On the Cyber Security of Logistics in the Age of Artificial Intelligence

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review


Logistics and supply chain management make an enormous market globally, with an overall value measured in trillions of dollars. Lo-gistics is also deeply involved in national critical infrastructures (CI): transportation is directly identified as one of the CI sectors, and many other CI sectors cannot adequately function without properly working logistics. To optimize business processes and automate op-erational technology, different machine learning (ML) technologies are increasingly taken into use in logistics. It is then paramount that the cyber security of these new techniques is sufficient. Today, there is even an understanding, following the MITRE ATT&CK-framework, on how typical cyber-attacks against ML components are performed, on average. However, the risk profile for logistics applications, especially of those with operational technology com-ponents, is not clear; how realistic the threat currently is; or how the regulation and standardization are addressing machine learning se-curity in operational technology used in logistics. In this survey, we will look at some of the foundational aspects of information security for ML and operational technology, investigate the known cyber-attacks against logistics to profile the threat in typical use cases of ML in logistics, and map what kind of measures can be seen in dif-ferent guidelines and standards to mitigate the threats in this area.
Original languageEnglish
Title of host publicationArtificial Intelligence For Security-Enhancing Protection in a Changing World
EditorsTuomo Sipola, Monika Wolfmayr, Janne Alatalo, Tero Kokkonen
Place of PublicationCham
Number of pages35
Publication statusAccepted/In press - 2023
MoE publication typeA3 Book section, Chapters in research books


Dive into the research topics of 'On the Cyber Security of Logistics in the Age of Artificial Intelligence'. Together they form a unique fingerprint.

Cite this