Preprint / Version 1

The Risk Assessment of Cyber-Attacks Targeting Smart City Technologies

##article.authors##

  • Surya Geethan Devisree Arun Vasanthageethan Lake Norman High School

DOI:

https://doi.org/10.58445/rars.2141

Abstract

This paper talks about how the advancement of smart city technologies promises transformative improvements in urban management, encompassing transportation, energy, healthcare, and public safety. However, this digital integration also introduces significant cybersecurity risks. This paper comprehensively examines the vulnerabilities within smart city ecosystems, emphasizing the susceptibility of IoT devices, critical infrastructure interdependencies, and cloud computing systems. The study identifies key threat actors, including state-sponsored groups, cybercriminals, and insider threats, and explores their methodologies and attack vectors. The paper quantifies cyber-attack risks through a detailed risk assessment framework, including threat modeling, vulnerability analysis, and impact evaluation. Case studies, such as the 2018 Atlanta ransomware attack and traffic signal manipulation incidents, highlight the real-world implications of such threats. Finally, the research outlines mitigation strategies, including security-by-design principles, continuous monitoring, and public-private partnerships, offering a robust roadmap for enhancing the resilience of smart cities against cyber threats.

References

Antonakakis, M., et al. (2017). Understanding the Mirai Botnet. Proceedings of the 26th

USENIX Security Symposium

Lee, R. M., Assante, M. J., & Conway, T. (2016). Analysis of the Cyber Attack on the

Ukrainian Power Grid. SANS Industrial Control Systems.

Krebs, B. (2021). The SolarWinds Hack. Krebs on Security.

Rid, T. (2020). Active Measures: The Secret History of Disinformation and Political Warfare.

New York: Farrar, Straus & Giroux.

Cappelli, D. M., et al. (2012). The CERT Guide to Insider Threats: How to Prevent, Detect,

and Respond to Information Technology Crimes. Addison-Wesley.

Mell, P., Scarfone, K., & Romanosky, S. (2007). A Complete Guide to the Common

Vulnerability Scoring System (CVSS). NIST Special Publication.

Fruhlinger, J. (2018). Atlanta’s Cyberattack: A Ransomware Wake-Up Call. *CSO Online*.

Ghena, B., et al. (2014). Green Lights Forever: Analyzing the Security of Traffic Infrastructure.

Proceedings of the 8th USENIX Workshop on Offensive Technologies

Downloads

Posted

2025-01-05