Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data
@article{Feng2018VulnerabilityOT, title={Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data}, author={Yiheng Feng and Shihong Ed Huang and Qi Alfred Chen and Henry X. Liu and Z. Morley Mao}, journal={Transportation Research Record}, year={2018}, volume={2672}, pages={1 - 11} }
Existing traffic control systems are mostly deployed in private wired networks. With the development of wireless technology, vehicles and infrastructure devices will be connected through wireless communications, which might open a new door for cyberattackers. It is still not clear what types of cyberattacks can be performed through infrastructure-to-infrastructure and vehicle-to-infrastructure communications, whether such attacks can introduce critical failure to the system, and what the…
34 Citations
Influence of cyber-attacks on longitudinal safety of connected and automated vehicles.
- Computer ScienceAccident; analysis and prevention
- 2018
Resilience-by-design in Adaptive Multi-Agent Traffic Control Systems
- Computer Science
- 2020
This paper performs the first detailed security analysis and implementation of a new cyber-physical attack category carried out by the network of CAVs against Adaptive Multi-Agent Traffic Signal Control (AMATSC), namely, coordinated Sybil attacks.
Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers
- Computer ScienceAutoSec@CODASPY
- 2020
This paper looks into vulnerabilities in model-based traffic controllers and shows that, even with state-of-the-art attack detectors in place, false-data injection can be used to hamper mobility.
Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms
- Computer Science2018 IEEE Vehicular Networking Conference (VNC)
- 2018
This study compares the performance of different backpressure-based scheduling algorithms when they are under attack and shows that while the delay-based scheme has better fairness performance, it is more vulnerable to time spoofing attacks than the other schemes.
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems
- Computer ScienceNOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium
- 2020
This paper devise a security game model that allows the defense mechanism deployed in the ITS to optimize the distribution of available resources for attack detection while considering mixed attack strategies, according to which the attacker targets multiple RSUs in a distributed fashion.
Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles
- Computer Science
- 2020
It is found that remote control, fake vision on cameras, hidden objects to LiDAR and Radar, spoofing attack to GNSS, and fake identity in cloud authority are the most dangerous and of the highest vulnerabilities in CAV cyber security.
An Innovative Attack Modelling and Attack Detection Approach for a Waiting Time-based Adaptive Traffic Signal Controller
- Computer ScienceArXiv
- 2021
An innovative"slow poisoning"cyberattack for a waiting time based ATSC algorithm and a corresponding detection strategy using a recurrent neural network -- i.e., long short-term memory model is introduced.
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols
- Computer ScienceUSENIX Security Symposium
- 2021
This paper designs CVAnalyzer, a system for discovering design-level flaws for availability violations of the CV network stack, as well as quantifying the corresponding security/safety consequences, and successfully uncovered 4 new DoS vulnerabilities of the latest CV network protocols.
Applying a Verified Trusted Computing Base to Cyber Protect a Vulnerable Traffic Control Cyber-Physical System
- Computer Science2020 SoutheastCon
- 2020
This research defines the requirements of a traffic control system, establishes a security policy, develops a trusted computing base, identifies and designs attacks on the system, and meets the development life-cycle requirements to proceed with implementation, verification, and testing.
Evaluating the Dedicated Short-range Communication for Connected Vehicles against Network Security Attacks
- Computer ScienceVEHITS
- 2020
The results show that DSRC is vulnerable to three real-world network security attacks and such attacks can be easily implemented by adversaries without significant resources.
References
SHOWING 1-10 OF 23 REFERENCES
Vulnerability of Transportation Networks to Traffic-Signal Tampering
- Computer Science2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)
- 2016
It is proved that finding an attack that maximally impacts congestion is NP-hard, and a polynomial-time heuristic algorithm for computing approximately optimal attacks is exhibited, which is extremely efficient in practice.
Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming
- Computer Science, Mathematics2013 International Conference on Computing, Networking and Communications (ICNC)
- 2013
This article proposes a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model, and poses the problem of detecting spoofing cyber-attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem.
Vulnerability of fixed-time control of signalized intersections to cyber-tampering
- Computer Science2016 Resilience Week (RWS)
- 2016
This paper studies the vulnerability of fixed-time control of signalized intersections when sensors measuring traffic flow information are compromised and perturbed by an adversary.
Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security
- Computer Science
- 2016
Green Lights Forever: Analyzing the Security of Traffic Infrastructure
- Computer ScienceWOOT
- 2014
This work investigates a networked traffic signal system currently deployed in the United States and discovers a number of security flaws that exist due to systemic failures by the designers, and leverages these flaws to create attacks which gain control of the system.
Floating Car Data from Smartphones : What Google and Waze Know About You and How Hackers Can Control Traffic
- Computer Science
- 2013
This paper tackles the question to which extent it is possible for Google and Waze to track the smartphone and its owner and presents a practical protocol preventing such attacks and at the same time preserving the user’s privacy.
THE CELL TRANSMISSION MODEL: A DYNAMIC REPRESENTATION OF HIGHWAY TRAFFIC CONSISTENT WITH THE HYDRODYNAMIC THEORY
- Mathematics
- 1994