Review of Risk Assessment Methods for Cybersecurity Attacks on Road Network and Intelligent Transportation System Applications

Natchaphon Leungbootnak, Kevin Heaslip
{"title":"Review of Risk Assessment Methods for Cybersecurity Attacks on Road Network and Intelligent Transportation System Applications","authors":"Natchaphon Leungbootnak, Kevin Heaslip","doi":"10.1177/03611981241264276","DOIUrl":null,"url":null,"abstract":"One of the most discussed infrastructure issues of our time is cybersecurity. A transportation system that connects not only people but also logistics to make the community around the world closer is one of the critical infrastructures requiring cybersecurity to perform its functions. Transportation systems include aviation, maritime, pipeline, railroad, and road networks. This study focuses only on the roadway network system. Cutting-edge technologies related to highway networks, such as variable message signs, vehicular ad hoc networks, and in-vehicle networks, have been developed to improve safety and efficiency. Those technologies make transportation systems more complex and integrated, bringing many potential vulnerabilities and cyber risks. This can attract an adversary to attack and exploit the system. The number of cybersecurity attacks on transportation systems has been growing for many years. However, it is not feasible to protect against all cybersecurity attacks in the system. The risk assessment concept is proposed to prioritize risk resulting from attacks to support decision-makers in formulating appropriate policies or countermeasures. This study reviews risk assessment methods for cybersecurity attacks on road networks and intelligent transportation system applications. Three potential risk assessment methods are examined for road network systems: the National Institute of Standards and Technology Special Publication 800-30, Attack Potential and Damage Potential, and the fuzzy analytic hierarchy process.","PeriodicalId":517391,"journal":{"name":"Transportation Research Record: Journal of the Transportation Research Board","volume":"14 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transportation Research Record: Journal of the Transportation Research Board","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/03611981241264276","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

One of the most discussed infrastructure issues of our time is cybersecurity. A transportation system that connects not only people but also logistics to make the community around the world closer is one of the critical infrastructures requiring cybersecurity to perform its functions. Transportation systems include aviation, maritime, pipeline, railroad, and road networks. This study focuses only on the roadway network system. Cutting-edge technologies related to highway networks, such as variable message signs, vehicular ad hoc networks, and in-vehicle networks, have been developed to improve safety and efficiency. Those technologies make transportation systems more complex and integrated, bringing many potential vulnerabilities and cyber risks. This can attract an adversary to attack and exploit the system. The number of cybersecurity attacks on transportation systems has been growing for many years. However, it is not feasible to protect against all cybersecurity attacks in the system. The risk assessment concept is proposed to prioritize risk resulting from attacks to support decision-makers in formulating appropriate policies or countermeasures. This study reviews risk assessment methods for cybersecurity attacks on road networks and intelligent transportation system applications. Three potential risk assessment methods are examined for road network systems: the National Institute of Standards and Technology Special Publication 800-30, Attack Potential and Damage Potential, and the fuzzy analytic hierarchy process.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
路网和智能交通系统应用网络安全攻击风险评估方法综述
网络安全是当代讨论最多的基础设施问题之一。运输系统不仅连接人与人,还连接物流,使世界各地的社会联系更加紧密,是需要网络安全来实现其功能的关键基础设施之一。运输系统包括航空、海运、管道、铁路和公路网络。本研究只关注公路网络系统。与公路网络相关的尖端技术,如可变信息标志、车辆特设网络和车载网络等,都是为了提高安全性和效率而开发的。这些技术使交通系统变得更加复杂和集成,带来了许多潜在的漏洞和网络风险。这可能会吸引对手对系统进行攻击和利用。多年来,针对运输系统的网络安全攻击一直在增加。然而,要防范系统中的所有网络安全攻击并不可行。风险评估概念的提出是为了对攻击造成的风险进行优先排序,以支持决策者制定适当的政策或对策。本研究回顾了道路网络和智能交通系统应用中网络安全攻击的风险评估方法。针对公路网络系统,研究了三种潜在的风险评估方法:美国国家标准与技术研究院特别出版物 800-30《攻击潜力和破坏潜力》以及模糊层次分析法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Ordinal Clustering Based Homogeneous Road Segments in Asphalt Pavement Maintenance and Rehabilitation Optimized Decision-Making Exploring the Relationship Between COVID-19 Transmission and Population Mobility over Time CTAFFNet: CNN–Transformer Adaptive Feature Fusion Object Detection Algorithm for Complex Traffic Scenarios Eye Movement Evaluation of Pedestrians' Mobile Phone Usage at Street Crossings Impact of Texting-Induced Distraction on Driving Behavior Based on Field Operation Tests
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1