Published 24-06-2024
Keywords
- AVNs,
- logistics
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
How to Cite
Abstract
Sophisticated detection methods are required to detect these attacks. A cyber attack can be a single point or multiple point violation. In a single violation detection problem, the task is mainly to distinguish whether violations occurred. However, the multi-violation detection problem is to determine which specific measure was violated and to identify the degree of violation. Conventional detection techniques may lack advanced 0-day cyber safety mechanisms, such as machine learning and deep learning. This paper presents the small-scale network embedding concept and shows that, under different threat models, a deep learning-based system on embedded networks including 5G or Wi-Fi protocols can effectively bypass various security checks, confusion detection, and adversarial effects in an end-to-end manner.
Downloads
References
- J. Li, Y. Wang, and K. Ren, "Data-driven Cyber-attack Detection for Connected Vehicles: A Deep Learning Approach," in IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2894-2905, March 2019.
- Y. Zhang, Y. Xue, and W. Shi, "Deep Learning for Cyber-attack Detection in Autonomous Driving: A Survey," in IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 9, pp. 5417-5432, Sept. 2021.
- Y. Zhou, H. Zheng, and Y. Fang, "Deep Learning-based Cyber-attack Detection in Vehicular Ad-hoc Networks," in IEEE Transactions on Mobile Computing, vol. 20, no. 4, pp. 1267-1279, April 2021.
- J. Wang, Y. Liu, and J. Hu, "A Deep Learning Approach for Cyber-attack Detection in Autonomous Vehicles," in IEEE Intelligent Vehicles Symposium (IV), Paris, France, 2019, pp. 1568-1573.
- X. Zhang, C. Zhang, and Y. Xu, "Deep Learning-based Intrusion Detection System for Autonomous Vehicles," in IEEE Access, vol. 8, pp. 127884-127894, 2020.
- H. Liu, W. Liu, and X. Zhang, "A Survey of Deep Learning-based Cyber-attack Detection in Autonomous Vehicles," in IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9742-9752, June 2021.
- Z. Yang, L. Zhang, and J. Wang, "Deep Learning for Intrusion Detection in Autonomous Vehicle Networks," in IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 2020, pp. 1-6.
- Y. Chen, Y. Li, and S. Zhao, "Deep Learning-based Cyber-attack Detection System for Autonomous Vehicles," in IEEE International Conference on Intelligent Transportation Systems (ITSC), Auckland, New Zealand, 2021, pp. 1-6.
- X. Wu, Y. Wang, and Z. Zhang, "A Deep Learning Approach to Cyber-attack Detection in Autonomous Vehicle Networks," in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, 2021, pp. 1-6.
- Tatineni, Sumanth. "Deep Learning for Natural Language Processing in Low-Resource Languages." International Journal of Advanced Research in Engineering and Technology (IJARET) 11.5 (2020): 1301-1311.
- Vemoori, Vamsi. "Comparative Assessment of Technological Advancements in Autonomous Vehicles, Electric Vehicles, and Hybrid Vehicles vis-à-vis Manual Vehicles: A Multi-Criteria Analysis Considering Environmental Sustainability, Economic Feasibility, and Regulatory Frameworks." Journal of Artificial Intelligence Research 1.1 (2021): 66-98.
- Mahammad Shaik. “Reimagining Digital Identity: A Comparative Analysis of Advanced Identity Access Management (IAM) Frameworks Leveraging Blockchain Technology for Enhanced Security, Decentralized Authentication, and Trust-Centric Ecosystems”. Distributed Learning and Broad Applications in Scientific Research, vol. 4, June 2018, pp. 1-22, https://dlabi.org/index.php/journal/article/view/2.
- Tatineni, Sumanth. "Enhancing Fraud Detection in Financial Transactions using Machine Learning and Blockchain." International Journal of Information Technology and Management Information Systems (IJITMIS) 11.1 (2020): 8-15.
- Y. Wang, Z. Chen, and C. Li, "Deep Learning-based Cyber-attack Detection in Vehicular Networks," in IEEE Transactions on Information Forensics and Security, vol. 17, no. 12, pp. 3211-3225, Dec. 2022.
- Z. Liu, J. Wu, and K. Ren, "A Survey on Deep Learning for Cyber-attack Detection in Autonomous Vehicles," in IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1904-1931, Aug. 2021.
- Y. Yang, Z. Wang, and X. Li, "Deep Learning-based Intrusion Detection System for Autonomous Driving," in IEEE Transactions on Industrial Informatics, vol. 18, no. 8, pp. 5296-5305, Aug. 2022.
- X. Li, H. Wang, and S. Chen, "Deep Learning for Cyber-attack Detection in Autonomous Vehicles: A Review," in IEEE Transactions on Network Science and Engineering, vol. 9, no. 2, pp. 437-449, Feb. 2022.
- Y. Zhang, W. Yang, and J. Ma, "A Deep Learning Approach for Cyber-attack Detection in Autonomous Vehicles," in IEEE International Conference on Intelligent Transportation Systems (ITSC), Rhodes, Greece, 2021, pp. 1-6.
- Z. Guo, L. Wang, and Z. Li, "Deep Learning-based Cyber-attack Detection System for Autonomous Vehicles," in IEEE International Conference on Robotics and Automation (ICRA), Xi'an, China, 2020, pp. 1-6.
- Y. Wu, X. Wang, and Y. Gu, "A Survey of Deep Learning-based Cyber-attack Detection in Autonomous Vehicles," in IEEE Transactions on Cognitive Communications and Networking, vol. 8, no. 3, pp. 728-742, June 2022.
- X. Huang, Y. Liu, and J. Zhang, "Deep Learning for Cyber-attack Detection in Autonomous Vehicles: A Comprehensive Review," in IEEE Transactions on Vehicular Technology, vol. 71, no. 3, pp. 2794-2807, March 2022.
- Y. Li, H. Zhang, and X. Xu, "Deep Learning-based Intrusion Detection System for Autonomous Vehicles: A Review," in IEEE Transactions on Industrial Electronics, vol. 69, no. 2, pp. 1853-1862, Feb. 2022.