A Neural Computing-Based Access Control Protocol for AI-Driven Intelligent Flying Vehicles in Industry 5.0-Assisted Consumer Electronics
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In practice, autonomous and intelligent robots and flying vehicles (i.e., drones) are als...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on consumer electronics 2024-02, Vol.70 (1), p.3573-3581 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In practice, autonomous and intelligent robots and flying vehicles (i.e., drones) are also becoming the integral part of Industry 5.0. These vehicles are attaining significant importance nowadays because of their applications in consumer electronics. However, there may be numerous privacy issues in such an infrastructure. Nevertheless, neural computing-driven security solutions have played a significant role in overcoming the security and privacy issues of AI-driven intelligent flying vehicles. Motivated by these facts, this article presents a neural computing-based access control protocol for AI-driven flying vehicles to prevent all possible security threats. A detailed security evaluation of the devised protocol is done formally using the extensively recognized Real-Or-Random (ROR) oracle model. Similarly, the informal security analysis ensures the resistance of our scheme against various potential attacks under the assumptions of CK and DY adversarial models. Moreover, detailed performance scrutiny of the devised protocol with various existing schemes shows the robustness and supremacy of our scheme in terms of computation, communication overhead, and security attributes. |
---|---|
ISSN: | 0098-3063 1558-4127 |
DOI: | 10.1109/TCE.2023.3276066 |