Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Assessing and mitigating cybersecurity risks of traffic light systems in smart cities

Intelligent traffic lights are critical cyber-physical systems that help smart cities to cut road congestion and vehicle emissions. However, they also open a new frontier of cybersecurity. Security researchers have demonstrated ways to compromise the traffic lights to cause potential traffic disruption and public safety degradation. This study aims to raise the public awareness of the cybersecurity issues in traffic light systems. The authors present a bi-level game-theoretic framework for assessing cybersecurity risks of traffic light systems, as the first step towards understanding and mitigating the security vulnerabilities. Additionally, they propose a minimax-regret-based methodology to guide the deployment of defensive measures in traffic light systems against cyberattacks.

References

    1. 1)
      • 19. Department of Homeland Security: ‘National infrastructure protection plan’, available at: www.dhs.gov/sites/default/files/publications/NIPP%202013_Partnering%20for%20Critical%20Infrastructure%20Security%20and%20Resilience_508_0.pdf.
    2. 2)
    3. 3)
      • 20. Goodspeed, T.: ‘Reversing the Econolite ASC/3 traffic light controller’. ToorCon Seattle, 2008.
    4. 4)
      • 17. Davis, L.: ‘Handbook of genetic algorithms’ (Van Nostrand Reinhold, New York, 1991), vol. 115.
    5. 5)
    6. 6)
      • 7. Park, B., Chen, Y.: ‘Quantifying the benefits of coordinated actuated traffic signal systems: a case study’. Technical Report VTRC 11-CR2, Virginia Research Transportation Council, Charlottesville, VA, July, 2010.
    7. 7)
    8. 8)
      • 11. Dept. of Homeland Security, Advisory (ICSA-10-214-01), Wind River VxWorks Vulnerabilities, ICS-CERT, 2 August 2010.
    9. 9)
      • 12. National Transportation Communications for ITS Protocol. 1202. NTCIP object definitions for ASC, 2007.
    10. 10)
      • 8. American Public Transportation Association (APTA) Published Standards, http://www.apta.com/resources/standards/Pages/default.aspx.
    11. 11)
      • 1. Cerrudo, C.: ‘Hacking US traffic control systems’, available at: https://www.defcon.org/images/defcon-22.
    12. 12)
      • 14. IEEE 802.15.4 PHY Standard for information technology, telecommunications and information exchange between systems, October 2003.
    13. 13)
      • 15. Sensys Networks Inc.: ‘Advantages of the Sensys™ wireless vehicle detection system’, 2007, available at: http://www.sensysnetwork-s.com/white-papers/.
    14. 14)
      • 18. Komanduri, S.: ‘Of passwords and people: measuring the effect of password-composition policies’. Proc. SIGCHI Conf. Human Factors in Computing Systems, 2011.
    15. 15)
      • 23. Laszka, A., Potteiger, B., Vorobeychik, Y., et al: ‘Vulnerability of transportation networks to traffic-signal tampering’. 2016 ACM/IEEE Seventh Int. Conf. Cyber-Physical Systems (ICCPS), 2016, pp. 110.
    16. 16)
      • 13. Dobersek, M.: ‘An operational comparison of pre-time, semi-actuated, and fully actuated interconnected traffic control signal systems’, 1998. available at: http://epublications.marquette.edu/dissertations/AAI9912724.
    17. 17)
      • 9. Minnesota Department of Transportation: ‘Traffic signals 101 – controller operations’, available at: http://www.dot.state.mn.us/trafficeng/p-ubl/signals101/2014/06_Controller_Ops.pdf.
    18. 18)
      • 21. Reilly, J., Martin, S., Payer, M., et al: ‘On cybersecurity off reeway control systems: analysis of coordinated ramp metering attacks’, Transportation Research Board 94th Annual Meeting, 11-Jan 2015.
    19. 19)
      • 3. Laszka, A., Potteiger, B., Vorobeychik, Y., et al: ‘Vulnerability of transportation networks to traffic-signal tampering’. Seventh ACM/IEEE Int. Conf. Cyber-Physical Systems (ICCPS), April 2016.
    20. 20)
      • 10. Heimann, K., Chu, H:Traffic control system failure monitoring’. U.S. Patent 5327123 A, 5 July 1994.
    21. 21)
      • 2. Ghena, B., Beyer, W., Hillaker, A., et al: ‘Green lights forever: analyzing the security of traffic infrastructure’. Proc. Eighth USENIX Conf. Offensive Technologies, 2014.
    22. 22)
      • 6. Li, Z., Shahidehpour, M., Khodaei, A., et al: ‘Optimizing signal settings of traffic lights in smart cities’, IEEE Trans. Smart Grid, doi: 10.1109/TSG.2016.2526032.
    23. 23)
      • 16. NYC Analytics: ‘911 performance reporting: 911 end to end detail’, available at: http://www.nyc.gov/html/911reporting.
    24. 24)
      • 24. Jenelius, E.: ‘Large-scale road network vulnerability analysis’. PhD thesis, KTH, 2010.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2016.0017
Loading

Related content

content/journals/10.1049/iet-cps.2016.0017
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address