http://iet.metastore.ingenta.com
1887

access icon openaccess Assessing and mitigating cybersecurity risks of traffic light systems in smart cities

  • PDF
    873.1025390625Kb
  • XML
    97.099609375Kb
  • HTML
    112.1416015625Kb
Loading full text...

Full text loading...

/deliver/fulltext/iet-cps/1/1/IET-CPS.2016.0017.html;jsessionid=2k04b9aj69nhk.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2016.0017&mimeType=html&fmt=ahah

References

    1. 1)
      • 1. Cerrudo, C.: ‘Hacking US traffic control systems’, available at: https://www.defcon.org/images/defcon-22.
    2. 2)
      • 2. Ghena, B., Beyer, W., Hillaker, A., et al: ‘Green lights forever: analyzing the security of traffic infrastructure’. Proc. Eighth USENIX Conf. Offensive Technologies, 2014.
    3. 3)
      • 3. Laszka, A., Potteiger, B., Vorobeychik, Y., et al: ‘Vulnerability of transportation networks to traffic-signal tampering’. Seventh ACM/IEEE Int. Conf. Cyber-Physical Systems (ICCPS), April 2016.
    4. 4)
    5. 5)
    6. 6)
      • 6. Li, Z., Shahidehpour, M., Khodaei, A., et al: ‘Optimizing signal settings of traffic lights in smart cities’, IEEE Trans. Smart Grid, doi: 10.1109/TSG.2016.2526032.
    7. 7)
      • 7. Park, B., Chen, Y.: ‘Quantifying the benefits of coordinated actuated traffic signal systems: a case study’. Technical Report VTRC 11-CR2, Virginia Research Transportation Council, Charlottesville, VA, July, 2010.
    8. 8)
      • 8. American Public Transportation Association (APTA) Published Standards, http://www.apta.com/resources/standards/Pages/default.aspx.
    9. 9)
      • 9. Minnesota Department of Transportation: ‘Traffic signals 101 – controller operations’, available at: http://www.dot.state.mn.us/trafficeng/p-ubl/signals101/2014/06_Controller_Ops.pdf.
    10. 10)
      • 10. Heimann, K., Chu, H:Traffic control system failure monitoring’. U.S. Patent 5327123 A, 5 July 1994.
    11. 11)
      • 11. Dept. of Homeland Security, Advisory (ICSA-10-214-01), Wind River VxWorks Vulnerabilities, ICS-CERT, 2 August 2010.
    12. 12)
      • 12. National Transportation Communications for ITS Protocol. 1202. NTCIP object definitions for ASC, 2007.
    13. 13)
      • 13. Dobersek, M.: ‘An operational comparison of pre-time, semi-actuated, and fully actuated interconnected traffic control signal systems’, 1998. available at: http://epublications.marquette.edu/dissertations/AAI9912724.
    14. 14)
      • 14. IEEE 802.15.4 PHY Standard for information technology, telecommunications and information exchange between systems, October 2003.
    15. 15)
      • 15. Sensys Networks Inc.: ‘Advantages of the Sensys™ wireless vehicle detection system’, 2007, available at: http://www.sensysnetwork-s.com/white-papers/.
    16. 16)
      • 16. NYC Analytics: ‘911 performance reporting: 911 end to end detail’, available at: http://www.nyc.gov/html/911reporting.
    17. 17)
      • 17. Davis, L.: ‘Handbook of genetic algorithms’ (Van Nostrand Reinhold, New York, 1991), vol. 115.
    18. 18)
      • 18. Komanduri, S.: ‘Of passwords and people: measuring the effect of password-composition policies’. Proc. SIGCHI Conf. Human Factors in Computing Systems, 2011.
    19. 19)
      • 19. Department of Homeland Security: ‘National infrastructure protection plan’, available at: www.dhs.gov/sites/default/files/publications/NIPP%202013_Partnering%20for%20Critical%20Infrastructure%20Security%20and%20Resilience_508_0.pdf.
    20. 20)
      • 20. Goodspeed, T.: ‘Reversing the Econolite ASC/3 traffic light controller’. ToorCon Seattle, 2008.
    21. 21)
      • 21. Reilly, J., Martin, S., Payer, M., et al: ‘On cybersecurity off reeway control systems: analysis of coordinated ramp metering attacks’, Transportation Research Board 94th Annual Meeting, 11-Jan 2015.
    22. 22)
    23. 23)
      • 23. Laszka, A., Potteiger, B., Vorobeychik, Y., et al: ‘Vulnerability of transportation networks to traffic-signal tampering’. 2016 ACM/IEEE Seventh Int. Conf. Cyber-Physical Systems (ICCPS), 2016, pp. 110.
    24. 24)
      • 24. Jenelius, E.: ‘Large-scale road network vulnerability analysis’. PhD thesis, KTH, 2010.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2016.0017
Loading

Related content

content/journals/10.1049/iet-cps.2016.0017
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address