• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

考虑人工智能驱动的网络攻击与防护的自主运输系统的安全知情安全分析

Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection.

作者信息

Illiashenko Oleg, Kharchenko Vyacheslav, Babeshko Ievgen, Fesenko Herman, Di Giandomenico Felicita

机构信息

Department of Computer Systems, Networks and Cybersecurity, National Aerospace University "KhAI", 17, Chkalov Str., 61070 Kharkiv, Ukraine.

Software Engineering & Dependable Computing Lab, Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo", Area della Ricerca CNR di Pisa, Via G. Moruzzi 1, 56124 Pisa, Italy.

出版信息

Entropy (Basel). 2023 Jul 26;25(8):1123. doi: 10.3390/e25081123.

DOI:10.3390/e25081123
PMID:37628153
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10453859/
Abstract

The entropy-oriented approach called security- or cybersecurity-informed safety (SIS or CSIS, respectively) is discussed and developed in order to analyse and evaluate the safety and dependability of autonomous transport systems (ATSs) such as unmanned aerial vehicles (UAVs), unmanned maritime vehicles (UMVs), and satellites. This approach allows for extending and integrating the known techniques FMECA (Failure Modes, Effects, and Criticality Analysis) and IMECA (Intrusion MECA), as well as developing the new SISMECA (SIS-based Intrusion Modes, Effects, and Criticality Analysis) technique. The ontology model and templates for SISMECA implementation are suggested. The methodology of safety assessment is based on (i) the application and enhancement of SISMECA considering the particularities of various ATSs and roles of actors (regulators, developers, operators, customers); (ii) the development of a set of scenarios describing the operation of ATS in conditions of cyberattacks and physical influences; (iii) AI contribution to system protection for the analysed domains; (iv) scenario-based development and analysis of user stories related to different cyber-attacks, as well as ways to protect ATSs from them via AI means/platforms; (v) profiling of AI platform requirements by use of characteristics based on AI quality model, risk-based assessment of cyberattack criticality, and efficiency of countermeasures which actors can implement. Examples of the application of SISMECA assessment are presented and discussed.

摘要

为了分析和评估诸如无人机(UAV)、无人航海器(UMV)和卫星等自主运输系统(ATS)的安全性和可靠性,人们讨论并开发了一种以熵为导向的方法,分别称为安全或网络安全知情安全(SIS或CSIS)。这种方法允许扩展和整合已知技术FMECA(故障模式、影响及危害性分析)和IMECA(入侵FMECA),以及开发新的SISMECA(基于SIS的入侵模式、影响及危害性分析)技术。文中提出了SISMECA实施的本体模型和模板。安全评估方法基于:(i)考虑各种ATS的特殊性和参与者(监管机构、开发者、运营商、客户)的角色,应用和增强SISMECA;(ii)开发一组描述ATS在网络攻击和物理影响条件下运行的场景;(iii)人工智能对所分析领域系统保护的贡献;(iv)基于场景开发和分析与不同网络攻击相关的用户故事,以及通过人工智能手段/平台保护ATS免受攻击的方法;(v)利用基于人工智能质量模型的特征、网络攻击危害性的基于风险评估以及参与者可实施的对策效率来分析人工智能平台要求。文中展示并讨论了SISMECA评估的应用示例。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/a9f2841febb5/entropy-25-01123-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/2a72fdd2d941/entropy-25-01123-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/ef0e36a692cc/entropy-25-01123-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/4a1152fd31fd/entropy-25-01123-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/a56e103da1ab/entropy-25-01123-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/20adb4212541/entropy-25-01123-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/946dc80c6bc0/entropy-25-01123-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/7c19e8bb209f/entropy-25-01123-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/48515d1479fb/entropy-25-01123-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/b113b66eb540/entropy-25-01123-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/5fc42ab85b93/entropy-25-01123-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/c9bd9644c608/entropy-25-01123-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/0daed1f2cbdb/entropy-25-01123-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/9c97aefd9b9d/entropy-25-01123-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/aa82d2cffa53/entropy-25-01123-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/1cc1d48e96db/entropy-25-01123-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/0f44352779ef/entropy-25-01123-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/a9f2841febb5/entropy-25-01123-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/2a72fdd2d941/entropy-25-01123-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/ef0e36a692cc/entropy-25-01123-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/4a1152fd31fd/entropy-25-01123-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/a56e103da1ab/entropy-25-01123-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/20adb4212541/entropy-25-01123-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/946dc80c6bc0/entropy-25-01123-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/7c19e8bb209f/entropy-25-01123-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/48515d1479fb/entropy-25-01123-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/b113b66eb540/entropy-25-01123-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/5fc42ab85b93/entropy-25-01123-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/c9bd9644c608/entropy-25-01123-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/0daed1f2cbdb/entropy-25-01123-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/9c97aefd9b9d/entropy-25-01123-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/aa82d2cffa53/entropy-25-01123-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/1cc1d48e96db/entropy-25-01123-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/0f44352779ef/entropy-25-01123-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6747/10453859/a9f2841febb5/entropy-25-01123-g017.jpg

相似文献

1
Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection.考虑人工智能驱动的网络攻击与防护的自主运输系统的安全知情安全分析
Entropy (Basel). 2023 Jul 26;25(8):1123. doi: 10.3390/e25081123.
2
Formulating Cybersecurity Requirements for Autonomous Ships Using the SQUARE Methodology.使用SQUARE方法制定自主船舶的网络安全要求。
Sensors (Basel). 2023 May 24;23(11):5033. doi: 10.3390/s23115033.
3
Interoperability Among Unmanned Maritime Vehicles: Review and First In-field Experimentation.无人海上航行器的互操作性:综述与首次现场试验
Front Robot AI. 2020 Jul 14;7:91. doi: 10.3389/frobt.2020.00091. eCollection 2020.
4
Modeling and analyzing self-resistance of connected automated vehicular platoons under different cyberattack injection modes.建模和分析不同网络攻击注入模式下的互联自动驾驶车辆队列的自抗扰性。
Accid Anal Prev. 2024 Apr;198:107494. doi: 10.1016/j.aap.2024.107494. Epub 2024 Feb 8.
5
Survey on the Developments of Unmanned Marine Vehicles: Intelligence and Cooperation.海洋无人飞行器发展调查:智能与合作。
Sensors (Basel). 2023 May 10;23(10):4643. doi: 10.3390/s23104643.
6
Analysis on security-related concerns of unmanned aerial vehicle: attacks, limitations, and recommendations.分析与无人机安全相关的关注点:攻击、限制因素和建议。
Math Biosci Eng. 2022 Jan 10;19(3):2641-2670. doi: 10.3934/mbe.2022121.
7
Video Surveillance Processing Algorithms utilizing Artificial Intelligent (AI) for Unmanned Autonomous Vehicles (UAVs).利用人工智能(AI)的视频监控处理算法用于无人驾驶飞行器(UAV)。
MethodsX. 2021 Jul 27;8:101472. doi: 10.1016/j.mex.2021.101472. eCollection 2021.
8
Prototype Design and Experimental Evaluation of Autonomous Collaborative Communication System for Emerging Maritime Use Cases.面向新兴海事用例的自主协作通信系统的原型设计与实验评估
Sensors (Basel). 2021 Jun 3;21(11):3871. doi: 10.3390/s21113871.
9
An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks.一种用于确保6G自动驾驶汽车网络中安全通信的智能动态信息物理系统威胁检测系统。
Sci Rep. 2024 Sep 5;14(1):20795. doi: 10.1038/s41598-024-70835-3.
10
A Semi-Physical Platform for Guidance and Formations of Fixed-Wing Unmanned Aerial Vehicles.一种固定翼无人机的制导与编队半物理仿真平台。
Sensors (Basel). 2020 Feb 19;20(4):1136. doi: 10.3390/s20041136.

引用本文的文献

1
A hybrid AI based framework for enhancing security in satellite based IoT networks using high performance computing architecture.一种基于混合人工智能的框架,用于使用高性能计算架构增强基于卫星的物联网网络的安全性。
Sci Rep. 2024 Dec 28;14(1):30695. doi: 10.1038/s41598-024-78262-0.

本文引用的文献

1
Security analysis of drones systems: Attacks, limitations, and recommendations.无人机系统的安全性分析:攻击、局限性及建议。
Internet Things (Amst). 2020 Sep;11:100218. doi: 10.1016/j.iot.2020.100218. Epub 2020 May 8.
2
Quality Models for Artificial Intelligence Systems: Characteristic-Based Approach, Development and Application.人工智能系统的质量模型:基于特征的方法、开发和应用。
Sensors (Basel). 2022 Jun 27;22(13):4865. doi: 10.3390/s22134865.
3
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.
智慧城市智能交通系统中的安全:从理论到实践。
Sensors (Basel). 2016 Jun 15;16(6):879. doi: 10.3390/s16060879.