Decarbonization Transportation: Evaluating Role of Cyber Security in Transportation sector based on Neutrosophic Techniques in a Climate of Uncertainty

被引:0
作者
Saber N.E. [1 ]
Mohamed M. [2 ]
AbdelAziz N.M. [1 ]
机构
[1] Faculty of Computers and Informatics, Zagazig University, Zagazig
[2] Higher Technological Institute, 10th of Ramadan City
关键词
Cyber security; Holistic Approach; Low-Carbon Transportation; Multi- Criteria Decision Making (MCDM); Sustainable Environment; Triangular Neutrosophic Sets (TriNSs);
D O I
10.5281/zenodo.10251809
中图分类号
学科分类号
摘要
Recently, transport systems that produce low levels of carbon emissions have emerged as an essential component of several nations’ goals for achieving sustainable development. These systems also play a very significant role in the process of developing low-carbon cities. On the other hand, the safety of low-carbon modes of transport has been put in jeopardy in several different ways. For instance, assaults that result in a denial of service present a significant danger to the networks that connect electric cars to the grid. Several different strategies for defending against these dangers have been developed to lessen their impact. However, these strategies are only applicable to certain kinds of situations or assaults. Therefore, the purpose of this paper is to examine the security element from a holistic approach, present an overview of the obstacles and future directions of cyber security technologies in low-carbon transportation, and overcome such challenges. To begin, the low-carbon transport services are positioned in this article based on the idea of low-carbon transport and the significance of low-carbon transport. After that, using the network's design and the manner of communication as a lens, this article defines the common threats posed by attacks on the network. An additional consideration is given to the associated defensive technologies as well as the pertinent security recommendations, this time from the point of view of data security, network management security, and network application security. To improve this notion of safeguarding the gride and communication, it is necessary to evaluate ability of network against sniffing and spoofing or from any various methods of attacks. This motivates the study to employ Multi- Criteria Decision Making (MCDM) entailed in entropy for weighting the benchmarks which employed in Combined Compromise Solution (CoCoSo) toward obtaining optimal intelligent transportation systems (ITrSs) through ranking various ITrSs. In this study the utilized techniques are powered by uncertainty theory is Triangular Neutrosophic Sets (TriNSs). These utilized techniques contributed to constructing robust hybridization model. This model implemented in real case study to ensure its validity on decision making. © (2023) University of New Mexico.
引用
收藏
页码:570 / 582
页数:12
相关论文
共 23 条
  • [1] Song J., He G., Wang J., Zhang P., Shaping future low-carbon energy and transportation systems: Digital technologies and applications, iEnergy, 1, 3, pp. 285-305, (2022)
  • [2] Ismailova Maxbuba, Alimukhamedova Nargiza, Potential Pitfalls of Data Fusion Digitalization in Microfinance Context, Fusion: Practice and Applications, 12, 2, pp. 98-108, (2023)
  • [3] Lah O., Decarbonizing the transportation sector: policy options, synergies, and institutions to deliver on a low-carbon stabilization pathway, WIREs Energy Environ, 6, 6, (2017)
  • [4] Osman Lobna, Taiwo Olutosin, Elashry Ahmed, Ezugwu Absalom E., Intelligent Edge Computing for IoT: Enhancing Security and Privacy, Journal of Intelligent Systems and Internet of Things, 8, 1, pp. 55-65, (2023)
  • [5] Merkepci Mehmet, Abobala Mohammad, Security Model for Encrypting Uncertain Rational Data Units Based on Refined Neutrosophic Integers Fusion and El Gamal Algorithm, Fusion: Practice and Applications, 10, 2, pp. 35-41, (2023)
  • [6] Qiao D., Et al., Toward safe carbon–neutral transportation: Battery internal short circuit diagnosis based on cloud data for electric vehicles, Appl. Energy, 317, (2022)
  • [7] Alubady Raaid, shlaka Rawan A., Diame Hussein Alaa, Abdulkareem Sarah Ali, Hussam Ragheed, Yassine Sahar, Rajinikanth Venkatesan, Blockchain-based e-Medical Record and Data Security Service Management based on IoMT resource, Journal of Intelligent Systems and Internet of Things, 8, 2, pp. 86-100, (2023)
  • [8] Guo L., Yang B., Ye J., Velni J. M., Song W., Attack-Resilient Lateral Stability Control for Four-Wheel-Driven EVs Considering Changed Driver Behavior Under Cyber Threats, IEEE Trans. Transp. Electrif, 8, 1, pp. 1362-1375, (2022)
  • [9] Mohamed Ehab R., Mansour Heba M., El-Komy Osama M., An efficient fusion method for Protecting Software-Defined Networks Against ARP Attacks: Analysis and Experimental Validation, Fusion: Practice and Applications, 12, 1, pp. 08-23, (2023)
  • [10] Diaz-Verdejo J., Munoz-Calle J., Estepa Alonso A., Estepa Alonso R., Madinabeitia G., On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks, Applied Sciences, 12, 2, (2022)