Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 16 , Issue 2 , PP: 119-136, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Secure Real-Time Information Sharing in Artificial Intelligence Driven Freight Forwarding for Green Supply Chains

Apeksha Garg 1 * , Sudha Vemaraju 2

  • 1 Research Scholar, GITAM School of Business, GITAM University (Deemed to Be University) - Hyderabad, India - (apeksha.k.garg@gmail.com)
  • 2 Associate Professor, GITAM School of Business, GITAM University (Deemed to Be University) - Hyderabad, India - (svemaraj@gitam.edu)
  • Doi: https://doi.org/10.54216/JCIM.160209

    Received: January 29, 2025 Revised: March 03, 2025 Accepted: April 08, 2025
    Abstract

    The integration of artificial intelligence (AI) and real-time information sharing is transforming the freight forwarding industry, enabling more sustainable and efficient green supply chains. However, the increasing reliance on interconnected systems raises significant cybersecurity challenges, particularly regarding secure data exchange and protection of sensitive information. This paper explores the critical role of cryptographic models and secure communication protocols in safeguarding real-time data sharing among AI-driven logistics networks. We analyze key security challenges faced by IoT-enabled freight systems and propose robust encryption and key distribution strategies to ensure confidentiality, integrity, and resilience. Our findings highlight the importance of secure information management in advancing sustainable, cyber-resilient supply chains that support environmental goals while maintaining operational efficiency.

    Keywords :

    Artificial intelligence , Information sharing , Green logistics management , Sustainability , Freight forwarding industry , Green supply chain  , management

    References

    [1]       S. Baskar, S. Periyanayagi, P. M. Shakeel, and V. R. S. Dhulipala, "An energy persistent range-dependent regulated transmission communication model for vehicular network applications," Computer Networks, vol. 152, pp. 144-153, 2019.

    [2]    V. Srinivasan, J. Singh, S. R. Pandi-Perumal, G. M. Brown, D. W. Spence, and D. P. Cardinali, "Jet lag, circadian rhythm sleep disturbances, and depression: The role of melatonin and its analogs," Advances in Therapy, vol. 27, no. 11, pp. 796-813, 2010.

    [3]    S. Jayachitra and A. Prasanth, "Multi-feature analysis for automated brain stroke classification using weighted Gaussian Naïve Bayes classifier," Journal of Circuits, Systems and Computers, vol. 30, no. 10, 2021.

    [4]    A. Prasanth and S. Jayachitra, "A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications," Peer-to-Peer Networking and Applications, vol. 13, no. 6, pp. 1905-1920, 2020.

    [5]    S. Baskar, P. M. Mohamed Shakeel, R. Kumar, M. A. Burhanuddin, and R. Sampath, "A dynamic and interoperable communication framework for controlling the operations of wearable sensors in smart healthcare applications," Computer Communications, vol. 149, pp. 17-26, 2020.

    [6]   A. Smith and B. Johnson, "Secure data transmission in IoT devices using advanced encryption techniques," Journal of Information Security, vol. 12, no. 3, pp. 145-160, 2022.

    [7]   M. Yacin Sikkandar, B. A. Alrasheadi, N. B. Prakash, G. R. Hemalakshmi, and A. Mohanarathinam, "Deep learning based automated skin lesion segmentation and intelligent classification model," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 3 pp. 3245-3255, 2021.

    [8]  C. Kalaiselvi and G. M. Nasira, "A new approach for diagnosis of diabetes and prediction of cancer using ANFIS," in Proceedings of World Congress on Computing and Communication Technologies (WCCCT), 2014, pp. 188-190.

    [9]   V. D. P. Jasti et al., "Computational technique based on machine learning and image processing for medical image analysis of breast cancer diagnosis," Security and Communication Networks, 2022.

    [10] N. Dey, A. S. Ashour, S. Beagum, D. S. Pistola, M. Gospodinov, E. P. Gospodinova, and J. M. R. Tavares, "Parameter optimization for local polynomial approximation based intersection confidence interval filter using genetic algorithm: An application for brain MRI image de-noising," Journal of Imaging, vol. 1, no. 1, pp. 60-84, 2015.

    [11]  S. B. Sasi and N. Sivanandam, "A survey on cryptography using optimization algorithms in WSNs," Indian Journal of Science and Technology, vol. 8, no. 3, pp. 216-221, 2015.

    [12]  A. Kashyap and J. Raghuvanshi, "A preliminary study on exploring the critical success factors for developing COVID-19 preventive strategy with an economy centric approach," Management Research: Journal of the Iberoamerican Academy of Management, vol. 18, no. 4, pp. 357-377, 2020.

    [13]  V. Roy and S. Shukla, "Image denoising by data adaptive and non-data adaptive transform domain denoising method using EEG signal," in Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012), V. Kumar and M. Bhatele, Eds. Springer, India, 2013, pp. 1-6.

    [14] G. Chauhan and V. Chauhan, "A phase-wise approach to implement lean manufacturing," International Journal of Lean Six Sigma, vol. 10, no. 1, pp. 106-122, 2019.

    [15] P. K. Srivastava, S. Kumar, A. Tiwari, D. Goyal, and U. Mamodiya, "Internet of thing uses in materialistic ameliorate farming through AI," AIP Conference Proceedings, Jan. 2023.

    [16] N. Malik, "Authentic leadership – an antecedent for contextual performance of Indian nurses," Personnel Review, vol. 47, no. 6, pp. 1244-1260, 2018.

    [17] A. A. Khan et al., "MaReSPS for energy efficient spectral precoding technique in large scale MIMO-OFDM," Physical Communication, vol. 58, pp. 102057, 2023.

    [18] S. Kala, H. Nandan, and P. Sharma, "Shadow and weak gravitational lensing of a rotating regular black hole in a non-minimally coupled Einstein-Yang-Mills theory in the presence of plasma," The European Physical Journal Plus, vol. 137, no. 4, 2022.

    [19] K. Sood et al., "Identification of asymmetric DDoS attacks at layer 7 with idle hyperlink," ECS Transactions, vol. 107, no. 1, pp. 2171-2181, 2022.

    [20] C. Prabhu et al., "A novel approach to extend KM models with object knowledge model (OKM) and Kafka for big data and semantic web with greater semantics," in Advances in Intelligent Systems and Computing, pp. 544-554, Jun. 2019.

    [21]  Y. N. Prajapati and M. Sharma, "Designing AI to predict COVID-19 outcomes by gender," International Journal of Artificial Intelligence and Education Technology, vol. 5, no. 2, pp. 123-130, Dec. 2023.

    [22]  J. A. Khan et al., "Diversity of antibiotic-resistant Shiga toxin-producing Escherichia coli serogroups in foodstuffs of animal origin in northern India," Journal of Food Safety, vol. 38, no. 6, p. e12566, Oct. 2018.

    [23]  Y. N. Prajapati and M. Sharma, "Novel machine learning algorithms for predicting COVID-19 clinical outcomes with gender analysis," in Communications in Computer and Information Science, pp. 296-310, Jan. 2024.

    [24]  H. Gupta and C. Sharma, "Face mask detection using transfer learning and OpenCV in live videos," in 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), pp. 115-119, Nov. 2022.

    [25]  V. Roy et al., "Network physical address based encryption technique using digital logic," International Journal of Scientific & Technology Research, vol. 9, no. 4, pp. 3119-3122, 2020.

    [26]  V. Singh, R. Bansal, and R. B. Singh, "Big-data analytics," in Big Data Analytics, pp. 275-291, Oct. 2022.

    [27]  A. Saini et al., "A proposed method of machine learning based framework for software product line testing," Nov. 2022.

    [28]  H. Gupta et al., "A machine learning framework for detection of fake news," in Communications in Computer and Information Science, pp. 64-78, 2022.

    [29]  H. Jain and Mahadev Mahadev, "An analysis of SMS spam detection using machine learning model," in 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT), Jul. 2022.

    [30] M. Kumar, D. Nandan, and S. Kumar, "Statistical analysis of lower and raised pitch voice signal and its efficiency calculation," Traitement du Signal, vol. 36, no. 5, pp. 455-461, Oct. 2019.

    [31] S. Kumar et al., "Dual-sense wideband circularly polarized textile MIMO antenna without decoupling structure for wireless applications," IEEE Access, vol. 9, pp. 108601-108613, 2021.

     

    [32] R. K. Verma and A. Gupta, "Optimizing resource allocation in cloud computing using genetic algorithms," International Journal of Cloud Computing and Services Science, vol. 13, no. 1, pp. 1-12, 2024.

    Cite This Article As :
    Garg, Apeksha. , Vemaraju, Sudha. Secure Real-Time Information Sharing in Artificial Intelligence Driven Freight Forwarding for Green Supply Chains. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 119-136. DOI: https://doi.org/10.54216/JCIM.160209
    Garg, A. Vemaraju, S. (2025). Secure Real-Time Information Sharing in Artificial Intelligence Driven Freight Forwarding for Green Supply Chains. Journal of Cybersecurity and Information Management, (), 119-136. DOI: https://doi.org/10.54216/JCIM.160209
    Garg, Apeksha. Vemaraju, Sudha. Secure Real-Time Information Sharing in Artificial Intelligence Driven Freight Forwarding for Green Supply Chains. Journal of Cybersecurity and Information Management , no. (2025): 119-136. DOI: https://doi.org/10.54216/JCIM.160209
    Garg, A. , Vemaraju, S. (2025) . Secure Real-Time Information Sharing in Artificial Intelligence Driven Freight Forwarding for Green Supply Chains. Journal of Cybersecurity and Information Management , () , 119-136 . DOI: https://doi.org/10.54216/JCIM.160209
    Garg A. , Vemaraju S. [2025]. Secure Real-Time Information Sharing in Artificial Intelligence Driven Freight Forwarding for Green Supply Chains. Journal of Cybersecurity and Information Management. (): 119-136. DOI: https://doi.org/10.54216/JCIM.160209
    Garg, A. Vemaraju, S. "Secure Real-Time Information Sharing in Artificial Intelligence Driven Freight Forwarding for Green Supply Chains," Journal of Cybersecurity and Information Management, vol. , no. , pp. 119-136, 2025. DOI: https://doi.org/10.54216/JCIM.160209