Vol. 3 No. 1 (2023): African Journal of Artificial Intelligence and Sustainable Development
Articles

Self-Learning Systems for Adaptive Cybersecurity in Autonomous Vehicles - A Deep Reinforcement Learning Approach: Explores self-learning systems for adaptive cybersecurity in AVs, utilizing deep reinforcement learning techniques

Dr. Beatriz Hernandez-Gomez
Professor of Industrial Engineering, Monterrey Institute of Technology and Higher Education (ITESM), Mexico
Cover

Published 14-05-2023

Keywords

  • Autonomous Vehicles,
  • Cybersecurity,
  • Deep Reinforcement Learning

How to Cite

[1]
Dr. Beatriz Hernandez-Gomez, “Self-Learning Systems for Adaptive Cybersecurity in Autonomous Vehicles - A Deep Reinforcement Learning Approach: Explores self-learning systems for adaptive cybersecurity in AVs, utilizing deep reinforcement learning techniques”, African J. of Artificial Int. and Sust. Dev., vol. 3, no. 1, pp. 159–169, May 2023, Accessed: Dec. 27, 2024. [Online]. Available: https://africansciencegroup.com/index.php/AJAISD/article/view/60

Abstract

Self-Learning Systems for Adaptive Cybersecurity in Autonomous Vehicles: A Deep Reinforcement Learning Approach

As autonomous vehicles (AVs) become more prevalent, ensuring their cybersecurity is paramount. Traditional cybersecurity measures often struggle to keep pace with evolving threats. This paper proposes a novel approach to cybersecurity in AVs using self-learning systems, specifically deep reinforcement learning (DRL). DRL has shown remarkable success in complex decision-making tasks and could be a game-changer in the cybersecurity domain. This paper explores the application of DRL for adaptive cybersecurity in AVs, aiming to create a self-learning system that can adapt to new threats in real-time.

We begin by providing an overview of the cybersecurity challenges facing AVs, highlighting the limitations of current approaches. We then delve into the fundamentals of DRL, explaining how it can be applied to cybersecurity. Next, we present a conceptual framework for integrating DRL into AV cybersecurity, outlining the components of the system and how they interact. We also discuss the training and evaluation of the DRL model, emphasizing the need for realistic simulations to capture the complexity of real-world threats.

To demonstrate the feasibility of our approach, we present a case study where we simulate a cyber attack on an AV and show how the DRL system can adapt to mitigate the attack. Our results indicate that the DRL system is capable of quickly adapting to new threats, outperforming traditional cybersecurity measures in terms of speed and effectiveness. Finally, we discuss the implications of our findings and suggest future research directions in this exciting field.

Overall, this paper contributes to the growing body of research on cybersecurity in AVs by proposing a novel approach that leverages the power of DRL. Our work opens up new possibilities for creating adaptive cybersecurity systems that can keep pace with the ever-changing threat landscape, ultimately enhancing the safety and security of AVs.

Downloads

Download data is not yet available.

References

  1. Tatineni, Sumanth. "Cost Optimization Strategies for Navigating the Economics of AWS Cloud Services." International Journal of Advanced Research in Engineering and Technology (IJARET) 10.6 (2019): 827-842.
  2. Vemori, Vamsi. "Towards Safe and Equitable Autonomous Mobility: A Multi-Layered Framework Integrating Advanced Safety Protocols, Data-Informed Road Infrastructure, and Explainable AI for Transparent Decision-Making in Self-Driving Vehicles." Human-Computer Interaction Perspectives 2.2 (2022): 10-41.
  3. Mahammad Shaik, et al. “Unveiling the Achilles’ Heel of Decentralized Identity: A Comprehensive Exploration of Scalability and Performance Bottlenecks in Blockchain-Based Identity Management Systems”. Distributed Learning and Broad Applications in Scientific Research, vol. 5, June 2019, pp. 1-22, https://dlabi.org/index.php/journal/article/view/3.