2022
DOI: 10.3390/risks10050091
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats in Intelligent Transportation Systems and Their Risk Levels

Abstract: Intelligent Transport Systems (ITSs) are part of road transportation sector evolution and constitute one of the main steps towards vehicle automation. These systems use technologies that allow vehicles to communicate with each other or with road infrastructure. By increasing information quality and reliability, ITSs can improve road safety and traffic efficiency, but only if cybersecurity and data protection is ensured. With the increase in the number of cyberattacks around the world, cybersecurity is receivin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 44 publications
(31 reference statements)
0
8
0
Order By: Relevance
“…Zeddini et al [53] proposed a qualitative risk analysis of Intelligent Transport Systems based on the ETSI-TVRA [35] methodology. According to the ETSI Intelligent Transport Systems-Station (ITS-S) Communication Architecture, first the system is modelled focusing on its assets and then weaknesses are identified for each one.…”
Section: Ebios Risk Managermentioning
confidence: 99%
See 2 more Smart Citations
“…Zeddini et al [53] proposed a qualitative risk analysis of Intelligent Transport Systems based on the ETSI-TVRA [35] methodology. According to the ETSI Intelligent Transport Systems-Station (ITS-S) Communication Architecture, first the system is modelled focusing on its assets and then weaknesses are identified for each one.…”
Section: Ebios Risk Managermentioning
confidence: 99%
“…Finally, ITSRM 2 is too strict in the process of computing the residual risk, narrowing down its flexibility. The work proposed by Zeddini et al [53] is noteworthy, producing an extensive list of attacks, the vulnerabilities that cause them, the threats they pose on each asset and proposed countermeasures, all within the scope of ITSs, based on the ETSI-TVRA methodology. However it appears to be a mostly manual process and a theoretical approach.…”
Section: Comparative Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Programmers tend to make mistakes or build on other programmers' mistakes due to a lack of time, awareness, and dependence on old code [2]. It has been reported and exploited that there are numerous types of software vulnerabilities, including SQL injection, Cross-site scripting, Buffer overflow, Race condition, Integer overflow, OS command injection, missing authentication, and path traversal [3]. Even the slightest vulnerability in software can lead to financial, intellectual, or data loss.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the wide proliferation of the automotive industry, the smart transportation system has emerged as a significant part of the smart city concept to introduce luxury and safety services to a variety of citizens through establishing fast secured connections between mobile nodes on the road and the intelligent city infrastructure [1], [2]. One of the advanced technologies that has emerged with smart cities to improve the effectiveness of transportation networks is the vehicular adhoc network (VANET).…”
Section: Introductionmentioning
confidence: 99%