Abstract

Statement of the problem: the intelligent environment of a smart city includes many interfaces of various types, many of which are subject to a number of cyber-physical attacks and information security threats. At the same time, unmanned transport technologies are actively developing, and various intellectual infrastructure of a smart city is becoming more widespread. For this reason, attacks on the intelligent environment of a smart city and the issues of their protection are becoming increasingly relevant. The purpose of this work is to review the most relevant threats for various components of an unmanned transport environment and their classification depending on the type of interface and the type of attack, depending on the technology used by each specific component of an unmanned transport environment. Methods used: studying previous scientific papers and reports on the use of various interfaces of the intelligent transport environment of a smart city, as well as reports on previously implemented attacks on these interfaces, systematizing attacks, classifying them depending on the type of attack and type of interface. Novelty: The novelty of the work lies in the presented descriptive model of interaction and classification of the components of an unmanned transport environment. The main contribution lies in the identification of the main threats and their relationship with the components of the unmanned transport environment. Result: the resulting threat classification allows generalizing threats for each component of an unmanned transport environment, which allows developers and computer security specialists to appeal to attacks on a specific interface component of interest for further work with them in order to take the necessary measures to prevent possible threats. A descriptive model of interaction between the components of an unmanned transport environment is proposed. Practical Relevance: The overview presented is summarized in the form of a table, which provides the correspondence of each component of the unmanned vehicle environment with the interface, possible threats and links to previous work and security incident reports for each specific component.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call