.
4.3.3. What Is LORE and What Is Its Applicability to IDSs for ICVs?
For a given black box case, LOcal Rule-based Explanations (LORE) introduced by
Guidotti et al. [109] generates an interpretable prediction. On a dense set of synthetic
examples, a decision tree is utilized to train the local interpretable predictor. A local
explanation that consists of a single-choice rule and a number of counterfactual rules for
the reversed decision can be extracted from the decision tree. This framework is local-
based, post hoc, and model-agnostic [128]. The originators of the LORE in [109] based
their work on a local interpretable predictor, a decision tree. The decision tree allows
for the extraction of a local explanation, which consists of a single choice rule and a
collection of counterfactual rules for the reversed decision [128]. The identified challenge
that LORE’s applicability to XAI for ICV could be the need for human comprehensibility
of the explanations provided by LORE [109]. To achieve a flexible framework for LORE
interpretability, Rajapaksha et al. [129] proposed the use of k-optimal associations, known as
Local Rule-based Model Interpretability with k-optimal associations (LoRMIkA). LoRMIkA
provides a flexible way to obtain predictive rules needed for explanations. The argument
here is that the most predictive rules are not necessarily the rules that provide the best
explanations. Since the ICV situation is expectedly dynamic, LoTMIkA shows a promising
adoption owing to its ability to provide multiple rules capable of explaining predictions in
various scenarios.
4.3.4. What Is GRAD-CAM and What Is Its Applicability to IDSs for ICVs?
A method called Gradient-weighted Class Activation Mapping (GRAD-CAM) [110]
creates a heat map for each class from a single image. Grad-CAM then generates a localiza-
tion map that discriminates classes. The framework uses the feature maps produced by the
final convolutional layer of a CNN. This is model-specific, local-based, and post hoc [128].
GRAD-CAM finds usage in the visualization of deep learning (such as CNN) outputs.
GRAD-CAM achieves this by using the features obtained from the last convolutional layer
of a CNN, for example. The weighted combination of feature maps followed by the ReLU
activation function is used to obtain a precise heat map. Although GRAD-CAM is one of
the most popular methods for explaining deep neural network decisions, it violates key
axiomatic properties, such as sensitivity and completeness. Integrated gradients are an
axiomatic attribution method that aims to cover this gap [130]. In 2020, GRAD-CAM was
reported to have a challenge in its ability to reflect the model’s computation because of
the gradient average steps. These steps are thus unreliable in prediction. To solve this,
a modified CAM was proposed, known as High-Resolution Class Activation Mapping
(HiResCAM), for faithful explanations of CNN [131].
Appl. Sci. 2023, 13, 1252 21 of 29
4.3.5. What Is CEM and What Is Its Applicability to IDSs for ICVs?
The contrastive explanation method (CEM) is a method for generating explanations
for AI models to understand the decision-making process of a model by comparing the
decision made for a specific input to the decision made for a similar but different input [111].
Its classification model explanations are provided in [111]. Furthermore, it retrieves the
characteristics that must be sufficiently present to predict the input instance will belong
to the same class. The minimal attributes that must be altered in order to associate the
input instance with a different class are also identified. This is local, post hoc, and model-
neutral [128]. According to [128], CEM, when used for neural networks, highlights not
only the pertinent positives but also the pertinent negatives in its explanation, making
it a preferred choice over LRP. The ability of CEM to extract both positive and negative
pertinent features can help in reducing error during the diagnosis of a target. It is, however,
yet to be seen how CEM could be applied effectively to the IDS for ICVs where non-image
data is dominant. This is important if the CEM is to be used for intrusion detection in
ICVs in real-time by monitoring and analyzing network traffic, system logs, and other data
sources to identify unusual or suspicious activity. CEM is vital to interpreting the AI model
predictions.
4.4. Discussion
4.4.1. Computational Complexity Challenge of XAI Implementation
The computationally demanding and costly operation of SHAP is one of its disadvan-
tages. Additionally, it has been discovered to be open to hostile attacks. In a subsequent
study, the authors in [54] seek to assess the degree to which SHAP is susceptible to mali-
cious attacks and look into potential new or improved defenses that might be utilized to
enhance its robustness in IoT systems.
4.4.4. Reliability
Reliability analysis determines a system’s level of assurance in terms of probability
density [133]. They utilized the XGBoost to calibrate the resistance reduction factors in
reaching the stipulated objective system. The suggested ML-based models are proven to effi-
ciently determine the shear resistance of fabric-reinforced cementitious matrix-strengthened
reinforced concrete beams, yielding the most consistent, precise, and reliable predictions
while meeting the specified target reliability of the system. In another study outlining
some intriguing potential prospects for utilizing machine learning to increase safety and
reliability concerns, the authors of [134] examined the use of machine learning in quality
engineering and security solutions. Since the LIME is based on Gaussian assumptions,
the reliability of the output becomes doubtful once the assumptions do not fit into any
target system. The challenge of overfitting also depletes the reliability of XAI models as
some researchers do not scrutinize the potential flaws of “explainers” [135].
Appl. Sci. 2023, 13, 1252 22 of 29
5. Conclusions
This paper presented a comprehensive review of explainable artificial intelligence
(XAI) for intrusion detection and mitigation inintelligent connected vehicles (ICVs). ICVs/IoV
as an extended application of the Internet of things (IoT) in intelligent transportation sys-
tems (ITSs) requires effective security from attackers due to vulnerabilities inherent in
connected devices. However, due to the “black-box’” nature of artificial intelligence ap-
plied to most detection systems, transparency or interpretability becomes a problem; thus
the need for explainable AI. In this survey, a comprehensive background of the existing
XAI frameworks, their capabilities and use cases, and their applicability to ICV security is
discussed. In particular, the need for reliability, low computational complexity, and incor-
poration of user-friendly XAI modules is identified as a promising research issue. Finally,
XAI developers must address the issue of bias introduced by rule-based XAI to foster its
acceptability in essential industries such as the automobile industry.
Author Contributions: Conceptualization, C.I.N., L.A.C.A., J.N.N. and C.U.; methodology, C.I.N.,
L.A.C.A., J.N.N., C.U., C.C.N.N. and D.-S.K.; software, C.I.N., L.A.C.A., J.N.N., J.C.O. and S.A.O.;
validation, C.I.N., L.A.C.A., J.N.N., C.U. and D.-S.K.; formal analysis, C.I.N.; investigation, C.I.N.,
L.A.C.A., J.N.N., C.U., C.C.N.N. and D.-S.K.; resources, C.I.N. and D.-S.K.; data curation, C.I.N.;
writing—original draft preparation, C.I.N., L.A.C.A., J.N.N., C.U. and D.-S.K.; writing—review
and editing, C.I.N., L.A.C.A., J.N.N., J.C.O., S.A.O. and C.U.; visualization, L.A.C.A. and J.N.N.;
supervision, D.-S.K.; project administration, C.I.N. and D.-S.K.; funding acquisition, C.I.N. and D.-S.K.
All authors have read and agreed to the published version of the manuscript.
Funding: This research work was supported by Priority Research Centers Program through the
national research foundation of Korea (NRF) funded by the ministry of education, science and
technology (MEST) (2018R1A6A1A03024003) and the ministry of science and information & com-
munication technology (MSIT), Korea, under grand information technology research center support
program (IITP-2023-2020-0-01612) supervised by the Institute for Information & communications
Technology Planning & Evaluation (IITP), Korea.
Appl. Sci. 2023, 13, 1252 23 of 29
Abbreviations
The following abbreviations are used in this manuscript:
AI Artificial Intelligence
ANFIS Adaptive Neuro Fuzzy Inference System
ANN Artificial Neural Networks
AP Adversarial Perturbation
CAM Class Activation Mapping
CAN Controller Area Network
CC Correlation Coefficient
CEM Contrastive Explanation Method
C-ITS Cooperative ITS
CNN Convolutional Neural Network
C-V2X Cooperative V2X
DDoS Distributed Denial of Service
DL Deep Learning
DoS Denial of Service
DSC Disc Similarity Coefficient
DSRC Dedicated Short Range communications
ETSI European Telecommunications Standards Institute
GPS Global Positioning Systems
GRAD-CAM Gradient-weighted Class Activation Mapping
HCI Human–Computer Interface
HiResCAM High-Resolution Class Activation Mapping
ICS Industrial Control System
ICV Intelligent Connected Vehicle
IDS Intrusion Detection Systems
IoT Internet of Things
IoV Internet of Vehicles
ITS Intelligent Transportation System
KNN K-Nearest Neighbor
LIME Local Interpretable Model-agnostic Explanations
LOIC Low Orbit Ion Cannon
LORE Local Rule-based Explanations
LoRMIkA Local Rule-based Model Interpretability with k-optimal Associations
LRP Layer-wise Relevance Propagation
LTE-A Long-Term Evolution-Advanced
MiM Man-in-the-Middle
ML Machine Learning
MTU Mobile Terminal Unit
NIST National Institute of Standards
NS-3 Network Simulator-3
Appl. Sci. 2023, 13, 1252 24 of 29
References
1. Wang, P.; Ye, R.; Zhang, J.; Wang, T. An Eco-Driving Controller Based on Intelligent Connected Vehicles for Sustainable
Transportation. Appl. Sci. 2022, 12, 4533. [CrossRef]
2. Zhi, P.; Zhao, R.; Zhou, H.; Zhou, Y.; Ling, N.; Zhou, Q. Analysis on the development status of intelligent and connected vehicle
test site. Intell. Converg. Netw. 2021, 2, 320–333. [CrossRef]
3. Yu, M. Construction of Regional Intelligent Transportation System in Smart City Road Network via 5G Network. IEEE Trans.
Intell. Transp. Syst. 2022, 1–9. [CrossRef]
4. Montoya-Torres, J.R.; Moreno, S.; Guerrero, W.J.; Mejía, G. Big Data Analytics and Intelligent Transportation Systems. IFAC-
PapersOnLine 2021, 54, 216–220. [CrossRef]
5. Garg, T.; Kaur, G. A Systematic Review on Intelligent Transport Systems. J. Comput. Cogn. Eng. 2022. [CrossRef]
6. Anyanwu, G.O.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Falsification Detection System for IoV Using Randomized Search
Optimization Ensemble Algorithm. IEEE Trans. Intell. Transp. Syst. 2023, 1–15. [CrossRef]
7. Mütze, F. Cooperative Intelligent Transport Systems (C-ITS); European Transport Safety Council: Brussels, Belgium, November 2017;
pp. 1–12. Available online: https://etsc.eu/briefing-cooperative-intelligent-transport-systems-c-its/ (accessed on 8 January 2023).
8. Chekkouri, A.S.; Ezzouhairi, A.; Pierre, S. Connected vehicles in an intelligent transport system. VEhicular Commun. Netw. 2015,
193–221. [CrossRef]
9. Kaffash, S.; Nguyen, A.T.; Zhu, J. Big Data Algorithms and Applications in Intelligent Transportation System: A Review and
Bibliometric Analysis. Int. J. Prod. Econ. 2021, 231, 107868. [CrossRef]
10. Chen, S.; Hu, J.; Shi, Y.; Zhao, L.; Li, W. A Vision of C-V2X: Technologies, Field Testing, and Challenges with Chinese Development.
IEEE Internet Things J. 2020, 7, 3872–3881. [CrossRef]
11. Nguyen, V.L.; Hwang, R.H.; Lin, P.C.; Vyas, A.; Nguyen, V.T. Towards the Age of Intelligent Vehicular Networks for Connected
and Autonomous Vehicles in 6G. IEEE Netw. 2022, 1–8. [CrossRef]
12. Consortium, C.C. C-ITS: Cooperative Intelligent Transport Systems and Services. In Proceedings of the 16th Car 2 CAr Forum.
Car 2 CAr Communication Consortium, Moses Lake, WA, USA, 28–29 September 2022. Available online: https://www.car-2-car.
org/about-c-its/ (accessed on 11 January 2023).
13. Tsolaki, K.; Vafeiadis, T.; Nizamis, A.; Ioannidis, D.; Tzovaras, D. Utilizing Machine Learning on Freight Transportation and
Logistics Applications: A review. ICT Express 2022, in press. [CrossRef]
14. ETSI. Automotive Intelligent Transport Systems (ITS). 2021. Available online: https://www.etsi.org/technologies/automotive-
intelligent-transport (accessed on 6 January 2023).
15. Wakabayashi, D. Self-Driving Uber Car Kills Pedestrian in Arizona, Where Robots Roam. The New York Times, 19 March 2018.
16. Van Brummelen, J.; O’Brien, M.; Gruyer, D.; Najjaran, H. Autonomous Vehicle Perception: The Technology of Today and
Tomorrow. Transp. Res. Part C Emerg. Technol. 2018, 89, 384–406. [CrossRef]
17. Jaigirdar, F.T.; Rudolph, C.; Oliver, G.; Watts, D.; Bain, C. What Information is Required for Explainable AI?: A Provenance-based
Research Agenda and Future Challenges. In Proceedings of the 2020 IEEE 6th International Conference on Collaboration and
Internet Computing (CIC), Los Angeles, CA, USA, 12–14 December 2020; pp. 177–183. [CrossRef]
18. Boukerche, A.; Tao, Y.; Sun, P. Artificial Intelligence-Based Vehicular Traffic Flow Prediction Methods for Supporting Intelligent
Transportation Systems. Comput. Netw. 2020, 182, 107484. [CrossRef]
Appl. Sci. 2023, 13, 1252 25 of 29
19. Garg, P.K. Overview of Artificial Intelligence. In Artificial Intelligence: Technologies, Applications, and Challenges, 1st ed.; Chapman
and Hall/CRC: Boca Raton, FL, USA, 2022; Chapter 1, pp. 1–16. [CrossRef]
20. Nikitas, A.; Michalakopoulou, K.; Njoya, E.T.; Karampatzakis, D. Artificial Intelligence, Transport, and the Smart City: Definitions
and Dimensions of a New Mobility Era. Sustainability 2020, 12, 2789. [CrossRef]
21. Abduljabbar, R.; Dia, H.; Liyanage, S.; Bagloee, S.A. Applications of Artificial Intelligence in Transport: An Overview. Sustainability
2019, 11, 189. [CrossRef]
22. Iyer, L.S. AI Enabled Applications Towards Intelligent Transportation. Transp. Eng. 2021, 5, 100083. [CrossRef]
23. Anyanwu, G.O.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Optimization of RBF-SVM Kernel using Grid Search Algorithm for DDoS
Attack Detection in SDN-based VANET. IEEE Internet Things J. 2022. [CrossRef]
24. Le, T.-T.-H.; Kim, H.; Kang, H.; Kim, H. Classification and Explanation for Intrusion Detection System Based on Ensemble Trees
and SHAP Method. Sensors 2022, 22, 1154. [CrossRef]
25. Speith, T. A Review of Taxonomies of Explainable Artificial Intelligence (XAI) Methods. In Proceedings of the FAccT’22: 2022
ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, 21–24 June 2022; pp. 2239–2250.
[CrossRef]
26. Saeed, W.; Omlin, C. Explainable AI (XAI): A Systematic Meta-Survey of Current Challenges and Future Opportunities. arXiv
2021, arXiv:2111.06420.
27. Tran-Dang, H.; Bhardwaj, S.; Rahim, T.; Musaddiq, A.; Kim, D.S. Reinforcement Learning Based Resource Management for Fog
Computing Environment: Literature Review, Challenges, and Open Issues. J. Commun. Netw. 2022. [CrossRef]
28. Ghosh, S.; Sampalli, S. A Survey of Security in SCADA Networks: Current Issues and Future Challenges. IEEE Access 2019,
7, 135812–135831. [CrossRef]
29. Lin, Z.; Shi, Y.; Xue, Z. IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection. In
Advances in Knowledge Discovery and Data Mining; Gama, J., Li, T., Yu, Y., Chen, E., Zheng, Y., Teng, F., Eds.; Springer International
Publishing: Cham, Switzerland, 2022; pp. 79–91. [CrossRef]
30. Taparia, A. IoT 2022 in reveiew: The 10 most relevant IoT developments of the year. In Proceedings of the IoT Analytics: Market
Insights for the Internet of Things, Hamburg, Germany, 9 January 2023. Available online: https://iot-analytics.com/iot-2022-in-
review/ (accessed on 9 January 2023).
31. Guan, T.; Han, Y.; Kang, N.; Tang, N.; Chen, X.; Wang, S. An Overview of Vehicular Cybersecurity for Intelligent Connected
Vehicles. Sustainability 2022, 14, 5211. [CrossRef]
32. Anyanwu, G.O.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Novel Hyper-Tuned Ensemble Random Forest Algorithm for the Detection
of False Basic Safety Messages in Internet of Vehicles. ICT Express 2022. [CrossRef]
33. Xiong, S.; Qi, X. The Research on Security Model Algorithm in Intelligent Connected Vehicles. In Proceedings of the 2022
IEEE International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC), Hongqing, China, 5–7 August 2022;
pp. 372–376. [CrossRef]
34. Duan, X.; Yan, H.; Tian, D.; Zhou, J.; Su, J.; Hao, W. In-Vehicle CAN Bus Tampering Attacks Detection for Connected and
Autonomous Vehicles Using an Improved Isolation Forest Method. IEEE Trans. Intell. Transp. Syst. 2021, 1–13. [CrossRef]
35. Goddard, M. The EU General Data Protection Regulation (GDPR): European Regulation that has a Global Impact. Int. J. Mark.
Res. 2017, 59, 703–705. [CrossRef]
36. Global Status Report on Road Safety 2018; World Health Organization: Luxembourg, 2018.
37. Global Status Report on Road Traffic; Time for Action; World Health Organization: Luxembourg, 2020.
38. Global Status Report on Road Safety 2015; World Health Organization: Luxembourg, 2015.
39. Uzondu, C.; Jamson, S.; Marsden, G. Road Safety in Nigeria: Unravelling the Challenges, Measures, and Strategies for Improve-
ment. Int. J. Inj. Control Saf. Promot. 2022, 1–11. [CrossRef]
40. Bie, J.; Roelofsen, M.; Jin, L.; van Arem, B. Lane Change and Overtaking Collisions: Causes and Avoidance Techniques. In Wireless
Vehicular Networks for Car Collision Avoidance; Springer: New York, NY, USA, 2013; pp. 143–187. [CrossRef]
41. Singh, G.; Bansal, D.; Sofat, S. Intelligent Transportation System for Developing Countries:A Survey. Int. J. Comput. Appl. 2014,
85, 34–38. [CrossRef]
42. Kang, J.; Yu, R.; Huang, X.; Zhang, Y. Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst. 2018, 19, 2627–2637. [CrossRef]
43. Yang, D.; Jiang, K.; Zhao, D.; Yu, C.; CAO, Z.; XIE, S.; XIAO, Z.; JIAO, X.; Wang, S.; Zhang, K. Intelligent and connected vehicles:
Current status and future perspectives. Sci. China Technol. Sci. 2018, 61, 1446–1471. [CrossRef]
44. Li, Y.; Cao, Y.; Qiu, H.; Gao, L.; Du, Z.; Chen, S. Big wave of the intelligent connected vehicles. China Commun. 2016, 13, 27–41.
[CrossRef]
45. Kuang, X.; Zhao, F.; Hao, H.; Liu, Z. Intelligent connected vehicles: The industrial practices and impacts on automotive
value-chains in China. Asia Pac. Bus. Rev. 2018, 24, 1–21. [CrossRef]
46. Huang, J.M. Research on Internet of Vehicles and its Application in Intelligent Transportation. In Mechatronics and Industrial
Informatics; Applied Mechanics and Materials; Trans Tech Publications Ltd.: Zurich, Switzerland, 2013; Volume 321, pp. 2818–2821.
[CrossRef]
47. Contreras-Castillo, J.; Zeadally, S.; Guerrero-Ibañez, J.A. Internet of Vehicles: Architecture, Protocols, and Security. IEEE Internet
Things J. 2018, 5, 3701–3709. [CrossRef]
Appl. Sci. 2023, 13, 1252 26 of 29
48. Xu, C.; Wu, H.; Liu, H.; Gu, W.; Li, Y.; Cao, D. Blockchain-Oriented Privacy Protection of Sensitive Data in the Internet of Vehicles.
IEEE Trans. Intell. Veh. 2022. [CrossRef]
49. Hamid, U.Z.A.; Zamzuri, H.; Limbu, D.K. Internet of Vehicle (IoV) Applications in Expediting the Implementation of Smart
Highway of Autonomous Vehicle: A Survey. In Performability in Internet of Things; Springer International Publishing: Cham,
Switzerland, 2019; pp. 137–157. [CrossRef]
50. Ali, E.S.; Hassan, M.B.; Saeed, R.A. Machine Learning Technologies in Internet of Vehicles. In Intelligent Technologies for Internet of
Vehicles; Springer International Publishing: Cham, Swtizerland, 2021; pp. 225–252. [CrossRef]
51. Hindy, H.; Brosset, D.; Bayne, E.; Seeam, A.K.; Tachtatzis, C.; Atkinson, R.; Bellekens, X. A Taxonomy of Network Threats and the
Effect of Current Datasets on Intrusion Detection Systems. IEEE Access 2020, 8, 104650–104675. [CrossRef]
52. Zhu, B.; Joseph, A.; Sastry, S. A Taxonomy of Cyber Attacks on SCADA Systems. In Proceedings of the 2011 International
Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, Dalian, China,
19–22 October 2011; pp. 380–388. [CrossRef]
53. Hilal, H.; Nangim, A. Network Security Analysis SCADA System Automation on Industrial Process. In Proceedings of the 2017
International Conference on Broadband Communication, Wireless Sensors and Powering (BCWSP), Jakarta, Indonesia, 21–23
November 2017; pp. 1–6. [CrossRef]
54. Oseni, A.; Moustafa, N.; Creech, G.; Sohrabi, N.; Strelzoff, A.; Tari, Z.; Linkov, I. An Explainable Deep Learning Framework for
Resilient Intrusion Detection in IoT-Enabled Transportation Networks. IEEE Trans. Intell. Transp. Syst. 2022, 1–15. [CrossRef]
55. Melnick, J. Top 10 Most Common Types of Cyber Attacks. Netwrix Blog. 15 May 2018. Available online: https://blog.netwrix.
com/2018/05/15/top-10-most-common-types-of-cyber-attacks/ (accessed on 7 January 2023).
56. Zhang, Y.; Xiang, Y.; Wang, L. Reliability Analysis of Power Grids with Cyber Vulnerability in SCADA System. In Proceedings of
the 2014 IEEE PES General Meeting|Conference & Exposition, National Harbor, MD, USA, 27–31 July 2014; pp. 1–5. [CrossRef]
57. Anyanwu, G.O.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. RBF-SVM Kernel-based Model for Detecting DDoS Attacks in SDN
Integrated Vehicular Network. Ad Hoc Netw. 2023, 140, 103026. [CrossRef]
58. Kalluri, R.; Mahendra, L.; Kumar, R.S.; Prasad, G.G. Simulation and Impact Analysis of Denial-of-Service Attacks on Power
SCADA. In Proceedings of the 2016 National Power Systems Conference (NPSC), Bhubaneswar, India, 19–21 December 2016;
pp. 1–5. [CrossRef]
59. Amaizu, G.; Nwakanma, C.; Bhardwaj, S.; Lee, J.; Kim, D. Composite and Efficient DDoS Attack Detection Framework for B5G
Networks. Comput. Netw. 2021, 188, 107871. [CrossRef]
60. Rakas, S.V.B.; Stojanović, M.D.; Marković-Petrović, J.D. A Review of Research Work on Network-Based SCADA Intrusion
Detection Systems. IEEE Access 2020, 8, 93083–93108. [CrossRef]
61. Tian, H. Introduction of IoV Security; China Academy of Information and Communication Technology (CAICT): Beijing, China,
2017; pp. 1–59.
62. Mandal, S. Protecting Software-defined Vehicles with Cybersecurity Solutions. In Proceedings of the Connected Vehicle 2022
Summit: From ADAS to Autonomous Mobility, Bengaluru, India, 4–6 May 2022.
63. Vitale, C.; Piperigkos, N.; Laoudias, C.; Ellinas, G.; Casademont, J.; Escrig, J.; Kloukiniotis, A.; Lalos, A.S.; Moustakas, K.; Diaz
Rodriguez, R.; et al. CARAMEL: Results on a secure architecture for connected and autonomous vehicles detecting GPS spoofing
attacks. J. Wirel. Commun. Netw. 2021, 2021, 115. [CrossRef]
64. Sarhan, M.; Layeghy, S.; Portmann, M. An Explainable Machine Learning-Based Network Intrusion Detection System for Enabling
Generalisability in Securing IoT Networks. arXiv 2021. [CrossRef]
65. Zebin, T.; Rezvy, S.; Luo, Y. An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks. IEEE
Trans. Inf. Forensics Secur. 2022, 17, 2339–2349. [CrossRef]
66. Marino, D.L.; Wickramasinghe, C.S.; Manic, M. An Adversarial Approach for Explainable AI in Intrusion Detection Systems. In
Proceedings of the IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, 21–23
October 2018; pp. 3237–3243. [CrossRef]
67. Das, S.; Agarwal, N.; Shiva, S. DDoS Explainer using Interpretable Machine Learning. In Proceedings of the 2021 IEEE 12th
Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 27–30
October 2021; pp. 0001–0007. [CrossRef]
68. Srivastava, G.; Jhaveri, R.H.; Bhattacharya, S.; Pandya, S.; Maddikunta, P.K.R.; Yenduri, G.; Hall, J.G.; Alazab, M.; Gadekallu, T.R.
XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions. arXiv 2022, arXiv:2206.03585.
69. McNamara, M. Explainable AI: What Is It? How Does It Work? And What Role Does Data Play? NetApp. Available online:
https://www.netapp.com/blog/explainable-ai/ (accessed on 22 February 2022).
70. Arrieta, A.B.; Díaz-Rodríguez, N.; Ser, J.D.; Bennetot, A.; Tabik, S.; Barbado, A.; Garcia, S.; Gil-Lopez, S.; Molina, D.; Benjamins, R.;
et al. Explainable Artificial Intelligence (XAI): Concepts, Taxonomies, Opportunities and Challenges Toward Responsible AI. Inf.
Fusion 2020, 58, 82–115. [CrossRef]
71. Slijepcevic, D.; Horst, F.; Lapuschkin, S.; Raberger, A.M.; Zeppelzauer, M.; Samek, W.; Breiteneder, C.; Schöllhorn, W.I.; Horsak, B.
On the Explanation of Machine Learning Predictions in Clinical Gait Analysis. arXiv 2019, arXiv:1912.07737.
72. Lundberg, S.M.; Lee, S.I. A Unified Approach to Interpreting Model Predictions. arXiv 2017, arXiv:1705.07874.
Appl. Sci. 2023, 13, 1252 27 of 29
73. Ge, W.; Patino, J.; Todisco, M.; Evans, N. Explaining Deep Learning Models for Spoofing and Deepfake Detection with SHapley
Additive ExPlanations. In Proceedings of the ICASSP 2022—2022 IEEE International Conference on Acoustics, Speech and Signal
Processing (ICASSP), Singapore, 23–27 May 2022; pp. 6387–6391. [CrossRef]
74. Gulmezoglu, B. XAI-based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses. IEEE
Trans. Dependable Secur. Comput. 2021. [CrossRef]
75. Nascita, A.; Montieri, A.; Aceto, G.; Ciuonzo, D.; Persico, V.; Pescapé, A. XAI Meets Mobile Traffic Classification: Understanding
and Improving Multimodal Deep Learning Architectures. IEEE Trans. Netw. Serv. Manag. 2021, 18, 4225–4246. [CrossRef]
76. Zou, L.; Goh, H.L.; Liew, C.J.Y.; Quah, J.L.; Gu, G.T.; Chew, J.J.; Prem Kumar, M.; Ang, C.G.L.; Ta, A. Ensemble Image Explainable
AI (XAI) Algorithm for Severe Community-Acquired Pneumonia and COVID-19 Respiratory Infections. IEEE Trans. Artif. Intell.
2022. [CrossRef]
77. Saraswat, D.; Bhattacharya, P.; Verma, A.; Prasad, V.K.; Tanwar, S.; Sharma, G.; Bokoro, P.N.; Sharma, R. Explainable AI for
Healthcare 5.0: Opportunities and Challenges. IEEE Access 2022, 10, 84486–84517. [CrossRef]
78. Narteni, S.; Orani, V.; Cambiaso, E.; Rucco, M.; Mongelli, M. On the Intersection of Explainable and Reliable AI for Physical
Fatigue Prediction. IEEE Access 2022, 10, 76243–76260. [CrossRef]
79. Letzgus, S.; Wagner, P.; Lederer, J.; Samek, W.; Müller, K.R.; Montavon, G. Toward Explainable Artificial Intelligence for Regression
Models: A Methodological Perspective. IEEE Signal Process. Mag. 2022, 39, 40–58. [CrossRef]
80. Hwang, C.; Lee, T. E-SFD: Explainable Sensor Fault Detection in the ICS Anomaly Detection System. IEEE Access 2021, 9,
140470–140486. [CrossRef]
81. Zhang, K.; Zhang, J.; Xu, P.D.; Gao, T.; Gao, D.W. Explainable AI in Deep Reinforcement Learning Models for Power System
Emergency Control. IEEE Trans. Comput. Soc. Syst. 2022, 9, 419–427. [CrossRef]
82. Srinivasan, S.; Arjunan, P.; Jin, B.; Sangiovanni-Vincentelli, A.L.; Sultan, Z.; Poolla, K. Explainable AI for Chiller Fault-Detection
Systems: Gaining Human Trust. Computer 2021, 54, 60–68. [CrossRef]
83. Collini, E.; Palesi, L.A.I.; Nesi, P.; Pantaleo, G.; Nocentini, N.; Rosi, A. Predicting and Understanding Landslide Events with
Explainable AI. IEEE Access 2022, 10, 31175–31189. [CrossRef]
84. Ryu, J.; Park, C.; Park, J.; Cho, N.; Park, J.; Cho, G. Development of Neural Network Model with Explainable AI for Measuring
Uranium Enrichment. IEEE Trans. Nucl. Sci. 2021, 68, 2670–2681. [CrossRef]
85. Tao, J.; Xiong, Y.; Zhao, S.; Wu, R.; Shen, X.; Lyu, T.; Fan, C.; Hu, Z.; Zhao, S.; Pan, G. Explainable AI for Cheating Detection and
Churn Prediction in Online Games. IEEE Trans. Games 2022. [CrossRef]
86. Wakjira, T.G.; Ibrahim, M.; Ebead, U.; Alam, M.S. Explainable Machine Learning Model and Reliability Analysis for Flexural
Capacity Prediction of RC Beams Strengthened in Flexure with FRCM. Eng. Struct. 2022, 255, 113903. [CrossRef]
87. Moawad, A.; Islam, E.; Kim, N.; Vijayagopal, R.; Rousseau, A.; Wu, W.B. Explainable AI for a No-Teardown Vehicle Component
Cost Estimation: A Top-Down Approach. IEEE Trans. Artif. Intell. 2021, 2, 185–199. [CrossRef]
88. Adadi, A.; Berrada, M. Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI). IEEE Access 2018,
6, 52138–52160. [CrossRef]
89. Gossen, F.; Margaria, T.; Steffen, B. Formal Methods Boost Experimental Performance for Explainable AI. IT Prof. 2021, 23, 8–12.
[CrossRef]
90. Gossen, F.; Steffen, B. Algebraic Aggregation Random Forests: Towards Explainability and Rapid Evaluation. Int. J. Softw. Tools
Technol. Transf. 2020, 22, 8–12. [CrossRef]
91. Ahmed, I.; Jeon, G.; Piccialli, F. From Artificial Intelligence to Explainable Artificial Intelligence in Industry 4.0: A Survey on
What, How, and Where. IEEE Trans. Ind. Inform. 2022, 18, 5031–5042. [CrossRef]
92. Li, X.H.; Cao, C.C.; Shi, Y.; Bai, W.; Gao, H.; Qiu, L.; Wang, C.; Gao, Y.; Zhang, S.; Xue, X.; et al. A Survey of Data-Driven and
Knowledge-Aware EXplainable AI. IEEE Trans. Knowl. Data Eng. 2022, 34, 29–49. [CrossRef]
93. Rawal, A.; Mccoy, J.; Rawat, D.B.; Sadler, B.; Amant, R. Recent Advances in Trustworthy Explainable Artificial Intelligence: Status,
Challenges and Perspectives. IEEE Trans. Artif. Intell. 2021. [CrossRef]
94. Luo, F.; Jiang, Y.; Zhang, Z.; Ren, Y.; Hou, S. Threat Analysis and Risk Assessment for Connected Vehicles: A Survey. Secur.
Commun. Netw. 2021, 2021, 1263820. [CrossRef]
95. Dibaei, M.; Zheng, X.; Jiang, K.; Abbas, R.; Liu, S.; Zhang, Y.; Xiang, Y.; Yu, S. Attacks and defences on intelligent connected
vehicles: A survey. Digit. Commun. Netw. 2020, 6, 399–421. [CrossRef]
96. Banafshehvaragh, S.T.; Rahmani, A.M. Intrusion, anomaly, and attack detection in smart vehicles. Microprocess. Microsyst. 2023,
96, 104726. [CrossRef]
97. Wang, B.; Han, Y.; Wang, S.; Tian, D.; Cai, M.; Liu, M.; Wang, L. A Review of Intelligent Connected Vehicle Cooperative Driving
Development. Mathematics 2022, 10, 3635. [CrossRef]
98. Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G. Preferred Reporting Items for Systematic Reviews and Meta-analyses: The
PRISMA Statement. Ann. Intern. Med. 2009, 151, 264–269. [CrossRef]
99. Njoku, J.N.; Nwakanma, C.I.; Amaizu, G.C.; Kim, D.S. Prospects and Challenges of Metaverse Application in Data-Driven
Intelligent Transportation Systems. IET Intell. Transp. Syst. 2023, 17, 1–21. [CrossRef]
100. Torres-Carrión, P.V.; González-González, C.S.; Aciar, S.; Rodríguez-Morales, G. Methodology for Systematic Literature Review
Applied to Engineering and Education. In Proceedings of the 2018 IEEE Global Engineering Education Conference (EDUCON),
Santa Cruz de Tenerife, Spain, 17–20 April 2018; pp. 1364–1373. [CrossRef]
Appl. Sci. 2023, 13, 1252 28 of 29
101. Misra, S. A Step by Step Guide for Choosing Project Topics and Writing Research Papers in ICT Related Disciplines. In Proceedings
of the International Conference on Information and Communication Technology and Applications; Springer: Berlin/Heidelberg, Germany,
2020; pp. 727–744. [CrossRef]
102. Lundberg, H.; Mowla, N.I.; Abedin, S.F.; Thar, K.; Mahmood, A.; Gidlund, M.; Raza, S. Experimental Analysis of Trustworthy
In-Vehicle Intrusion Detection System using eXplainable Artificial Intelligence (XAI). IEEE Access 2022. [CrossRef]
103. Keneni, B.M.; Kaur, D.; Al Bataineh, A.; Devabhaktuni, V.K.; Javaid, A.Y.; Zaientz, J.D.; Marinier, R.P. Evolving Rule-Based
Explainable Artificial Intelligence for Unmanned Aerial Vehicles. IEEE Access 2019, 7, 17001–17016. [CrossRef]
104. El Houda, Z.A.; Brik, B.; Senouci, S.M. A Novel IoT-Based Explainable Deep Learning Framework for Intrusion Detection Systems.
IEEE Internet Things Mag. 2022, 5, 20–23. [CrossRef]
105. Upadhyay, D.; Manero, J.; Zaman, M.; Sampalli, S. Intrusion Detection in SCADA Based Power Grids: Recursive Feature
Elimination Model with Majority Vote Ensemble Algorithm. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2559–2574. [CrossRef]
106. Zhang, F.; Kodituwakku, H.A.D.E.; Hines, J.W.; Coble, J. Multilayer Data-Driven Cyber-Attack Detection System for Industrial
Control Systems Based on Network, System, and Process Data. IEEE Trans. Ind. Inform. 2019, 15, 4362–4369. [CrossRef]
107. Ribeiro, M.T.; Singh, S.; Guestrin, C. “Why Should I Trust You?”: Explaining the Predictions of Any Classifier. arXiv 2016,
arXiv:1602.04938.
108. Zolanvari, M.; Yang, Z.; Khan, K.; Jain, R.; Meskin, N. TRUST XAI: Model-Agnostic Explanations for AI with a Case Study on
IIoT Security. IEEE Internet Things J. 2021. [CrossRef]
109. Guidotti, R.; Monreale, A.; Ruggieri, S.; Pedreschi, D.; Turini, F.; Giannotti, F. Local Rule-Based Explanations of Black Box Decision
Systems. arXiv 2018, arXiv:1805.10820.
110. Selvaraju, R.R.; Cogswell, M.; Das, A.; Vedantam, R.; Parikh, D.; Batra, D. Grad-CAM: Visual Explanations from Deep Networks
via Gradient-Based Localization. Int. J. Comput. Vis. 2019, 128, 336–359. [CrossRef]
111. Dhurandhar, A.; Chen, P.Y.; Luss, R.; Tu, C.C.; Ting, P.; Shanmugam, K. Explanations based on the missing: Towards contrastive
explanations with pertinent negatives. In Proceedings of the NIPS’18: 32nd International Conference on Neural Information
Processing Systems, Montréal, QC, Canada, 3–8 December 2018. [CrossRef]
112. Ahmad, Z.; Shahid Khan, A.; Wai Shiang, C.; Abdullah, J.; Ahmad, F. Network Intrusion Detection System: A Systematic Study of
Machine Learning and Deep Learning Approaches. Trans. Emerg. Telecommun. Technol. 2021, 32, e4150. [CrossRef]
113. Zolanvari, M.; Teixeira, M.A.; Gupta, L.; Khan, K.M.; Jain, R. Machine Learning-Based Network Vulnerability Analysis of
Industrial Internet of Things. IEEE Internet Things J. 2019, 6, 6822–6834. [CrossRef]
114. Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of Intrusion Detection Systems: Techniques, Datasets and
Challenges. Cybersecurity 2019, 2, 1–22. [CrossRef]
115. Alladi, T.; Kohli, V.; Chamola, V.; Yu, F.R.; Guizani, M. Artificial Intelligence (AI)-Empowered Intrusion Detection Architecture for
the Internet of Vehicles. IEEE Wirel. Commun. 2021, 28, 144–149. [CrossRef]
116. Ercan, S.; Ayaida, M.; Messai, N. Misbehavior Detection for Position Falsification Attacks in VANETs Using Machine Learning.
IEEE Access 2022, 10, 1893–1904. [CrossRef]
117. Khan, I.A.; Moustafa, N.; Pi, D.; Haider, W.; Li, B.; Jolfaei, A. An Enhanced Multi-Stage Deep Learning Framework for Detecting
Malicious Activities From Autonomous Vehicles. IEEE Trans. Intell. Transp. Syst. 2021, 1–10. [CrossRef]
118. Almutlaq, S.; Derhab, A.; Hassan, M.M.; Kaur, K. Two-Stage Intrusion Detection System in Intelligent Transportation Systems
Using Rule Extraction Methods From Deep Neural Networks. IEEE Trans. Intell. Transp. Syst. 2022, 1–15. [CrossRef]
119. Ashraf, J.; Bakhshi, A.D.; Moustafa, N.; Khurshid, H.; Javed, A.; Beheshti, A. Novel Deep Learning-Enabled LSTM Autoencoder
Architecture for Discovering Anomalous Events From Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2021,
22, 4507–4518. [CrossRef]
120. Heijden, R.W.V.D.; Lukaseder, T.; Kargl, F. VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.
arXiv 2018, arXiv:1804.06701.
121. Amanullah, M.A.; Baruwal Chhetri, M.; Loke, S.W.; Doss, R. BurST-ADMA: Towards an Australian Dataset for Misbehaviour
Detection in the Internet of Vehicles. In Proceedings of the 2022 IEEE International Conference on Pervasive Computing
and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21–25 May 2022; pp. 624–629.
[CrossRef]
122. Panda, M.; Mousa, A.A.A.; Hassanien, A.E. Developing an Efficient Feature Engineering and Machine Learning Model for
Detecting IoT-Botnet Cyber Attacks. IEEE Access 2021, 9, 91038–91052. [CrossRef]
123. Ahakonye, L.A.C.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Efficient Classification of Enciphered SCADA Network Traffic in Smart
Factory Using Decision Tree Algorithm. IEEE Access 2021, 9, 154892–154901. [CrossRef]
124. Upadhyay, D.; Manero, J.; Zaman, M.; Sampalli, S. Gradient Boosting Feature Selection with Machine Learning Classifiers for
Intrusion Detection on Power Grids. IEEE Trans. Netw. Serv. Manag. 2020, 18, 1104–1116. [CrossRef]
125. Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; MIT Press: Cambridge, MA, USA, 2016. Available online: http://www.
deeplearningbook.org (accessed on 5 January 2023).
126. Gonçalves, F.; Ribeiro, B.; Gama, O.; Santos, J.; Costa, A.; Dias, B.; Nicolau, M.J.; Macedo, J.; Santos, A. V2X Security Threats. 2020.
Available online: https://doi.org/10.5281/zenodo.4304411 (accessed on 5 January 2023).
127. Seo, E.; Song, H.M.; Kim, H.K. GIDS: GAN Based Intrusion Detection System for In-Vehicle Network. arXiv 2019, arXiv:1907.07377.
Appl. Sci. 2023, 13, 1252 29 of 29
128. Capuano, N.; Fenza, G.; Loia, V.; Stanzione, C. Explainable Artificial Intelligence in CyberSecurity: A Survey. IEEE Access 2022,
10, 93575–93600. [CrossRef]
129. Rajapaksha, D.; Bergmeir, C.; Buntine, W. LoRMIkA: Local rule-based model interpretability with k-optimal associations. Inf. Sci.
2020, 540, 221–241. [CrossRef]
130. Das, P.; Ortega, A. Gradient-Weighted Class Activation Mapping for Spatio Temporal Graph Convolutional Network. In
Proceedings of the ICASSP 2022—2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Singapore, 18 May 2022; pp. 4043–4047. [CrossRef]
131. Draelos, R.L.; Carin, L. Use HiResCAM instead of Grad-CAM for faithful explanations of convolutional neural networks. arXiv
2020, arXiv:2011.08891.
132. Mendel, J.M.; Bonissone, P.P. Critical Thinking About Explainable AI (XAI) for Rule-Based Fuzzy Systems. IEEE Trans. Fuzzy Syst.
2021, 29, 3579–3593. [CrossRef]
133. Wakjira, T.G.; Ebead, U.; Alam, M.S. Machine Learning-Based Shear Capacity Prediction and Reliability Analysis of Shear-Critical
RC Beams Strengthened with Inorganic Composites. Case Stud. Constr. Mater. 2022, 16, e01008. [CrossRef]
134. Xu, Z.; Saleh, J.H. Machine Learning for Reliability Engineering and Safety Applications: Review of Current Status and Future
Opportunities. Reliab. Eng. Syst. Saf. 2021, 211, 107530. [CrossRef]
135. Fryer, D.; Strümke, I.; Nguyen, H. Shapley Values for Feature Selection: The Good, the Bad, and the Axioms. IEEE Access 2021,
9, 144352–144360. [CrossRef]
136. Galli, A.; Marrone, S.; Moscato, V.; Sansone, C. Reliability of eXplainable Artificial Intelligence in Adversarial Perturbation
Scenarios. In Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges; Del Bimbo, A., Cucchiara, R.,
Sclaroff, S., Farinella, G.M., Mei, T., Bertini, M., Escalante, H.J., Vezzani, R., Eds.; Springer International Publishing: Cham,
Switzerland, 2021; pp. 243–256. [CrossRef]
137. Rathore, R.; Hewage, C.; Kaiwartya, O.; Lloret, J. In-Vehicle Communication Cyber Security: Challenges and Solutions. Sensors
2022, 22, 6679. [CrossRef] [PubMed]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.