清晨好,您是今天最早来到科研通的研友!由于当前在线用户较少,发布求助请尽量完整的填写文献信息,科研通机器人24小时在线,伴您科研之路漫漫前行!

Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication

对策 计算机安全 计算机科学 大数据 数据泄露 工程类 航空航天工程 操作系统
作者
Abdullah Algarni,Vijey Thayananthan
出处
期刊:Symmetry [MDPI AG]
卷期号:14 (12): 2494-2494 被引量:12
标识
DOI:10.3390/sym14122494
摘要

The possible applications of communication based on big data have steadily increased in several industries, such as the autonomous vehicle industry, with a corresponding increase in security challenges, including cybersecurity vulnerabilities (CVs). The cybersecurity-related symmetry of big data communication systems used in autonomous vehicles may raise more vulnerabilities in the data communication process between these vehicles and IoT devices. The data involved in the CVs may be encrypted using an asymmetric and symmetric algorithm. Autonomous vehicles with proactive cybersecurity solutions, power-based cyberattacks, and dynamic countermeasures are the modern issues/developments with emerging technology and evolving attacks. Research on big data has been primarily focused on mitigating CVs and minimizing big data breaches using appropriate countermeasures known as security solutions. In the future, CVs in data communication between autonomous vehicles (DCAV), the weaknesses of autonomous vehicular networks (AVN), and cyber threats to network functions form the primary security issues in big data communication, AVN, and DCAV. Therefore, efficient countermeasure models and security algorithms are required to minimize CVs and data breaches. As a technique, policies and rules of CVs with proxy and demilitarized zone (DMZ) servers were combined to enhance the efficiency of the countermeasure. In this study, we propose an information security approach that depends on the increasing energy levels of attacks and CVs by identifying the energy levels of each attack. To show the results of the performance of our proposed countermeasure, CV and energy consumption are compared with different attacks. Thus, the countermeasures can secure big data communication and DCAV using security algorithms related to cybersecurity and effectively prevent CVs and big data breaches during data communication.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI

祝大家在新的一年里科研腾飞
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
20秒前
Polymer72应助科研通管家采纳,获得10
28秒前
Polymer72应助科研通管家采纳,获得10
28秒前
Polymer72应助科研通管家采纳,获得10
28秒前
Polymer72应助科研通管家采纳,获得10
28秒前
52秒前
1分钟前
白华苍松发布了新的文献求助10
1分钟前
1分钟前
1分钟前
感性的俊驰完成签到 ,获得积分10
2分钟前
炜大的我完成签到,获得积分10
2分钟前
聪明的泡面完成签到 ,获得积分10
2分钟前
Polymer72应助科研通管家采纳,获得10
2分钟前
Polymer72应助科研通管家采纳,获得10
2分钟前
Polymer72应助科研通管家采纳,获得10
2分钟前
2分钟前
牛奶面包完成签到 ,获得积分10
2分钟前
3分钟前
3分钟前
呆呆的猕猴桃完成签到 ,获得积分10
3分钟前
HEIKU应助Wei采纳,获得50
3分钟前
3分钟前
4分钟前
4分钟前
科研通AI2S应助科研通管家采纳,获得10
4分钟前
英俊的铭应助科研通管家采纳,获得10
4分钟前
科研通AI2S应助科研通管家采纳,获得10
4分钟前
早晚完成签到 ,获得积分10
4分钟前
5分钟前
沙海沉戈完成签到,获得积分0
5分钟前
douKY完成签到,获得积分10
5分钟前
5分钟前
5分钟前
Alan完成签到 ,获得积分10
5分钟前
科研通AI2S应助科研通管家采纳,获得50
6分钟前
Polymer72应助科研通管家采纳,获得10
6分钟前
Polymer72应助科研通管家采纳,获得10
6分钟前
7分钟前
方白秋完成签到,获得积分10
7分钟前
高分求助中
Востребованный временем 2500
The Three Stars Each: The Astrolabes and Related Texts 1500
Les Mantodea de Guyane 1000
Very-high-order BVD Schemes Using β-variable THINC Method 970
Field Guide to Insects of South Africa 660
Foucault's Technologies Another Way of Cutting Reality 500
Forensic Chemistry 400
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 基因 遗传学 物理化学 催化作用 细胞生物学 免疫学 冶金
热门帖子
关注 科研通微信公众号,转发送积分 3393068
求助须知:如何正确求助?哪些是违规求助? 3003415
关于积分的说明 8809200
捐赠科研通 2690210
什么是DOI,文献DOI怎么找? 1473528
科研通“疑难数据库(出版商)”最低求助积分说明 681603
邀请新用户注册赠送积分活动 674550