Smart City Gnosys

Smart city article details

Title Security Strategy For Autonomous Vehicle Cyber-Physical Systems Using Transfer Learning
ID_Doc 47976
Authors Alsulami A.A.; Al-Haija Q.A.; Alturki B.; Alqahtani A.; Alsini R.
Year 2023
Published Journal of Cloud Computing, 12, 1
DOI http://dx.doi.org/10.1186/s13677-023-00564-x
Abstract Cyber-physical systems (CPSs) are emergent systems that enable effective real-time communication and collaboration (C&C) of physical components such as control systems, sensors, actuators, and the surrounding environment through a cyber communication infrastructure. As such, autonomous vehicles (AVs) are one of the fields that have significantly adopted the CPS approach to improving people's lives in smart cities by reducing energy consumption and air pollution. Therefore, autonomous vehicle-cyber physical systems (AV-CPSs) have attracted enormous investments from major corporations and are projected to be widely used. However, AV-CPS is vulnerable to cyber and physical threat vectors due to the deep integration of information technology (IT), including cloud computing, with the communication process. Cloud computing is critical in providing the scalable infrastructure required for real-time data processing, storage, and analysis in AV-CPS, allowing these systems to work seamlessly in smart cities. CPS components such as sensors and control systems through network infrastructure are particularly vulnerable to cyber-attacks targeted by attackers using the communication system. This paper proposes an intelligent intrusion detection system (IIDS) for AV-CPS using transfer learning to identify cyberattacks launched against connected physical components of AVs through a network infrastructure. First, AV-CPS was developed by implementing the controller area network (CAN) and integrating it into the AV simulation model. Second, the dataset was generated from the AV-CPS. The collected dataset was then preprocessed to be trained and tested via pre-trained CNNs. Third, eight pre-trained networks were implemented, namely, InceptionV3, ResNet-50, ShuffleNet, MobileNetV2, GoogLeNet, ResNet-18, SqueezeNet, and AlexNet. The performance of the implemented models was evaluated. According to the experimental evaluation results, GoogLeNet outperformed all other pre-rained networks, scoring an F1- score of 99.47%. © 2023, The Author(s).
Author Keywords Autonomous vehicle (AV); Controller area network (CAN); Cyber security (CSec); Cyber-physical system (CPS); Deep learning (DL); Intrusion detection system (IDS); Transfer learning (TL)


Similar Articles


Id Similarity Authors Title Published
17013 View0.895Aurangzeb S.; Aleem M.; Khan M.T.; Anwar H.; Siddique M.S.Cybersecurity For Autonomous Vehicles Against Malware Attacks In Smart-CitiesCluster Computing, 27, 3 (2024)
8506 View0.892Shanthalakshmi M.; Ponmagal R.S.An Intelligent Dynamic Cyber Physical System Threat Detection System For Ensuring Secured Communication In 6G Autonomous Vehicle NetworksScientific Reports, 14, 1 (2024)
49450 View0.874Kong S.; Wang K.; Feng C.; Wang J.Smart Cities And Transportation Based Vehicle-To-Vehicle Communication And Cyber Security Analysis Using Machine Learning Model In 6G NetworkWireless Personal Communications (2024)
2485 View0.872Hitakshi; Sood V.M.; Mehta K.; Kaur G.A Machine Learning-Based Smart Framework For Intrusion Detection In Cyber-Physical SystemsIntelligent Security Solutions for Cyber-Physical Systems (2024)
17058 View0.868Xiong G.; Anwar N.; Ye P.; Chen X.; Zhao H.; Lv Y.; Zhu F.; Zhang H.; Zhou X.; Liu R.W.Cyber–Physical–Social Systems For Smart CityCyber–Physical–Human Systems: Fundamentals and Applications (2023)
17320 View0.853Alwan A.A.; Ciupala M.A.; Brimicombe A.J.; Ghorashi S.A.; Baravalle A.; Falcarin P.Data Quality Challenges In Large-Scale Cyber-Physical Systems: A Systematic ReviewInformation Systems, 105 (2022)
47942 View0.853Narayanan S.N.; Khanna K.; Panigrahi B.K.; Joshi A.Security In Smart Cyber-Physical Systems: A Case Study On Smart Grids And Smart CarsSmart Cities Cybersecurity and Privacy (2018)
16916 View0.852Ejazulghaffar M.; Arif M.; Jaffar M.A.; Hassan A.Cyber Physical Systems Having Nodes/Layers With Trustworthy Data: A ReviewSecuring the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics (2025)