Abstract

Efficient utilization of the IoT generated data helps in the decision-making process as well as the realization of the concept of smart cities into a reality. The smart cities utilize Intelligent Transportation System (ITS) to facilitate smart vehicles to operate independently without much human intervention. The ITS system utilizes the data produced by the smart infrastructure to intelligently operate the smart vehicles and make highly precise decisions in the whole smart city ecosystem. Although ITS has been in its evolutionary phase, this is the right time to realize the vulnerabilities present in the ITS infrastructure that can be exploited by the adversaries to render devastating attacks. The ITS network involves highly sophisticated infrastructure where any anomaly provokes threat to human lives. The ITS data can be manipulated by the adversaries for attacks such as password theft, information spoofing, data manipulation, information loss, eavesdropping, and key fob attacks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call