Logistic System Using Artificial Intelligence for Cyber Security

Authors

  • D. Nagaraja  Department of Computer Applications, Madanapalle Institute of Technology and Science, Madanapalle, Andhra Pradesh, India
  • Dr. M. Saravanamuthu  Department of Computer Applications, Madanapalle Institute of Technology and Science, Madanapalle, Andhra Pradesh, India

Keywords:

Cyber Security, Cipher text, AES, Private Key, AV.

Abstract

The transportation sector is significantly impacted by the Internet of Things (IoT). The goal of autonomous vehicles (AVs) is to enhance daily tasks including package delivery, traffic flow, and cargo transportation. In addition to ground vehicles, AVs can also be airborne or submerged, and they have a variety of uses. We are using Cyber Security (CS) based data transfer to autonomous vehicles to solve this issue. Here, a cloud acts as a middleman to transmit sender files to an autonomous car. For further security, we employ the CS-based Advanced Encryption Standard algorithm, which is employed to convert the sent data into cypher text. The private key that the sender generates for the specific AV can be used to decrypt the encrypted text.

References

  1. R. Quinonez, J. Giraldo, L. Salazar, E. Bauman, A. Cardenas, Z. Lin, Securing Autonomous Vehicles with a Robust Physics-Based Anomaly Detector. 29th USENIX Security Symposium (USENIX Security 20). Boston, MA, August 2020.
  2. M. Masood, L. Khan, and B. Thuraisingham, Data Mining Applications in Malware Detection, CRC Press 2011.
  3. Y. Zhou, M. Kantarcioglu, B. M. Thuraisingham, B. Xi, Adversarial support vector machine learning. ACM KDD 2012: 1059-1067
  4. B. M. Thuraisingham, SecAI: Integrating Cyber Security and Artificial Intelligence with Applications in Internet of Transportation and Infrastructures, Clemson University Center for Connected Multimodal Mobility, Annual Conference, October 2019.
  5. B. M. Thuraisingham, P Pallabi, M. Masud, L. Khan, Big Data Analytics with Applications in Insider Threat Detection, CRC Press, 2017.
  6. K. W. Hamlen, V. Mohan, M. M. Masud, L. Khan, B. M. Thuraisingham: Exploiting an antivirus interface. Comput. Stand. Interfaces 31(6): 1182- 1189 (2009)
  7. L. Liu, M. Kantarcioglu, B. M. Thuraisingham: The applicability of the perturbation based privacy preserving data mining for real-world data. Data Knowl. Eng. 65(1): 5-21 (2008)
  8. B. M. Thuraisingham, M. Kantarcioglu, E. Bertino, J. Z. Bakdash, M. Fernández, Towards a Privacy-Aware Quantified Self Data Management Framework. SACMAT, pp 173-184, 2018 [9] K. W. Hamlen, M. Kantarcioglu, L. Khan, B. M. Thuraisingham, Security Issues for Cloud Computing. IJISP 4(2): 36-48 (2010)
  9. Y. Li, Y. Gao, G. Ayoade, H. Tao, L. Khan, B. M. Thuraisingham, Multistream Classification for Cyber Threat Data with Heterogeneous Feature Space. WWW, pp 2992-2998, 2019
  10. H. Qiu, Q. Zheng, G. Memmi, J. Lu, M. Qiu, B. M. Thuraisingham, "Deep Residual Learning based Enhanced JPEG Compression in the Internet of Things", accepted by IEEE Transactions on Industrial Informatics, 2020
  11. G. Ayoade, V. Karande, L. Khan, K. W. Hamlen, Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment. IRI, pp 15-22, 2018.

Downloads

Published

2022-08-30

Issue

Section

Research Articles

How to Cite

[1]
D. Nagaraja, Dr. M. Saravanamuthu, " Logistic System Using Artificial Intelligence for Cyber Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 4, pp.301-307, July-August-2022.