Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data

@article{Feng2018VulnerabilityOT,
  title={Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data},
  author={Yiheng Feng and Shihong Ed Huang and Qi Alfred Chen and Henry X. Liu and Z. Morley Mao},
  journal={Transportation Research Record},
  year={2018},
  volume={2672},
  pages={1 - 11}
}
Existing traffic control systems are mostly deployed in private wired networks. With the development of wireless technology, vehicles and infrastructure devices will be connected through wireless communications, which might open a new door for cyberattackers. It is still not clear what types of cyberattacks can be performed through infrastructure-to-infrastructure and vehicle-to-infrastructure communications, whether such attacks can introduce critical failure to the system, and what the… 

Figures from this paper

Resilience-by-design in Adaptive Multi-Agent Traffic Control Systems
TLDR
This paper performs the first detailed security analysis and implementation of a new cyber-physical attack category carried out by the network of CAVs against Adaptive Multi-Agent Traffic Signal Control (AMATSC), namely, coordinated Sybil attacks.
Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers
TLDR
This paper looks into vulnerabilities in model-based traffic controllers and shows that, even with state-of-the-art attack detectors in place, false-data injection can be used to hamper mobility.
Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms
TLDR
This study compares the performance of different backpressure-based scheduling algorithms when they are under attack and shows that while the delay-based scheme has better fairness performance, it is more vulnerable to time spoofing attacks than the other schemes.
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems
TLDR
This paper devise a security game model that allows the defense mechanism deployed in the ITS to optimize the distribution of available resources for attack detection while considering mixed attack strategies, according to which the attacker targets multiple RSUs in a distributed fashion.
Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles
TLDR
It is found that remote control, fake vision on cameras, hidden objects to LiDAR and Radar, spoofing attack to GNSS, and fake identity in cloud authority are the most dangerous and of the highest vulnerabilities in CAV cyber security.
An Innovative Attack Modelling and Attack Detection Approach for a Waiting Time-based Adaptive Traffic Signal Controller
TLDR
An innovative"slow poisoning"cyberattack for a waiting time based ATSC algorithm and a corresponding detection strategy using a recurrent neural network -- i.e., long short-term memory model is introduced.
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols
TLDR
This paper designs CVAnalyzer, a system for discovering design-level flaws for availability violations of the CV network stack, as well as quantifying the corresponding security/safety consequences, and successfully uncovered 4 new DoS vulnerabilities of the latest CV network protocols.
Applying a Verified Trusted Computing Base to Cyber Protect a Vulnerable Traffic Control Cyber-Physical System
TLDR
This research defines the requirements of a traffic control system, establishes a security policy, develops a trusted computing base, identifies and designs attacks on the system, and meets the development life-cycle requirements to proceed with implementation, verification, and testing.
Evaluating the Dedicated Short-range Communication for Connected Vehicles against Network Security Attacks
TLDR
The results show that DSRC is vulnerable to three real-world network security attacks and such attacks can be easily implemented by adversaries without significant resources.
...
...

References

SHOWING 1-10 OF 23 REFERENCES
Vulnerability of Transportation Networks to Traffic-Signal Tampering
TLDR
It is proved that finding an attack that maximally impacts congestion is NP-hard, and a polynomial-time heuristic algorithm for computing approximately optimal attacks is exhibited, which is extremely efficient in practice.
Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming
  • E. Canepa, A. Bayen, C. Claudel
  • Computer Science, Mathematics
    2013 International Conference on Computing, Networking and Communications (ICNC)
  • 2013
TLDR
This article proposes a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model, and poses the problem of detecting spoofing cyber-attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem.
Vulnerability of fixed-time control of signalized intersections to cyber-tampering
TLDR
This paper studies the vulnerability of fixed-time control of signalized intersections when sensors measuring traffic flow information are compromised and perturbed by an adversary.
Green Lights Forever: Analyzing the Security of Traffic Infrastructure
TLDR
This work investigates a networked traffic signal system currently deployed in the United States and discovers a number of security flaws that exist due to systemic failures by the designers, and leverages these flaws to create attacks which gain control of the system.
Floating Car Data from Smartphones : What Google and Waze Know About You and How Hackers Can Control Traffic
TLDR
This paper tackles the question to which extent it is possible for Google and Waze to track the smartphone and its owner and presents a practical protocol preventing such attacks and at the same time preserving the user’s privacy.
THE CELL TRANSMISSION MODEL, PART II: NETWORK TRAFFIC
...
...