Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A Taxonomy of AI Techniques for Security and Privacy in Cyber-Physical Systems

Version 1 : Received: 8 July 2023 / Approved: 8 July 2023 / Online: 10 July 2023 (10:12:36 CEST)

How to cite: Bandi, A. A Taxonomy of AI Techniques for Security and Privacy in Cyber-Physical Systems. Preprints 2023, 2023070564. https://doi.org/10.20944/preprints202307.0564.v1 Bandi, A. A Taxonomy of AI Techniques for Security and Privacy in Cyber-Physical Systems. Preprints 2023, 2023070564. https://doi.org/10.20944/preprints202307.0564.v1

Abstract

Background:As cyber-physical systems (CPS) continue to grow, it is progressively crucial to address the challenges of data protection using artificial intelligence (AI). Objective:The goal of this research is to provide an up-to-date overview of the security and privacy issues of CPS that incorporate AI techniques. Method:To achieve this, the author conducted a systematic literature review, focusing on 35 relevant articles. Results:The data collected from these studies was then categorized into three main areas: 1) different security and privacy issues, 2) application areas and vulnerabilities, and 3) the AI techniques used to address security and privacy concerns. The literature review highlights that intrusion detection and cyberattacks are the most commonly studied areas in CPS, while Machine Learnning (ML)-based attacks and vessel trajectory are less explored. The review identifies various CPS applications such as water treatment, energy, healthcare, and transportation that address security and privacy concerns. However, a relatively small proportion of studies focused on the manufacturing domain. The review also notes that while supervised machine learning algorithms under the classification category are commonly used to address data protection issues, there are comparatively fewer studies that have implemented automation processes using robots and deep learning. Limitations:The articles related to blockchain-based research were not included in this review to focus solely on AI techniques. Conclusion:The results of this analysis indicate that there is a significant need for innovative AI/ML techniques to protect intelligent systems and networks from ML-based security threats.

Keywords

Internet of Things (IoT); Beyond 5G; 6G communications; Autonomous systems; Control systems; Real-time systems; Industry 4.0; Aversrial Machine Learning

Subject

Computer Science and Mathematics, Artificial Intelligence and Machine Learning

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.