Smart City Gnosys

Smart city article details

Title Explaining Cyber Risks In Transportaion 5.0: A Data Driven Approach
ID_Doc 25378
Authors Tandan B.; Vajpayee P.; Hossain G.
Year 2025
Published 2025 IEEE 4th International Conference on AI in Cybersecurity, ICAIC 2025
DOI http://dx.doi.org/10.1109/ICAIC63015.2025.10848812
Abstract The primary objective of the research is to explore the cybersecurity risks associated with AI-enabled intelligent transportation systems (Transportation 5.0) within the context of developing future smart cities. In Transpiration 5.0, the critical infrastructure increasingly relies on automated systems, which enhances the threat of ransomware attacks, specifically targeting vital cyber-physical systems (CPS), smart grids, and intelligent transportation systems (ITS). The paper explores transportation ransomware attack data to incorporate advanced visualization and extract relevant data attributes for cyber risk evaluation. The study uses the NIST risk management framework and ISACA risk quantification to develop a cyber risk evaluation method. With the findings of the literature review, the research highlights ransomware as a significant threat to intelligent transportation systems (ITS), given the negative impact of malware on IoT, IIoT, and network-connected devices. While substantial research exists on malware detection techniques, performance, accuracy, and cloud-based strategies, it's crucial for organizations to comprehend the risks of ransomware attacks to implement effective security controls and enable cyber excellence. The research executes exploratory data analysis on the given dataset to find out the correlation between different attributes such as severity, data loss, affected systems, and ransom amount for evolving a risk method to evaluate cyber risk. The focus is to simplify the risk evaluation process by fitting the right data attributes into a standard risk management framework and risk formula for broader reusability. The method was applied to different transportation modes to calculate the risk scores respectively and generate insights accordingly. The overall analysis supports that effective risk predictions along with consistent monitoring can help to control ransomware attack incidents and improve cyber resiliency. This paper proposes a data-driven approach for cyber risk assessment in transportation, applicable to other cyber-attacks. However, it highlights the need of synthetic data integration for a generic solution. © 2025 IEEE.
Author Keywords Cyber Risk Evaluation; Data Visualization; Intelligent Transportation Systems; IoT Security; Ransomware


Similar Articles


Id Similarity Authors Title Published
16937 View0.886Maranco M.; Sivakumar M.; Krishnaraj N.; Savaridassan P.; Abhiram-Ivaturi K.; Logeshwari R.Cyber Security For Intelligent Transportation Systems Protecting Critical InfrastructureUrban Mobility and Challenges of Intelligent Transportation Systems (2025)
1230 View0.869Weaver G.A.A Data Processing Pipeline For Cyber-Physical Risk Assessments Of Municipal Supply ChainsProceedings - Winter Simulation Conference, 2021-December (2021)
10846 View0.864Maheshwari R.U.; Shankar P.R.; Chandrasekaran G.; Mahendrakhan K.Assessment Of Cybersecurity Risks In Digital Twin Deployments In Smart CitiesInternational Journal of Computational and Experimental Science and Engineering, 10, 4 (2024)
16938 View0.864Qamar R.; Siraj S.; Zardari B.A.Cyber Security For Smart Transportation SystemLecture Notes in Intelligent Transportation and Infrastructure, Part F64 (2025)
6993 View0.859Alhamdi M.J.M.; Lopez-Guede J.M.; AlQaryouti J.; Rahebi J.; Zulueta E.; Fernandez-Gamiz U.Ai-Based Malware Detection In Iot Networks Within Smart Cities: A SurveyComputer Communications, 233 (2025)
5477 View0.854Wright M.; Chizari H.; Viana T.A Systematic Review Of Smart City Infrastructure Threat Modelling Methodologies: A Bayesian Focused ReviewSustainability (Switzerland), 14, 16 (2022)
17038 View0.852Lawelai H.; Purnomo E.P.; Nurmandi A.; Jovita H.; Baulete E.M.Cybersecurity Policy On Smart City Infrastructure: A Mapping Of New Threats And ProtectionsJournal of Science and Technology Policy Management (2025)