TY - JOUR
T1 - Autonomous Vehicles With a 6G-Based Intelligent Cybersecurity Model
AU - Algarni, Abdullah M.
AU - Thayananthan, Vijeyananthan
PY - 2023/2/14
Y1 - 2023/2/14
N2 - Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in autonomous vehicles (AVs). Electric vehicles and AVs not supporting the integration of intelligent cybersecurity will become vulnerable, and their internal functions, features, and devices providing services will be damaged. This paper presents an intelligent cybersecurity model integrating intelligent features according to the emerging 6G-based technology based on evolving cyberattacks. The model’s novel design was developed using the necessary algorithms to provide quick and proactive decisions with intelligent cybersecurity based on 6G (IC6G) policies when AVs face cyberattacks. In this model, network security algorithms incorporating intelligent techniques are developed using applied cryptography. Money transaction handling services implemented in an AV are considered an example to determine the security and intelligence level depending on the IC6G policies. Intelligence, complexity, and energy efficiency (EE) are assessed. Finally, we conclude that the model results are effective for intelligently detecting and preventing cyberattacks on AVs.
AB - Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in autonomous vehicles (AVs). Electric vehicles and AVs not supporting the integration of intelligent cybersecurity will become vulnerable, and their internal functions, features, and devices providing services will be damaged. This paper presents an intelligent cybersecurity model integrating intelligent features according to the emerging 6G-based technology based on evolving cyberattacks. The model’s novel design was developed using the necessary algorithms to provide quick and proactive decisions with intelligent cybersecurity based on 6G (IC6G) policies when AVs face cyberattacks. In this model, network security algorithms incorporating intelligent techniques are developed using applied cryptography. Money transaction handling services implemented in an AV are considered an example to determine the security and intelligence level depending on the IC6G policies. Intelligence, complexity, and energy efficiency (EE) are assessed. Finally, we conclude that the model results are effective for intelligently detecting and preventing cyberattacks on AVs.
U2 - 10.1109/ACCESS.2023.3244883
DO - 10.1109/ACCESS.2023.3244883
M3 - Article
SN - 2169-3536
VL - 11
SP - 15284
EP - 15296
JO - IEEE Access
JF - IEEE Access
ER -