Autonomous Vehicles with a 6G-based Intelligent Cybersecurity Model
Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in autonomous vehicles (AVs). Electric vehicles and AVs not supporting the integration of intelligent cybersecurity will become vulnerable, and th...
Saved in:
Published in | IEEE access Vol. 11; p. 1 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.01.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in autonomous vehicles (AVs). Electric vehicles and AVs not supporting the integration of intelligent cybersecurity will become vulnerable, and their internal functions, features, and devices providing services will be damaged. This paper presents an intelligent cybersecurity model integrating intelligent features according to the emerging 6G-based technology based on evolving cyberattacks. The model's novel design was developed using the necessary algorithms to provide quick and proactive decisions with intelligent cybersecurity based on 6G (IC6G) policies when AVs face cyberattacks. In this model, network security algorithms incorporating intelligent techniques are developed using applied cryptography. Money transaction handling services implemented in an AV are considered an example to determine the security and intelligence level depending on the IC6G policies. Intelligence, complexity, and energy efficiency (EE) are assessed. Finally, we conclude that the model results are effective for intelligently detecting and preventing cyberattacks on AVs. |
---|---|
AbstractList | Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in autonomous vehicles (AVs). Electric vehicles and AVs not supporting the integration of intelligent cybersecurity will become vulnerable, and their internal functions, features, and devices providing services will be damaged. This paper presents an intelligent cybersecurity model integrating intelligent features according to the emerging 6G-based technology based on evolving cyberattacks. The model's novel design was developed using the necessary algorithms to provide quick and proactive decisions with intelligent cybersecurity based on 6G (IC6G) policies when AVs face cyberattacks. In this model, network security algorithms incorporating intelligent techniques are developed using applied cryptography. Money transaction handling services implemented in an AV are considered an example to determine the security and intelligence level depending on the IC6G policies. Intelligence, complexity, and energy efficiency (EE) are assessed. Finally, we conclude that the model results are effective for intelligently detecting and preventing cyberattacks on AVs. |
Author | Thayananthan, Vijey Algarni, Abdullah |
Author_xml | – sequence: 1 givenname: Abdullah orcidid: 0000-0002-7154-9821 surname: Algarni fullname: Algarni, Abdullah organization: Computer Science Department, King Abdulaziz University, Jeddah, Saudi Arabia – sequence: 2 givenname: Vijey orcidid: 0000-0003-2399-352X surname: Thayananthan fullname: Thayananthan, Vijey organization: Computer Science Department, King Abdulaziz University, Jeddah, Saudi Arabia |
BookMark | eNpNUMtOwzAQtFCRKIUvgEMkzil-xK9jFRWoVMSBx9VybIemSuNiJ0L9e1yCUPeyo9XM7O5cgknnOwfADYJzhKC8X5Tl8vV1jiEmc4KLQghyBqYYMZkTStjkBF-A6xi3MJVII8qnoFwMve_8zg8x-3CbxrQuZt9Nv8l0xh7zSkdns1XXu7ZtPl3XZ-WhciE6M4SmP2TP3rr2CpzXuo3u-q_PwPvD8q18ytcvj6tysc5NAWWfE8trzBkztWDUaIYFtFgQKlBdVwxayBiiEBFSUS45LoxknFuNZUIcQkZmYDX6Wq-3ah-anQ4H5XWjfgc-fCod-uMLylCrdVVhDAtSGKSFTqaVrAtOtBXWJK-70Wsf_NfgYq-2fghdOl9hzgWTkkKYWGRkmeBjDK7-34qgOoavxvDVMXz1F35S3Y6qxjl3oki3CIrIDxepgBc |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1016_j_cose_2023_103391 crossref_primary_10_1007_s11277_024_11020_7 crossref_primary_10_3390_electronics12153327 |
Cites_doi | 10.4018/978-1-5225-7189-6.ch001 10.1109/ISCSIC54682.2021.00037 10.1109/TVT.2020.2977378 10.1016/j.isatra.2022.09.035 10.1109/OJCOMS.2022.3143098 10.1109/LCOMM.2016.2522404 10.3390/electronics10131549 10.1109/EuCNC/6GSummit51104.2021.9482609 10.1177/0047287521993578 10.1109/OJCOMS.2021.3078081 10.3390/info13080395 10.1109/TII.2022.3194590 10.1109/JIOT.2021.3130054 10.1016/j.cities.2020.102996 10.1109/tnse.2022.3151502 10.1016/j.compeleceng.2022.108460 10.1016/j.aap.2021.106515 10.1109/TITS.2021.3085297 10.1007/978-3-030-76493-7_12 10.1109/ICTE-V50708.2020.9113777 10.1109/TITS.2022.3198806 10.1109/tits.2022.3159275 10.1109/mnet.010.2100509 10.3390/electronics8060627 10.1109/ISGTLatinAmerica52371.2021.9543031 10.1109/JPROC.2019.2954595 10.3390/infrastructures6070100 10.1201/9781003190691-4 10.1109/tnse.2022.3188571 10.1109/JPROC.2021.3053601 10.1109/EuCNC/6GSummit51104.2021.9482503 10.3390/app13010277 10.1016/j.comnet.2022.109358 10.1109/ACCESS.2021.3092039 10.1145/3503161.3548218 10.1201/9781003121541-9 10.1109/tnse.2022.3188304 10.1109/MWC.001.1900516 10.3390/electronics10202490 10.1016/j.cose.2020.102150 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2023.3244883 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library Online CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 1 |
ExternalDocumentID | oai_doaj_org_article_c5daabb220434c1a8ab57b9f473ad8dc 10_1109_ACCESS_2023_3244883 10043851 |
Genre | orig-research |
GrantInformation_xml | – fundername: Deanship of Scientific Research at King Abdulaziz University grantid: G-601-611-39 |
GroupedDBID | 0R~ 5VS 6IK 97E AAJGR ACGFS ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS ESBDL GROUPED_DOAJ IFIPE IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RIG RNS 4.4 AAYXX CITATION EJD 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c409t-3d7f2766cf865ca6280d283581ffb60d066150133b579724c9677da294c970063 |
IEDL.DBID | RIE |
ISSN | 2169-3536 |
IngestDate | Tue Oct 22 15:14:47 EDT 2024 Thu Oct 10 16:23:57 EDT 2024 Fri Aug 23 03:12:46 EDT 2024 Mon Nov 04 12:05:32 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c409t-3d7f2766cf865ca6280d283581ffb60d066150133b579724c9677da294c970063 |
ORCID | 0000-0002-7154-9821 0000-0003-2399-352X |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/10043851 |
PQID | 2778699500 |
PQPubID | 4845423 |
PageCount | 1 |
ParticipantIDs | crossref_primary_10_1109_ACCESS_2023_3244883 doaj_primary_oai_doaj_org_article_c5daabb220434c1a8ab57b9f473ad8dc ieee_primary_10043851 proquest_journals_2778699500 |
PublicationCentury | 2000 |
PublicationDate | 2023-01-01 |
PublicationDateYYYYMMDD | 2023-01-01 |
PublicationDate_xml | – month: 01 year: 2023 text: 2023-01-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2023 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref30 ref11 ref10 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 Khan (ref45) 2022 Aldakkhelallah (ref31) Thayananthan (ref32) 2023 ref24 ref46 ref23 ref26 Mir (ref44) 2015 ref25 ref20 ref42 ref41 ref22 ref21 ref43 Shaikh (ref33) 2019 ref28 ref27 ref29 ref8 ref7 Khan (ref3) ref9 ref4 Obaid (ref47) 2022 ref6 ref5 ref40 |
References_xml | – ident: ref36 doi: 10.4018/978-1-5225-7189-6.ch001 – ident: ref8 doi: 10.1109/ISCSIC54682.2021.00037 – ident: ref11 doi: 10.1109/TVT.2020.2977378 – ident: ref17 doi: 10.1016/j.isatra.2022.09.035 – ident: ref46 doi: 10.1109/OJCOMS.2022.3143098 – ident: ref37 doi: 10.1109/LCOMM.2016.2522404 – ident: ref10 doi: 10.3390/electronics10131549 – volume-title: Trust evaluation wireless network for routing data packets year: 2019 ident: ref33 contributor: fullname: Shaikh – ident: ref43 doi: 10.1109/EuCNC/6GSummit51104.2021.9482609 – volume-title: Macroscopic modelling of the effects of autonomous vehicles and cooperative intelligent transport systems year: 2022 ident: ref47 contributor: fullname: Obaid – ident: ref30 doi: 10.1177/0047287521993578 – ident: ref24 doi: 10.1109/OJCOMS.2021.3078081 – ident: ref22 doi: 10.3390/info13080395 – ident: ref41 doi: 10.1109/TII.2022.3194590 – ident: ref27 doi: 10.1109/JIOT.2021.3130054 – ident: ref1 doi: 10.1016/j.cities.2020.102996 – ident: ref2 doi: 10.1109/tnse.2022.3151502 – ident: ref38 doi: 10.1016/j.compeleceng.2022.108460 – ident: ref18 doi: 10.1016/j.aap.2021.106515 – ident: ref26 doi: 10.1109/TITS.2021.3085297 – ident: ref28 doi: 10.1007/978-3-030-76493-7_12 – ident: ref16 doi: 10.1109/ICTE-V50708.2020.9113777 – ident: ref39 doi: 10.1109/TITS.2022.3198806 – volume-title: Computer and Communication Networks year: 2015 ident: ref44 contributor: fullname: Mir – ident: ref20 doi: 10.1109/tits.2022.3159275 – volume-title: Advanced Security Issues of IoT Based 5G Plus Wireless Communication for Industry 4.0 year: 2023 ident: ref32 contributor: fullname: Thayananthan – ident: ref21 doi: 10.1109/mnet.010.2100509 – ident: ref35 doi: 10.3390/electronics8060627 – year: 2022 ident: ref45 article-title: Governing connected and automated vehicles: Cybersecurity regulations and operational framework contributor: fullname: Khan – start-page: 185 volume-title: Proc. Int. Conf. Hum.-Centered Intell. Syst. ident: ref31 article-title: AVin intelligent transportation systems contributor: fullname: Aldakkhelallah – ident: ref19 doi: 10.1109/ISGTLatinAmerica52371.2021.9543031 – ident: ref23 doi: 10.1109/JPROC.2019.2954595 – ident: ref29 doi: 10.3390/infrastructures6070100 – ident: ref9 doi: 10.1201/9781003190691-4 – ident: ref13 doi: 10.1109/tnse.2022.3188571 – ident: ref7 doi: 10.1109/JPROC.2021.3053601 – ident: ref15 doi: 10.1109/EuCNC/6GSummit51104.2021.9482503 – ident: ref40 doi: 10.3390/app13010277 – ident: ref6 doi: 10.1016/j.comnet.2022.109358 – ident: ref12 doi: 10.1109/ACCESS.2021.3092039 – ident: ref42 doi: 10.1145/3503161.3548218 – ident: ref5 doi: 10.1201/9781003121541-9 – start-page: 1 volume-title: Proc. Australas. Transp. Res. Forum (ATRF) ident: ref3 article-title: Dynamic assessment of regulation and policy framework in the cybersecurity of connected and autonomous vehicles contributor: fullname: Khan – ident: ref4 doi: 10.1109/tnse.2022.3188304 – ident: ref14 doi: 10.1109/MWC.001.1900516 – ident: ref34 doi: 10.3390/electronics10202490 – ident: ref25 doi: 10.1016/j.cose.2020.102150 |
SSID | ssj0000816957 |
Score | 2.3366897 |
Snippet | Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Publisher |
StartPage | 1 |
SubjectTerms | 6G mobile communication 6G security Algorithms Artificial intelligence Autonomous vehicles Computer security Costs Cryptography Cybersecurity cybersecurity attacks Deep learning Electric vehicles intelligent transportation system Intelligent transportation systems risk assessment Risk management Safety Security Ultra reliable low latency communication |
SummonAdditionalLinks | – databaseName: Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV27TsMwFLVQJxgQjyICBXlgJG2chx9jGwEFCSYK3SzfOFaRUEGQDvw910laBTGwsEVJJMfn-nGOY59LyEUM3GQOZQlz0oWpiiAEIW3IAPuSZRBb8AeF7x_4dJbezbN5J9WX3xPW2AM3wI2KzBoDEPsznGnBjDSQCVAuFYmx0hb16Bupjpiqx2DJuMpEazOEz0fjPMcaDX228CGSCGy3yY-pqHbsb1Os_BqX68nmeo_stiyRjpuv2ydb5fKA7HS8Aw9JPl5V_kACKnf6VC7q3W30-aVaUEP5TTjB2cnS243hZkXzL0Cq16aroz4H2mufzK6vHvNp2GZECAvUYVWYWOFiwXnhJM8Kw2MZWW-YJplzwCOL_AEJHspOxEiJOC0UF8KaWOGV8GzkiPSWb8vymNCEFyxJUc4wb_qXgkzAQMIBnBXGpTwgl2tw9HtjfKFrwRAp3WCpPZa6xTIgEw_g5lXvWl3fwFjqNpb6r1gGpO_h75Tn_1NmLCCDdTx028U-deyd75TKoujkP8o-Jdu-Ps3qyoD0qo9VeYZ8o4Lzuml9A-G20Ac priority: 102 providerName: Directory of Open Access Journals |
Title | Autonomous Vehicles with a 6G-based Intelligent Cybersecurity Model |
URI | https://ieeexplore.ieee.org/document/10043851 https://www.proquest.com/docview/2778699500 https://doaj.org/article/c5daabb220434c1a8ab57b9f473ad8dc |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEA7qSQ--xfVFDh5tbfpImuNafIKeVLyFTNIgKLui3YP-ejNpdvGB4C2Ulk5nkma-ycw3hBzmwHXlPCxhrnZJKTNIQNQ2YeDXkmWQW8BC4esbfnFXXj1UD7FYPdTCtG0bks_aFIfhLN-OzQRDZccsnFthwfS8kLIv1poFVLCDhKxEZBZimTweNo3_iBQbhKfeb_BTtfi2-wSS_thV5devOOwvZyvkZipZn1bylE46SM3HD9LGf4u-Spajp0mH_dRYI3PtaJ0sfeEf3CDNcNJhUYNH__S-fQwZchQjs1RTfp7gDmfp5Yy0s6PNO3h3Mba8o9hH7XmT3J2d3jYXSeyqkBiP5bqksMLlgnPjal4ZzfM6s0i6VjPngGfW-yDeSfTQFSohRV4ayYWwOpd-JNCj2SILo_Go3Sa04IYVpYdEDIkDS6gL0FBwAGeFdiUfkKOpttVLT56hAujIpOqNo9A4KhpnQE7QIrNbkfk6XPCaVHEhKVNZrQFyrOktDdO19nKCdKUotK2tGZBN1P6X9_WKH5C9qYFVXKZvKkf2PCmrLNv547Fdsogi9kGXPbLQvU7afe-GdHAQ4PtBmISfSrDZvg |
link.rule.ids | 315,783,787,799,867,2109,27936,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6h9gAcWh5FLC3gA0eSxnn4cdxGlC20e2pRb5bHjoUE2iKaPcCvx-N4VwWExM2KEmUyY8ffjGe-AXhTo7BdiG4JDyoUra6wQKl8wTGuJc-x9kiFwhdLsbhqP1x317lYPdXCDMOQks-GkobpLN_fuDWFyo55OreigundCKyVmMq1tiEV6iGhO5m5hXilj-d9Hz-jpBbhZUQOcbI2v-0_iaY_91X562ecdpjTfVhuZJsSS76U6xFL9_MP2sb_Fv4R7GWsyebT5HgM94bVE3h4h4HwKfTz9UhlDdH_Z5-GzylHjlFsllkm3he0x3l2tqXtHFn_AyNgzE3vGHVS-3oAV6fvLvtFkfsqFC56c2PReBlqKYQLSnTOilpVnmjXFA8BReUjCokwMTqv2Ekt69ZpIaW3tY4jSZjmGeysblbDc2CNcLxpo1PEiTqwRdWgxUYgBi9taMUM3m60bb5N9BkmuR2VNpNxDBnHZOPM4IQssr2VuK_ThahJk5eScZ23FrGmqt7WcatslBN1aGVjvfJuBgek_TvvmxQ_g6ONgU1eqLemJv48rbuqevGPx17D_cXlxbk5P1t-PIQHJO4UgjmCnfH7engZQcmIr9JU_AWzidwU |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Autonomous+Vehicles+with+a+6G-based+Intelligent+Cybersecurity+Model&rft.jtitle=IEEE+access&rft.au=Algarni%2C+Abdullah&rft.au=Thayananthan%2C+Vijey&rft.date=2023-01-01&rft.pub=IEEE&rft.eissn=2169-3536&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1109%2FACCESS.2023.3244883&rft.externalDocID=10043851 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |