2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) 2016
DOI: 10.1109/iccps.2016.7479122
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability of Transportation Networks to Traffic-Signal Tampering

Abstract: Traffic signals were originally standalone hardware devices running on fixed schedules, but by now, they have evolved into complex networked systems. As a consequence, traffic signals have become susceptible to attacks through wireless interfaces or even remote attacks through the Internet. Indeed, recent studies have shown that many traffic lights deployed in practice have easily exploitable vulnerabilities, which allow an attacker to tamper with the configuration of the signal. Due to hardware-based failsafe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 54 publications
(48 citation statements)
references
References 14 publications
0
47
0
1
Order By: Relevance
“…Prior to our study, very few studies explored the security problems in the traffic control algorithms. Laszka et al performed a theoretical analysis to estimate the potential congestion an attacker can create assuming that she can arbitrarily compromise multiple signal controllers [30]. A follow-up study was then performed for the same attack goal but with a weak assumption, in which the attacker can only compromise the sensors that collects traffic flow information [26].…”
Section: Related Workmentioning
confidence: 99%
“…Prior to our study, very few studies explored the security problems in the traffic control algorithms. Laszka et al performed a theoretical analysis to estimate the potential congestion an attacker can create assuming that she can arbitrarily compromise multiple signal controllers [30]. A follow-up study was then performed for the same attack goal but with a weak assumption, in which the attacker can only compromise the sensors that collects traffic flow information [26].…”
Section: Related Workmentioning
confidence: 99%
“…2) Transportation Network: We use the Grid model with Random Edges (GRE) to generate a random network topology [10], which closely resembles real-world transportation networks. 6 For a detailed description of this model, we refer the reader to [10], [11]. We use Daganzo's cell transmission model to simulate traffic flowing through the generated network [8], computing the turn decisions of the vehicles based on a linear program that minimizes total travel time [12].…”
Section: Numerical Resultsmentioning
confidence: 99%
“…https://www.epa.gov/water-research/epanet4 We set these to zero to model existing deployment since we are interested in how to invest in improving security and resilience 5. We set this to zero so that there always exists a feasible deployment 6. We instantiated the model with W = 5, L = 5, p = 0.507, and q = 0.2761 based on[10].…”
mentioning
confidence: 99%
“…Specific examples that have been already developed include: (1) Resilient observation selection where a Gaussian process regression model is used to determine sensor locations that are resilient to DoS attacks [4] and (2) resilient traffic signal configuration to minimize the congestion impact of tampering attacks [5]. Fig.…”
Section: Discussionmentioning
confidence: 99%