Science, Technology, Engineering and Mathematics.
Open Access

ENHANCING AUTONOMOUS VEHICLE SECURITY THROUGH ADVANCED ARTIFICIAL INTELLIGENCE TECHNIQUES

Download as PDF

Volume 6, Issue 4, Pp 1-6, 2024

DOI: 10.61784/jcsee3017

Author(s)

Rana Hassam Ahmed, Majid Hussain, Hassan Abbas, Samraiz Zahid, Muhammad Hannan Tariq*

Affiliation(s)

Department of Computer Science, The University of Faisalabad, 38000 Pakistan.

Corresponding Author

Muhammad Hannan Tariq

ABSTRACT

As the technology behind autonomous vehicles advances at breakneck speed, ensuring their safety has become a critical concern for engineers and policymakers alike. While numerous security measures have been proposed to mitigate risks associated with cyberattacks or hardware malfunction, artificial intelligence (AI) algorithms offer promising solutions to enhance anomaly detection capabilities within these systems. This research paper delves into precisely this area of interest, exploring how AI algorithms can improve anomaly detection in autonomous vehicles. Through an examination of various AI techniques--including machine learning, deep learning, and anomaly detection algorithms--this study examines their potential for bolstering the security of autonomous systems and mitigating potential risk factors. To achieve its aims effectively, the study focuses on analyzing large datasets using advanced AI models that can identify anomalies accurately and efficiently. This approach will enable timely responses to detected threats by allowing for the swift implementation of responsive measures. The development of robust frameworks for protecting autonomous vehicle networks represents one significant contribution to this research's findings. By utilizing AI techniques previously unexplored in this area, this study enables a more thorough understanding of exactly how vulnerabilities may develop within these complex systems–-and offers viable strategies for moving forward. Ultimately, producing findings capable of significantly strengthening established protocols can help those designing processes based around autonomous devices deploy them more confidently. In doing so–-by contributing insights explicitly tailored to securing connected infrastructure components like self-driving cars–-we aspire toward better outcomes through innovative technology applications while keeping people safer than ever before.

KEYWORDS

Autonomous vehicle; Artificial intelligence; Anomaly detection; Security and privacy

CITE THIS PAPER

Rana Hassam Ahmed, Majid Hussain, Hassan Abbas, Samraiz Zahid, Muhammad Hannan Tariq. Enhancing autonomous vehicle security through advanced artificial intelligence techniques. Journal of Computer Science and Electrical Engineering. 2024, 6(4): 1-6. DOI: 10.61784/jcsee3017.

REFERENCES

[1] M, Hataba, A, Sherif, M, Mahmoud, et al. Security and Privacy Issues in Autonomous Vehicles: A Layer-Based Survey. IEEE Open Journal of the Communications Society, 2022, 3, 811-829. DOI: 10.1109/OJCOMS.2022.3169500.

[2] R, Hussain, H, Oh. On secure and privacy-aware sybil attack detection in vehicular communications. Wirel Pers Commun, 2014, 77(4): 2649-2673. DOI: 10.1007/s11277-014-1659-5.

[3] S, Ucar, S C, Ergen, O, Ozkasap. IEEE 802.11p and visible light hybrid communication based secure autonomous platoon. IEEE Trans Veh Technol, 2018, 67(9): 8667-8681. DOI: 10.1109/TVT.2018.2840846.

[4] A, Brighente, M, Conti, D, Donadel, et al. Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. 2023.  DOI: https://doi.org/10.48550/arXiv.2301.04587. Available: http://arxiv.org/abs/2301.04587

[5] S, Jabbar, A H, Akbar, S, Zafar, et al. VISTA: achieving cumulative VIsion through energy efficient Silhouette recognition of mobile Targets through collAboration of visual sensor nodes. EURASIP Journal on Image and Video Processing, 2014, 32. DOI: https://doi.org/10.1186/1687-5281-2014-32.

[6] K, Kim, J S, Kim, S, Jeong, et al. Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers and Security, 2021, 103. DOI: 10.1016/j.cose.2020.102150.

[7] K, Koscher, A, Czeskis, F, Roesner, et al. Experimental security analysis of a modern automobile. 2010 IEEE Symposium on Security and Privacy, , Oakland, CA, USA. 2010, 447-462. DOI: 10.1109/SP.2010.34.

[8] N, Mazher, G, Krishna Sriram, B, Namatherdhala, et al. USES OF ARTIFICIAL INTELLIGENCE IN AUTONOMOUS DRIVING AND V2X COMMUNICATION. 1932. Available: www.irjmets.com

[9] T H H, Aldhyani, H, Alkahtani. Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity. Sensors, 2022, 22(1): 360. DOI: 10.3390/s22010360.

[10] A, Kavousi-Fard, M, Dabbaghjamanesh, T, Jin, et al. An Evolutionary Deep Learning-Based Anomaly Detection Model for Securing Vehicles. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(7): 4478-4486. DOI: 10.1109/TITS.2020.3015143.

[11] Q, He, X, Meng, R, Qu, et al. Machine learning-based detection for cyber security attacks on connected and autonomous vehicles. Mathematics, 2020, 8(8): 1311. DOI: 10.3390/MATH8081311.

[12] Z, Wang, H, Wei, J, Wang, et al. Security Issues and Solutions for Connected and Autonomous Vehicles in a Sustainable City: A Survey. Sustainability (Switzerland), 2022, 14(19): 12409. DOI: 10.3390/su141912409.

[13] Institute of Electrical and Electronics Engineers, 2019 IEEE International Symposium on Technologies for Homeland Security?: Crowne Plaza Boston - Worcester.  2019, Woburn, MA USA. 

[14] G R, Andreica, L, Bozga, D, Zinca, et al. Denial of Service and Man-in-the-Middle Attacks against IoT Devices in a GPS-Based Monitoring Software for Intelligent Transportation Systems. 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet), Bucharest, Romania, 2020, 1-4. DOI: 10.1109/RoEduNet51892.2020.9324865.

[15] S, Ubaid, M F, Shafeeq, M, Hussain, et al. SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks. Journal of Supercomputing, 2018, 74(10): 5022-5040. DOI: 10.1007/s11227-018-2346-1.

[16] M. Ahmad, M, Hussain, B, Abbas, et al. End-To-End Loss Based TCP Congestion Control Mechanism as a Secured Communication Technology for Smart Healthcare Enterprises. IEEE Access, 2018, 6, 11641-11656. DOI: 10.1109/ACCESS.2018.2802841.

[17] R M A, Latif, M, Farhan, O, Rizwan, et al. Retail level Blockchain transformation for product supply chain using truffle development platform. Cluster Comput, 2021, 24(1): 1-6. DOI: 10.1007/s10586-020-03165-4.

All published work is licensed under a Creative Commons Attribution 4.0 International License. sitemap
Copyright © 2017 - 2024 Science, Technology, Engineering and Mathematics.   All Rights Reserved.