13 research outputs found
Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework for Civilian Urban Air Mobility
Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communication infrastructure that enhances the risk of jamming and spoofing attacks to steal or crash crafts in UAM. To protect commercial UAM from cyberattacks and theft, this work proposes an artificial intelligence (AI)-enabled exploratory cyber-physical safety analyzer framework. The proposed framework devises supervised learning-based AI schemes such as decision tree, random forests, logistic regression, K-nearest neighbors (KNN), and long short-term memory (LSTM) for predicting and detecting cyber jamming and spoofing attacks. Then, the developed framework analyzes the conditional dependencies based on the Pearson’s correlation coefficient among the control messages for finding the cause of potential attacks based on the outcome of the AI algorithm. This work considers the UAM attitude control scenario for determining jam and spoofing attacks as a use case to validate the proposed framework with a state-of-the-art UAV attack dataset. The experiment results show the efficacy of the proposed framework in terms of around 99.9% role= presentation style= box-sizing: border-box; max-height: none; display: inline; line-height: normal; font-size: 13.2px; overflow-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; min-width: 0px; min-height: 0px; border: 0px; padding: 0px; margin: 0px; color: rgb(34, 34, 34); font-family: Arial, Arial, Helvetica, sans-serif; position: relative; \u3e99.9% accuracy for jamming and spoofing detection with a decision tree, random forests, and KNN while efficiently finding the root cause of the attack
Generative AI-driven Semantic Communication Framework for NextG Wireless Network
This work designs a novel semantic communication (SemCom) framework for the
next-generation wireless network to tackle the challenges of unnecessary
transmission of vast amounts that cause high bandwidth consumption, more
latency, and experience with bad quality of services (QoS). In particular,
these challenges hinder applications like intelligent transportation systems
(ITS), metaverse, mixed reality, and the Internet of Everything, where
real-time and efficient data transmission is paramount. Therefore, to reduce
communication overhead and maintain the QoS of emerging applications such as
metaverse, ITS, and digital twin creation, this work proposes a novel semantic
communication framework. First, an intelligent semantic transmitter is designed
to capture the meaningful information (e.g., the rode-side image in ITS) by
designing a domain-specific Mobile Segment Anything Model (MSAM)-based
mechanism to reduce the potential communication traffic while QoS remains
intact. Second, the concept of generative AI is introduced for building the
SemCom to reconstruct and denoise the received semantic data frame at the
receiver end. In particular, the Generative Adversarial Network (GAN) mechanism
is designed to maintain a superior quality reconstruction under different
signal-to-noise (SNR) channel conditions. Finally, we have tested and evaluated
the proposed semantic communication (SemCom) framework with the real-world 6G
scenario of ITS; in particular, the base station equipped with an RGB camera
and a mmWave phased array. Experimental results demonstrate the efficacy of the
proposed SemCom framework by achieving high-quality reconstruction across
various SNR channel conditions, resulting in 93.45% data reduction in
communication
Edge assisted crime prediction and evaluation framework for machine learning algorithms
The growing global populations, particularly in major cities, have created new problems, notably in terms of public safety regulation and optimization. As a result, in this paper, a strategy is provided for predicting crime occurrences in a city based on historical events and demographic observation. In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. Thus, a complete analysis of four distinct sorts of crimes, such as murder, rapid trial, repression of women and children, and narcotics, validates the efficiency of the proposed framework. The complete study and implementation process have shown a visual representation of crime in various areas of country. The total work is completed by the selection, assessment, and implementation of the Machine Learning (ML) model, and finally, proposed the crime prediction. Criminal risk is predicted using classification models for a particular time interval and place. To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. A maximum accuracy of 81% is obtained for Decision Tree algorithm during the prediction of crime. The findings demonstrate that employing Machine Learning techniques aids in the prediction of criminal events, which has aided in the enhancement of public security
Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework for Civilian Urban Air Mobility
Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communication infrastructure that enhances the risk of jamming and spoofing attacks to steal or crash crafts in UAM. To protect commercial UAM from cyberattacks and theft, this work proposes an artificial intelligence (AI)-enabled exploratory cyber-physical safety analyzer framework. The proposed framework devises supervised learning-based AI schemes such as decision tree, random forests, logistic regression, K-nearest neighbors (KNN), and long short-term memory (LSTM) for predicting and detecting cyber jamming and spoofing attacks. Then, the developed framework analyzes the conditional dependencies based on the Pearson’s correlation coefficient among the control messages for finding the cause of potential attacks based on the outcome of the AI algorithm. This work considers the UAM attitude control scenario for determining jam and spoofing attacks as a use case to validate the proposed framework with a state-of-the-art UAV attack dataset. The experiment results show the efficacy of the proposed framework in terms of around 99.9% accuracy for jamming and spoofing detection with a decision tree, random forests, and KNN while efficiently finding the root cause of the attack
Recommended from our members
An Optimized and Scalable Blockchain-Based Distributed Learning Platform for Consumer IoT
Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers’ needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing gateway peer (GWP) in the blockchain network to address scalability, ledger optimization, and secure model transmission issues. In the architecture, we replace the centralized aggregator with the blockchain network, while GWP limits the number of local transactions to execute in BCN. Considering the security and privacy of FL processes, we incorporated differential privacy and advanced normalization techniques into ML processes. These approaches enhance the cybersecurity of end-users and promote the adoption of technological innovation standards by service providers. The proposed approach has undergone extensive testing using the well-respected Stanford (CARS) dataset. We experimentally demonstrate that the proposed architecture enhances network scalability and significantly optimizes the ledger. In addition, the normalization technique outperforms batch normalization when features are under DP protection