Hybrid Cyber Defense Architectures for Autonomous Vehicle Networks
Cover
PDF

How to Cite

[1]
Dr. Soo-Yeon Oh, “Hybrid Cyber Defense Architectures for Autonomous Vehicle Networks”, Journal of AI in Healthcare and Medicine, vol. 2, no. 1, pp. 64–83, Jun. 2022, Accessed: Nov. 21, 2024. [Online]. Available: https://healthsciencepub.com/index.php/jaihm/article/view/42

Abstract

Our work specifically addresses In-Vehicle Network (IVN) architectures that address cyber anomalous changes as they take place in the vehicle network. The contributions in this paper are threefold. We propose solution methods to incorporate cyber defense for Byzantine-resilient, adaptive networks that weigh attributes such as efficiency or accuracy under a known, large number of novel or old attacks. These types of methods can handle large data-to-signal ratios rather effectively in sampled data environments. We also propose direct solutions for small networks whose time-frames in practice may or may not be useful for actual situations because of the overhead required to process the data required. Several experimental tests were conducted and results indicate that our proposed solutions vastly exceed baseline performance and could be useful for cyber defense research in various types of networks.

Autonomous vehicles (AVs) represent a major opportunity for the transportation industry and are a primary focus for both established and start-up companies. Over the past few years, many AVs have been developed and are running on the highways with minimal cyber defense provided by their developers. The trend is growing, with firms such as Waymo, Uber, and Zoox leading the pack in field deployment. With vehicle-to-everything (V2X) communication technologies, especially 5G, about to be deployed, there is now time to seriously consider the growing cyber security threats to large AV networks and focus on designing countermeasures.

PDF

References

L. Chen, Y. Zhang, Y. Wang, and J. Wu, "A Survey of Cyber Security in Smart Grids," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1989-2010, Fourth Quarter 2014.

M. M. Hassan, E. Hossain, and A. Alamri, "Cyber Security and Privacy Issues in IoT-Based Healthcare Systems: A Comprehensive Review," in IEEE Access, vol. 5, pp. 6787-6808, 2017.

M. S. Hossain, M. Fotouhi, A. Hasan, and R. Hasan, "Cloud-Assisted Industrial Internet of Things (IIoT) - Enabled Framework for Health Monitoring," in IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1340-1351, Dec. 2017.

J. Lin, R. Li, J. Lu, Y. Zhu, and Y. Zhang, "Health-IoT: A Hybrid Health Monitoring Architecture for IoT," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1980-1991, April 2019.

J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions," in Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, Sept. 2013.

S. Khan, R. A. Khan, S. U. Khan, and M. A. Aziz, "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges," in Information Technology Journal, vol. 12, no. 10, pp. 2477-2484, 2013.

T. O. Olwal and C. Odhiambo, "Review of Security Issues in Industrial IoT," in International Journal of Computer Applications, vol. 175, no. 7, pp. 18-24, October 2017.

K. Mekki, M. Msakni, and N. Boudriga, "A Survey on Security in Internet of Things: State of the Art and Future Trends," in ACM Computing Surveys (CSUR), vol. 49, no. 4, pp. 1-35, 2016.

A. Dorri, S. S. Kanhere, and R. Jurdak, "Towards an Optimized Blockchain for IoT," in Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp. 173-178, 2017.

M. M. Alam, M. Rehman, S. U. Khan, and I. U. Khan, "A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts," in IEEE Access, vol. 6, pp. 29847-29857, 2018.

K. Yang, X. Chen, P. Sun, H. Wen, and J. Li, "Blockchain-Based Decentralized Trust Management in Vehicular Networks," in IEEE Transactions on Vehicular Technology, vol. 68, no. 4, pp. 3144-3154, April 2019.

J. Y. L. Loo, R. S. Lee, J. Y. K. Loo, and K. Y. Lam, "A Blockchain-Based Architecture for Secure Data Storage in Decentralized Digital Ecosystems," in IEEE Access, vol. 7, pp. 45470-45485, 2019.

Tatineni, Sumanth. "Beyond Accuracy: Understanding Model Performance on SQuAD 2.0 Challenges." International Journal of Advanced Research in Engineering and Technology (IJARET) 10.1 (2019): 566-581.

Vemoori, Vamsi. "Comparative Assessment of Technological Advancements in Autonomous Vehicles, Electric Vehicles, and Hybrid Vehicles vis-à-vis Manual Vehicles: A Multi-Criteria Analysis Considering Environmental Sustainability, Economic Feasibility, and Regulatory Frameworks." Journal of Artificial Intelligence Research 1.1 (2021): 66-98.

Shaik, Mahammad, Srinivasan Venkataramanan, and Ashok Kumar Reddy Sadhu. "Fortifying the Expanding Internet of Things Landscape: A Zero Trust Network Architecture Approach for Enhanced Security and Mitigating Resource Constraints." Journal of Science & Technology 1.1 (2020): 170-192.

Vemori, Vamsi. "Human-in-the-Loop Moral Decision-Making Frameworks for Situationally Aware Multi-Modal Autonomous Vehicle Networks: An Accessibility-Focused Approach." Journal of Computational Intelligence and Robotics 2.1 (2022): 54-87.

A. A. Gani, S. Khan, A. Y. Zomaya, and M. K. Khan, "Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment," in IEEE Access, vol. 6, pp. 1706-1717, 2018.

Y. Xiao, X. Yi, S. Lu, and D. K. Y. Yau, "A Survey of Key Management Schemes in Wireless Sensor Networks," in Computer Communications, vol. 30, no. 14-15, pp. 2314-2341, 2007.

H. Zhang, Q. Liu, Z. Chen, and B. Zhang, "E-Health: A Review on IoT-Based Smart Health Monitoring Systems," in Journal of Industrial Information Integration, vol. 18, pp. 100129, 2020.

M. M. Hassan, E. Hossain, and A. Alamri, "Cyber Security and Privacy Issues in IoT-Based Healthcare Systems: A Comprehensive Review," in IEEE Access, vol. 5, pp. 6787-6808, 2017.

S. S. Kanhere and C. M. R. Prasad, "Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey," in IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 55-66, First Quarter 2013.

J. Cheng, Z. Zhang, J. Chen, and Z. Jin, "Cooperative Security Defense Framework Against Advanced Persistent Threats in Industrial Internet of Things," in IEEE Transactions on Industrial Informatics, vol. 14, no. 6, pp. 2560-2568, June 2018.

S. Rahmani, S. Habibi, and J. G. Paredes, "Smart Cities and the IoT: An Investigation of Cybersecurity Challenges," in Journal of Information Security and Applications, vol. 50, pp. 76-90, 2020.

A. H. Almohri, F. F. Alharbi, M. A. Jararweh, and M. A. Alzubaidi, "A Survey on the Security of Fog Computing in IoT," in Journal of King Saud University - Computer and Information Sciences, 2020.

Downloads

Download data is not yet available.