Security Threats in Intelligent Transportation Systems and Their Risk Levels
نویسندگان
چکیده
Intelligent Transport Systems (ITSs) are part of road transportation sector evolution and constitute one the main steps towards vehicle automation. These systems use technologies that allow vehicles to communicate with each other or infrastructure. By increasing information quality reliability, ITSs can improve safety traffic efficiency, but only if cybersecurity data protection is ensured. With increase in number cyberattacks around world, receiving increased attention, especially area security. However, it equally important examine analyze security depth when concerns connected vehicles. In this paper, we propose a qualitative risk analysis based on Threat, Risk, Vulnerability Analysis (TVRA) methodology, focus ETSI ITS communication architecture. We present review solutions countermeasures for identified critical attacks.
منابع مشابه
Overview on Security Approaches in Intelligent Transportation Systems
Major standardization bodies developed and designed systems that should be used in vehicular ad-hoc networks. The Institute of Electrical and Electronics Engineers (IEEE) in America designed the wireless access in vehicular environments (WAVE) system. The European Telecommunications Standards Institute (ETSI) did come up with the “ITS-G5” system. Those Vehicular Ad-hoc Networks (VANETs) are the...
متن کاملVirtualization and their Security Threats
Few issues in the IT arena are regarded with more interest and passion than virtualization. Virtualization refers to technologies designed to provide a layer of abstraction between computer hardware systems and the software running on them. Here, we are discussing the key concepts of virtualization if you want to implement the virtualization within your environment. Many different vendors have ...
متن کاملVirtualization and their security threats
Few issues in the IT arena are regarded with more interest and passion than virtualization. Virtualization refers to technologies designed to provide a layer of abstraction between computer hardware systems and the software running on them. Here, we are discussing the key concepts of virtualization if you want to implement the virtualization within your environment. Many different vendors have ...
متن کاملturkish-israeli relations and their implication on iranian national security
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Risks
سال: 2022
ISSN: ['2227-9091']
DOI: https://doi.org/10.3390/risks10050091