Implications of Cyber-Physical Adversarial Attacks on Autonomous Systems
DOI:
https://doi.org/10.52756/ijerr.2024.v46.021Keywords:
Adversarial Attacks, Autonomous Systems, Comparative Analysis, Cyber-Physical, Real-World RelevanceAbstract
This study examines hostile cyber-physical assaults on autonomous systems and proposes a novel approach. The recommended strategy integrates many domains, evaluates data quantitatively, and emphasizes real-world applications. A detailed comparison of six conventional approaches is underway. Four graphics depict the comparative study and how the recommended strategy would handle cyber-physical hostile assault challenges. The recommended solution utilizes multidisciplinary research, prioritizes quantitative reviews, and demonstrates its practical application and adaptability to various security challenges, thereby establishing a robust framework. Our analysis highlights the key advantages of the recommended technique by comparing six well-known methodologies. Clear illustrations support these findings, demonstrating the potential of the approach. The grid shows its strong presence across important criteria, and the radar image shows its success in data-driven analysis, freedom, and real-world application. The scatter plot illustrates that the technique is flexible and quantitative review-friendly, supporting its approach. Results reveal that the recommended technique is powerful and comprehensive. This helps analyze and mitigate cyber-physical hostile assaults on autonomous systems. Visualizations make it simple and fast to compare the recommended method to regular methods and discover its substantial advantages. This research will make autonomous systems safer and more resistant to new threats, ensuring their safety and consistency.
References
Al-Farouni, M., Joshi, S. K., N., R. G., Kasthuri, R., & Joshi, A. (2024). Mechanical Behavior of Handmade Epoxy-Based Composites. E3S Web of Conferences, 491, 04008. https://doi.org/10.1051/e3sconf/202449104008
Araghi, T.K., Zamani, M., Abdul Manaf, A., & Araghi, S. K. (2014). An access control framework in an Ad Hoc network infrastructure. Proceedings of the 1st International Conference on Communication and Computer Engineering, Malacca Malaysia, November 2014.
Aravind, A. R., Prajapati, M., Arunkumar, E., Kumar, R., Kumar, H., & Rao, S. P. V. S. (2024). A Way of Optimization of Wireless Sensor Network using TSCH. 2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), 326–330. https://doi.org/10.1109/icacite60783.2024.10616840
Bicakci, K., & Tavli, B. (2009). Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards & Interfaces, 31(5), 931–941.
Bu, S., & Yu, F.R. (2013). A game-theoretical scheme in the smart grid with demand-side management: towards a smart cyber-physical power infrastructure. IEEE Transactions on Emerging Topics in Computing, 1(1), 22–32.
Diame, T. A., Jabbar, K. A., Taha, A., Hussien, N. A., Alatba, S. R., Al-Mhiqani, M. N. A., & Rajinikanth, V. (2023). Anomaly Detection in Complex Power Grid using Organic Combination of Various Deep Learning (OC-VDL). Journal of Intelligent Systems and Internet of Things, 9(2), 78–92. https://doi.org/10.54216/jisiot.090206
Ghazizadeh, E., Zamani, M., Ab-Manan, J.L., & Alizadeh, M. (2014). Trusted computing strengthens cloud authentication. The Scientific World Journal, 2014, 260187.
Gu, Y., Li, K., Guo, Z., &Wang, Y. (2019). Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm. IEEE Access, 7, 64351–64365.
Hemalatha, S., Alzubaidi, L. H., Sundar, R., Priya, S., Gajbhiye, P., & Sheela, M. S. (2024). A Development of 5G Technology in Cloud Computing and its Optimization Technique. 2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), 372–377. https://doi.org/10.1109/icacite60783.2024.10617049
Jha, K., Jain, A., & Srivastava, S. (2024). A Secure Biometric-Based User Authentication Scheme for Cyber-Physical Systems in Healthcare. International Journal of Experimental Research and Review, 39(Spl Volume), 154-169. https://doi.org/10.52756/ijerr.2024.v39spl.012
Jothi, E., Abbas, A. H. R., Bisht, D., Mani, A., Velusudha, N. T., & Dhabliya, D. (2024). Distributed Generation Planning in Multi-Energy Microgrids. E3S Web of Conferences, 540, 10017. https://doi.org/10.1051/e3sconf/202454010017
Maruthamuthu, R., Patel, N., Yawanikha, T., Jayasree, S., Alsalami, Z., & Subbarao, S.P.V. (2024). A Way to Design Fog Computing Model for 5G Network using Vanet. 2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2024, 431-435. https://doi.org/10.1109/ICACITE60783.2024.10617287
Marwa, S., Mahdi, H., Mohammed, B., Mustafa, Al-T., Tamarah, A. D., Sajad, Ali Z., Marwan, Q. M., & Salem Saleh, B. (2023). A Framework for Strategic Planning Adaptation in Smart Cities through Recurrent Neural Networks, Journal of Intelligent Systems and Internet of Things,9(2), 65-77. https://doi.org/10.54216/JISIoT.090205
Mohamed, E., Yuan, X., Mohamed A.B. (2021). Energy Aware Enhanced Krill Herd Algorithm Enabled Clustering for Unmanned Aerial Vehicles, International Journal of Wireless and Ad Hoc Communication, 3(1), 17-25. https://doi.org/10.54216/IJWAC.030102
Paramasivam, P., Gowthaman, N., & Srivastava, V.M. (2024). Analytical Modeling of [001] Orientation in Silicon Trigate Rectangular Nanowire Using a Tight-Binding Model. Silicon,16(6), 2743-2756. https://doi.org/10.1007/s12633-024-02864-6
Paul, S.P., & Aggarwal, S. (2021). A Cognitive Research Tendency in Data Management of Sensor Network, International Journal of Wireless and Ad Hoc Communication, 3(1), 26-36. https://doi.org/10.54216/IJWAC.030103
Prabhu, S., Kalaimathi, K., Jayasree, S., Ayyanar, M., Kadaikunnan, S., Thiruvengadam, M., Amalraj, S., Ceasar, S.A., Alharbi, N.S., Sanjeevi, B., & Priya, S.P. (2024). Cyanobacterial Metabolites as Promising Neuroprotective Agents by Targeting Phosphoglycerate Kinase 1: Dynamic In Silico Approaches. Journal of Computational Biophysics and Chemistry, 23(5), 691-708. https://doi.org/10.1142/S2737416524500133
Ramya, G., Jayalakshmi, D., Raghuwanshi, A., Jasim, L.H., Shah, S.K., & Sherje, N.P. (2024). Optimization of Multi-Energy Systems for Efficient Power-to-X Conversion. E3S Web of Conferences,540. https://doi.org/10.1051/e3sconf/202454008003
Roy, V. (2021). An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator. Journal of Cybersecurity and Information Management, 8(1), 42-52.
Roy, V. (2024). An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things. Journal of Cybersecurity and Information Management,12(2), 8-17.
Sayali, K. (2020). Security Challenges for IoT Based Applications & Solutions Using Fog Computing: A Survey, Journal of Cybersecurity and Information Management, 3(1), 21-28. https://doi.org/10.54216/JCIM.030103
Sreejith, V.B.P. (2020). Incremental Research on Cyber Security metrics in Android applications by implementing the ML algorithms in Malware Classification and Detection, Journal of Cybersecurity and Information Management, 3(1) 14-20. https://doi.org/10.54216/JCIM.030102
Vanita Jain, Monu Gupta, Neeraj Joshi, Anubhav Mishra, Vishakha Bansal. (2021). E-College: an aid for E-Learning systems, Fusion: Practice and Applications, 3(2), 66-73. https://doi.org/10.54216/FPA.030202
Whiteman, M.L., Fernández-Cabán, P.L., Phillips, B.M., Masters, F.J., Bridge, J.A., & Davis, J. R. (2018). Multi-objective optimal design of a building envelope and structural system using cyber-physical modeling in a wind tunnel. Frontiers in Built Environment, 4, 13–25.
Yadav, S. K., Altalkany, G. A., Chandramauli, A., R, S., Dhabliya, D., & Maheshwari, A. (2024). Hybrid Cloud Surveillance in Smart Grids: Optimising Solar Power with Dual-Mode Control. E3S Web of Conferences, 540, 10020. https://doi.org/10.1051/e3sconf/202454010020
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Academic Publishing House (IAPH)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.