Cybersecurity of Traffic Management Systems
With over 400,000 traffic signals deployed throughout the United States, traffic signal operations have a profound impact on the safety and efficiency of traffic flow for all road users. Recent threats in cybersecurity have made our industry more aware of potential damage that such threats can cause. Multiple researchers have found that our existing traffic signal systems, if not protected properly, can be easily hacked. For example, sometimes systems are used without any encryption for communication between a central traffic control management system and field traffic signal control units, allowing an attacker to directly change traffic signal indications. Another example involves wireless detectors that could be manipulated to feed traffic control systems with fake data and trigger incorrect options in their operations. Connected vehicle technologies and applications have significant security requirements, not only for the applications themselves, but also as potential access points that could enable attackers to get inside an agency’s broader network and operations. Safety-critical messaging between vehicles and infrastructure (and vice versa) needs to be trusted as being from a valid source and not spoofed by a hacker or malevolent agency. These cybersecurity requirements and technologies exceed the experience levels of most current DOT and local agency staff responsible for intelligent transportation equipment. Agencies need to understand the implications of these technologies on the design of their communications networks, networking equipment configuration, field device security, and operations best practices. It is still not clear whether these vulnerabilities can create a critical fault in the system operations, or primarily cause an inconvenience that will jam traffic for a few hours. Even such an “inconvenience” will result in increased crash risk for road users as the systems will be performing with non-optimal settings. It is not easy for agencies to detect potentially malicious actions (e.g., fake updating of firmware) and prevent them. Furthermore, this task is complicated by a variety of stakeholders with diverse skill sets and goals, including manufacturers and vendors of system hardware, software and control units; transportation management center staff; traffic engineers; and IT specialists with an increasing variety of specialties (e.g., fiber optics, wireless communications, database experts, software integrators, etc.). It is necessary to research potential cybersecurity threats on traffic management systems and recommend actions that agencies should follow to protect those systems and properly react in the cases of emergency. The objective of the research was to develop guidance for state and local transportation agencies on mitigating the risks from cyber-attacks on the field side of traffic management systems (including traffic signal systems, intelligent transportation systems, vehicle-to-infrastructure systems (V2I), and closed-circuit television systems) and, secondarily, on informing the agency’s response to an attack. The guidance will address the vulnerability of field devices (e.g., traffic signal controllers and cabinets, dynamic message signs, V2I roadside units, weigh-in-motion systems, road-weather information systems, remote processing and sensing units, and other IP-addressable devices), field communications networks, and field-to-center communications. It will not address vulnerabilities within a traffic management center, within center-to-center communications, or due to insider risk (accidental or intentional).
Language
- English
Project
- Status: Completed
- Funding: $750000
-
Contract Numbers:
Project 03-127
-
Sponsor Organizations:
National Cooperative Highway Research Program
Transportation Research Board
500 Fifth Street, NW
Washington, DC United States 20001American Association of State Highway and Transportation Officials (AASHTO)
444 North Capitol Street, NW
Washington, DC United States 20001Federal Highway Administration
1200 New Jersey Avenue, SE
Washington, DC United States 20590 -
Project Managers:
Derr, B
-
Performing Organizations:
Southwest Research Institute
6220 Culebra Road, P.O. Drawer 28510
San Antonio, TX United States 78228-0510 -
Principal Investigators:
Abbott, Ben
- Start Date: 20170816
- Expected Completion Date: 20191015
- Actual Completion Date: 20191015
- Source Data: RiP Project 41302
Subject/Index Terms
- TRT Terms: Computer security; Highway safety; Intelligent transportation systems; Intelligent vehicles; Mobile communication systems; Risk assessment; Traffic signal control systems; Vehicle to infrastructure communications
- Subject Areas: Highways; Operations and Traffic Management; Safety and Human Factors; Security and Emergencies;
Filing Info
- Accession Number: 01618809
- Record Type: Research project
- Source Agency: Transportation Research Board
- Contract Numbers: Project 03-127
- Files: TRB, RIP
- Created Date: Dec 16 2016 1:00AM