The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Publications Copernicus
Download
Citation
Articles | Volume XLVI-4/W5-2021
Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci., XLVI-4/W5-2021, 411–415, 2021
https://doi.org/10.5194/isprs-archives-XLVI-4-W5-2021-411-2021
Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci., XLVI-4/W5-2021, 411–415, 2021
https://doi.org/10.5194/isprs-archives-XLVI-4-W5-2021-411-2021

  23 Dec 2021

23 Dec 2021

CYBER ATTACKS ON SCADA BASED TRAFFIC LIGHT CONTROL SYSTEMS IN THE SMART CITIES

C. Özarpa1, İ. Avcı2, B. F. Kınacı3, S. Arapoğlu4, and S. A. Kara1 C. Özarpa et al.
  • 1Karabuk University, Department of Mechanical Engineering, Karabuk, Turkey
  • 2Karabuk University, Department of Computer Engineering, Karabuk, Turkey
  • 3Karabuk University, Department of Rail Systems Engineering, Karabuk, Turkey
  • 4Yakakent Cad. Yakakent Sitesi Defne Apt., Yakacık, Kartal, Istanbul, Turkey

Keywords: Cybersecurity, Cyber-Attacks, Cyber Risk Analysis, Smart Traffic Light System, Smart Traffic

Abstract. There are regular developments and changes in cities. Developments in cities have affected transportation, and traffic control tools have changed. Traffic signs and traffic lights have been used to direct pedestrians and vehicles correctly. Traffic light control systems are used to ensure the safety of vehicles and pedestrians, increase the fluency in traffic, guide them in transportation, warn pedestrians and drivers, and regulate and control transportation disruptions. In order to facilitate people's lives, it is desired to control the traffic components autonomously with the developments in autonomous systems. Cyber threats arise due to the active use of the internet and signals or frequencies in the use of modules that will provide communication with traffic lights, traffic signs, and vehicles, which are traffic components at the inter-sections of many roads in the control of central systems. The study is limited to smart traffic lights, which are traffic components. If we examine the cyber-attacks, we can see that Malware Attacks, Buffer Overflow Attacks, DoS attacks, and Jamming Attacks can be made. Network-Based Intrusion Detection Systems and Host-Based Intrusion Detection Systems can be used to detect and stop Malware Attacks, Buffer Overflow Attacks, DoS attacks, and Jamming Attacks. Intrusion detection systems tell us whether the data poses a threat or does not pose after the data passing through the system is examined. In this way, system protection is ensured by controlling the data traffic in the system.