Loading…
Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data
Existing traffic control systems are mostly deployed in private wired networks. With the development of wireless technology, vehicles and infrastructure devices will be connected through wireless communications, which might open a new door for cyberattackers. It is still not clear what types of cybe...
Saved in:
Published in: | Transportation research record 2018-12, Vol.2672 (1), p.1-11 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Existing traffic control systems are mostly deployed in private wired networks. With the development of wireless technology, vehicles and infrastructure devices will be connected through wireless communications, which might open a new door for cyberattackers. It is still not clear what types of cyberattacks can be performed through infrastructure-to-infrastructure and vehicle-to-infrastructure communications, whether such attacks can introduce critical failure to the system, and what the impacts are of cyberattacks on traffic operations. This paper investigates the vulnerability of traffic control systems in a connected environment. Four typical elements, including signal controllers, vehicle detectors, roadside units, and onboard units, are identified as the attack surfaces. The paper mainly focuses on attacking actuated and adaptive signal control systems by sending falsified data, which is considered as an indirect but realistic attack approach. The objective of an attacker is to maximize system delay with constraints such as budget and attack intensity. Empirical results show that different attack scenarios result in significant differences in delay, and some ineffective attacks may even improve the system performance. Simulation results from a real-world corridor show that critical intersections, which have a higher impact on network performance, can be identified by analyzing the attack locations. Identification of such intersections can be helpful in designing a more resilient transportation network. |
---|---|
ISSN: | 0361-1981 2169-4052 |
DOI: | 10.1177/0361198118756885 |