Autonomous Vehicles With a 6G-Based Intelligent Cybersecurity Model

被引:6
|
作者
Algarni, Abdullah M. [1 ]
Thayananthan, Vijey [1 ]
机构
[1] King Abdulaziz Univ, Comp Sci Dept, Jeddah 21589, Saudi Arabia
关键词
6G mobile communication; Security; Computer security; Safety; Ultra reliable low latency communication; Deep learning; Costs; Autonomous vehicles; Risk management; Intelligent transportation systems; 6G security; autonomous vehicles; cybersecurity attacks; intelligent transportation system; risk assessment; 6G; SECURE;
D O I
10.1109/ACCESS.2023.3244883
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in autonomous vehicles (AVs). Electric vehicles and AVs not supporting the integration of intelligent cybersecurity will become vulnerable, and their internal functions, features, and devices providing services will be damaged. This paper presents an intelligent cybersecurity model integrating intelligent features according to the emerging 6G-based technology based on evolving cyberattacks. The model's novel design was developed using the necessary algorithms to provide quick and proactive decisions with intelligent cybersecurity based on 6G (IC6G) policies when AVs face cyberattacks. In this model, network security algorithms incorporating intelligent techniques are developed using applied cryptography. Money transaction handling services implemented in an AV are considered an example to determine the security and intelligence level depending on the IC6G policies. Intelligence, complexity, and energy efficiency (EE) are assessed. Finally, we conclude that the model results are effective for intelligently detecting and preventing cyberattacks on AVs.
引用
收藏
页码:15284 / 15296
页数:13
相关论文
共 50 条
  • [21] Cybersecurity for autonomous vehicles: Review of attacks and defense
    Kim, Kyounggon
    Kim, Jun Seok
    Jeong, Seonghoon
    Park, Jo-Hee
    Kim, Huy Kang
    COMPUTERS & SECURITY, 2021, 103
  • [22] THE liability for cybersecurity breaches of connected and autonomous vehicles
    Channon M.
    Marson J.
    Computer Law and Security Review, 2021, 43
  • [23] An Overview of Vehicular Cybersecurity for Intelligent Connected Vehicles
    Guan, Tian
    Han, Yi
    Kang, Nan
    Tang, Ningye
    Chen, Xu
    Wang, Shu
    SUSTAINABILITY, 2022, 14 (09)
  • [24] LoRaWAN Scheduling Mechanism for 6G-based LEO Satellite Communications
    Varma, Abhijeet Manoj
    Choudhury, Nikumani
    Dave, Jay
    Hazarika, Anakhi
    Nasralla, Moustafa M.
    2024 IEEE 99TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2024-SPRING, 2024,
  • [25] INTELLIGENT AUTONOMOUS VEHICLES - PREFACE
    HARRIS, CJ
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 1994, 7 (02) : 101 - 103
  • [26] Three Novel Rhodamine 6G-Based Colorimetric and Fluorescent pH Switches
    Li, Ning
    Li, Zhiyi
    Xu, Dongmei
    JOURNAL OF FLUORESCENCE, 2025, 35 (02) : 1011 - 1023
  • [27] ArguteDUB: Deep Learning Based Distributed Uplink Beamforming in 6G-Based IoV
    Yi, Xingrui
    Li, Jianqiang
    Liu, Yutong
    Kong, Linghe
    Shao, Ying
    Chen, Guihai
    Liu, Xue
    Mumtaz, Shahid
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) : 2551 - 2565
  • [28] Localization based on TDoA projection for autonomous vehicles in 6G cellular networks
    Chang, Sekchin
    ICT EXPRESS, 2024, 10 (01): : 34 - 38
  • [29] Cybersecurity Oriented Architecture to Ensure the Autonomous Vehicles Communication
    Sersemis, Athanasios
    Papadopoulos, Alexandros
    Spanos, Georgios
    Lalas, Antonios
    Votis, Konstantinos
    Tzovaras, Dimitrios
    2023 31ST MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, MED, 2023, : 119 - 124
  • [30] Cybersecurity in Autonomous Vehicles-Are We Ready for the Challenge?
    Durlik, Irmina
    Miller, Tymoteusz
    Kostecka, Ewelina
    Zwierzewicz, Zenon
    Lobodzinska, Adrianna
    ELECTRONICS, 2024, 13 (13)