This is an open access article published by the IET under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0/)
Intelligent traffic lights are critical cyber-physical systems that help smart cities to cut road congestion and vehicle emissions. However, they also open a new frontier of cybersecurity. Security researchers have demonstrated ways to compromise the traffic lights to cause potential traffic disruption and public safety degradation. This study aims to raise the public awareness of the cybersecurity issues in traffic light systems. The authors present a bi-level game-theoretic framework for assessing cybersecurity risks of traffic light systems, as the first step towards understanding and mitigating the security vulnerabilities. Additionally, they propose a minimax-regret-based methodology to guide the deployment of defensive measures in traffic light systems against cyberattacks.
References
-
-
1)
-
19. Department of Homeland Security: ‘National infrastructure protection plan’, .
-
2)
-
5. Dorigo, M., Birattari, M., Stutzle, T.: ‘Ant colony optimization’, IEEE Comput. Intell. Mag., 2006, 1, (4), pp. 28–39 (doi: 10.1109/MCI.2006.329691).
-
3)
-
20. Goodspeed, T.: ‘Reversing the Econolite ASC/3 traffic light controller’. ToorCon Seattle, 2008.
-
4)
-
17. Davis, L.: ‘Handbook of genetic algorithms’ (Van Nostrand Reinhold, New York, 1991), vol. 115.
-
5)
-
6. Dijkstra, E.W.: ‘A note on two problems in connexion with graphs’, Numer. Math., 1959, 1, pp. 269–271 (doi: 10.1007/BF01386390).
-
6)
-
7. Park, B., Chen, Y.: ‘Quantifying the benefits of coordinated actuated traffic signal systems: a case study’. , Virginia Research Transportation Council, Charlottesville, VA, July, 2010.
-
7)
-
22. Alpcan, T., Buchegger, S.: ‘Security games for vehicular networks’, IEEE Trans. Mob. Comput., 2011, 10, (2), pp. 280–290 (doi: 10.1109/TMC.2010.146).
-
8)
-
9)
-
10)
-
11)
-
1. Cerrudo, C.: ‘Hacking US traffic control systems’, .
-
12)
-
13)
-
15. Sensys Networks Inc.: ‘Advantages of the Sensys™ wireless vehicle detection system’, 2007, .
-
14)
-
18. Komanduri, S.: ‘Of passwords and people: measuring the effect of password-composition policies’. Proc. SIGCHI Conf. Human Factors in Computing Systems, 2011.
-
15)
-
23. Laszka, A., Potteiger, B., Vorobeychik, Y., et al: ‘Vulnerability of transportation networks to traffic-signal tampering’. 2016 ACM/IEEE Seventh Int. Conf. Cyber-Physical Systems (ICCPS), 2016, pp. 1–10.
-
16)
-
13. Dobersek, M.: ‘An operational comparison of pre-time, semi-actuated, and fully actuated interconnected traffic control signal systems’, 1998. .
-
17)
-
9. Minnesota Department of Transportation: ‘Traffic signals 101 – controller operations’, .
-
18)
-
21. Reilly, J., Martin, S., Payer, M., et al: ‘On cybersecurity off reeway control systems: analysis of coordinated ramp metering attacks’, .
-
19)
-
3. Laszka, A., Potteiger, B., Vorobeychik, Y., et al: ‘Vulnerability of transportation networks to traffic-signal tampering’. Seventh ACM/IEEE Int. Conf. Cyber-Physical Systems (ICCPS), April 2016.
-
20)
-
10. Heimann, K., Chu, H: ‘Traffic control system failure monitoring’. , 5 July 1994.
-
21)
-
2. Ghena, B., Beyer, W., Hillaker, A., et al: ‘Green lights forever: analyzing the security of traffic infrastructure’. Proc. Eighth USENIX Conf. Offensive Technologies, 2014.
-
22)
-
6. Li, Z., Shahidehpour, M., Khodaei, A., et al: ‘Optimizing signal settings of traffic lights in smart cities’, IEEE Trans. Smart Grid, .
-
23)
-
16. NYC Analytics: ‘911 performance reporting: 911 end to end detail’, .
-
24)
-
24. Jenelius, E.: ‘Large-scale road network vulnerability analysis’. PhD thesis, KTH, 2010.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2016.0017
Related content
content/journals/10.1049/iet-cps.2016.0017
pub_keyword,iet_inspecKeyword,pub_concept
6
6