Abstract

Abstract. There are regular developments and changes in cities. Developments in cities have affected transportation, and traffic control tools have changed. Traffic signs and traffic lights have been used to direct pedestrians and vehicles correctly. Traffic light control systems are used to ensure the safety of vehicles and pedestrians, increase the fluency in traffic, guide them in transportation, warn pedestrians and drivers, and regulate and control transportation disruptions. In order to facilitate people's lives, it is desired to control the traffic components autonomously with the developments in autonomous systems. Cyber threats arise due to the active use of the internet and signals or frequencies in the use of modules that will provide communication with traffic lights, traffic signs, and vehicles, which are traffic components at the inter-sections of many roads in the control of central systems. The study is limited to smart traffic lights, which are traffic components. If we examine the cyber-attacks, we can see that Malware Attacks, Buffer Overflow Attacks, DoS attacks, and Jamming Attacks can be made. Network-Based Intrusion Detection Systems and Host-Based Intrusion Detection Systems can be used to detect and stop Malware Attacks, Buffer Overflow Attacks, DoS attacks, and Jamming Attacks. Intrusion detection systems tell us whether the data poses a threat or does not pose after the data passing through the system is examined. In this way, system protection is ensured by controlling the data traffic in the system.

Highlights

  • Due to the development of autonomous systems, autonomous systems have started to be used in traffic signs and traffic lights

  • The attacks that can be made on the smart traffic lights system are Buffer overflow, DDoS, Malicious Code, and Jamming attacks

  • All the lights and signs in the smart traffic lights system can be controlled with the buffer overflow attack

Read more

Summary

INTRODUCTION

Due to the development of autonomous systems, autonomous systems have started to be used in traffic signs and traffic lights. Excessive traffic congestion may cause delays or accidents These systems, which facilitate traffic control, make it difficult to control in cyberspace. In big cities, there is a need for smart traffic light systems. It is difficult to determine who and by whom these attacks are financed, and which countries are behind these attacks For this reason, it is very difficult to identify risks and threats in cyberspace and take precautions against them. It is very difficult to identify risks and threats in cyberspace and take precautions against them In such an environment, it is no longer mentioned about providing absolute cybersecurity, instead, it is aimed to keep cybersecurity risks at manageable and acceptable levels (Özarpa et al, 2021). Smart traffic lights in smart cities and cyberattacks on these systems will be detected.

TRAFFIC LIGHT SYSTEMS TECHNOLOGY
Fixed Time Smart Traffic Lights System
CYBER-ATTACKS ON TRAFFIC LIGHT
Buffer Overflow
Malicious Code
Jamming Attack
PROTECTION TO CYBER THREAT
Network-Based Intrusion Detection Systems
Host-Based Intrusion Detection Systems
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call