Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers

03/09/2020
by   Pratham Oza, et al.
0

Rapid urbanization calls for smart traffic management solutions that incorporate sensors, distributed traffic controllers and V2X communication technologies to provide fine-grained traffic control to mitigate congestion. As in many other cyber-physical systems, smart traffic management systems typically lack security measures. This allows numerous opportunities for adversarial entities to craft attacks on the sensor networks, wireless data sharing and/or the distributed traffic controllers. We show that such vulnerabilities can be exploited to disrupt mobility in a large urban area and cause unsafe conditions for drivers and the pedestrians on the roads. Specifically, in this paper, we look into vulnerabilities in model-based traffic controllers and show that, even with state-of-the-art attack detectors in place, false-data injection can be used to hamper mobility. We demonstrate a replay attack by modeling an isolated intersection in VISSIM, a popular traffic simulator and also discuss countermeasures to thwart such attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/04/2021

An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems

Increased dependence on networked, software based control has escalated ...
research
12/04/2020

A Minimax Game for Resilient-by-design Adaptive Traffic Control Systems

Connected and Autonomous Vehicles (CAVs) with their evolving data gather...
research
08/25/2018

Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game

In recent years, state-of-the-art traffic-control devices have evolved f...
research
10/17/2022

Development of a hardware-In-the-Loop (HIL) testbed for cyber-physical security in smart buildings

As smart buildings move towards open communication technologies, providi...
research
09/02/2019

Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting

While data from Supervisory Control And Data Acquisition (SCADA) systems...
research
01/28/2023

Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing

Recent advancements in 3D-printing/additive manufacturing has brought fo...
research
08/31/2022

Protecting Critical Inter-Domain Communication through Flyover Reservations

To protect against naturally occurring or adversely induced congestion i...

Please sign up or login with your details

Forgot password? Click here to reset