亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

Addressing Security Issues and Challenges in Smart Logistics Using Smart Technologies

计算机安全 业务 物联网 计算机科学
作者
Aneela Kiran Ansari,Raja Majid Ali Ujjan
标识
DOI:10.1002/9781394204472.ch2
摘要

Smart logistics systems (SLSs) gather, store, and transmit sensitive data, such as customer information, shipping information, and financial records. Unauthorized persons having access to sensitive data can cause data breaches, which can result in theft and misuse. Sensors, RFID tags, and other tracking and monitoring devices found in the Internet of Things (IoT) are crucial to the success of smart logistics. Intruders might potentially obtain unauthorized access and risk data integrity by exploiting security flaws in these devices. Cybersecurity concerns can arise from insiders who have permission to access an SLS, such as workers or contractors. These people may endanger the system's security inadvertently, resulting in data breaches, illegal access, or sabotage. Insider risks may be reduced by implementing appropriate access restrictions, monitoring systems for anomalous activity, and regularly performing security training. Cybersecurity procedures are designed to protect electronic data and systems from unauthorized access and theft. To safeguard oneself and one's business, a variety of cybersecurity measures can be used. We focus on some of the most significant cybersecurity measures by looking at requests for information like "Explain the cybersecurity measures." Efficiency and speed are increasingly valued as a result of technological advancements. Modern means of transportation are included in this category. There has been a lot of focus on these vehicles from IT companies. Statistically speaking, they are far safer than regular cars. Innovations in autonomous and crewless vehicles have, like any new technology, given rise to cyberattack dangers. Hackers believe they can break into any targeted vehicle's system, and access the owner's private data without permission Therefore, the companies that produce hackers perceive numerous entry points and think they can break the security of any targeted vehicle system, steal the owner's personal identification information, and cause mechanical damage. Therefore, businesses developing autonomous vehicles must implement a robust cybersecurity architecture to protect against cyberattacks. They must better understand the nature of cybersecurity threats to autonomous vehicle systems. The dangers associated with cybersecurity are numerous for both individuals and corporations. Malicious actors, software flaws, and hardware flaws are only a few examples of the causes of these dangers. Human error, such as negligent internet browsing or clicking on dangerous links, can also result in cybersecurity issues. Many people agree that autonomous vehicles (AVs) have positive outcomes, but they worry about this technology's potential hazards and side effects. This chapter aims to peer-review the cybersecurity issues and challenges in the context of emerging technologies in transportation from the public's perspective. The results of our study will help the new research group and transportation companies.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
刚刚
小黑超努力完成签到 ,获得积分10
3秒前
3秒前
魏欣娜发布了新的文献求助10
5秒前
9秒前
11秒前
13秒前
往复发布了新的文献求助10
14秒前
NA发布了新的文献求助10
14秒前
往复完成签到,获得积分10
22秒前
科研通AI6应助cmz采纳,获得10
31秒前
魏欣娜发布了新的文献求助10
32秒前
bababiba完成签到,获得积分10
34秒前
45秒前
阿瓜师傅发布了新的文献求助10
48秒前
乐乐应助魏欣娜采纳,获得10
49秒前
50秒前
51秒前
大气踏歌发布了新的文献求助10
54秒前
负责的元柏完成签到,获得积分10
59秒前
1分钟前
1分钟前
1分钟前
cmz发布了新的文献求助10
1分钟前
12321234完成签到,获得积分10
1分钟前
12321234发布了新的文献求助10
1分钟前
1分钟前
浮游应助科研通管家采纳,获得10
1分钟前
嘻嘻哈哈应助科研通管家采纳,获得10
1分钟前
嘻嘻哈哈应助科研通管家采纳,获得10
1分钟前
浮游应助科研通管家采纳,获得10
1分钟前
英俊的铭应助科研通管家采纳,获得10
1分钟前
YAN完成签到 ,获得积分10
2分钟前
ZanE完成签到,获得积分10
2分钟前
平淡的芷蕊完成签到,获得积分10
2分钟前
2分钟前
2分钟前
wanci应助Huzhu采纳,获得50
2分钟前
wodetaiyangLLL完成签到 ,获得积分10
3分钟前
hwen1998完成签到 ,获得积分10
3分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Iron toxicity and hematopoietic cell transplantation: do we understand why iron affects transplant outcome? 2000
List of 1,091 Public Pension Profiles by Region 1021
Teacher Wellbeing: Noticing, Nurturing, Sustaining, and Flourishing in Schools 1000
A Technologist’s Guide to Performing Sleep Studies 500
EEG in Childhood Epilepsy: Initial Presentation & Long-Term Follow-Up 500
Latent Class and Latent Transition Analysis: With Applications in the Social, Behavioral, and Health Sciences 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 纳米技术 计算机科学 内科学 化学工程 复合材料 物理化学 基因 遗传学 催化作用 冶金 量子力学 光电子学
热门帖子
关注 科研通微信公众号,转发送积分 5482348
求助须知:如何正确求助?哪些是违规求助? 4583202
关于积分的说明 14388962
捐赠科研通 4512258
什么是DOI,文献DOI怎么找? 2472792
邀请新用户注册赠送积分活动 1459036
关于科研通互助平台的介绍 1432501