Cybersecurity of Traffic Management Systems

With over 400,000 traffic signals deployed throughout the United States, traffic signal operations have a profound impact on the safety and efficiency of traffic flow for all road users. Recent threats in cybersecurity have made our industry more aware of potential damage that such threats can cause. Multiple researchers have found that the existing traffic signal systems, if not protected properly, can be easily hacked. For example, sometimes systems are used without any encryption for communication between a central traffic control management system and field traffic signal control units, allowing an attacker to directly change traffic signal indications. Another example involves wireless detectors that could be manipulated to feed traffic control systems with fake data and trigger incorrect options in their operations. Connected vehicle technologies and applications have significant security requirements, not only for the applications themselves, but also as potential access points that could enable attackers to get inside an agency’s broader network and operations. Safety-critical messaging between vehicles and infrastructure (and vice versa) needs to be trusted as being from a valid source and not spoofed by a hacker or malevolent agency. These cybersecurity requirements and technologies exceed the experience levels of most current DOT and local agency staff responsible for intelligent transportation equipment. Agencies need to understand the implications of these technologies on the design of their communications networks, networking equipment configuration, field device security, and operations best practices. It is still not clear whether these vulnerabilities can create a critical fault in the system operations, or primarily cause an inconvenience that will jam traffic for a few hours. Even such an “inconvenience” will result in increased crash risk for road users as the systems will be performing with non-optimal settings. It is not easy for agencies to detect potentially malicious actions (e.g., fake updating of firmware) and prevent them. Furthermore, this task is complicated by a variety of stakeholders with diverse skill sets and goals, including manufacturers and vendors of system hardware, software and control units; transportation management center staff; traffic engineers; and IT specialists with an increasing variety of specialties (e.g., fiber optics, wireless communications, database experts, software integrators, etc.). It is necessary to research potential cybersecurity threats on traffic management systems and recommend actions that agencies should follow to protect those systems and properly react in the cases of emergency. The objective of the research is to develop guidance for state and local transportation agencies on mitigating the risks from cyber-attacks on the field side of traffic management systems (including traffic signal systems, intelligent transportation systems, vehicle-to-infrastructure systems (V2I), and closed-circuit television systems) and, secondarily, on informing the agency’s response to an attack. The guidance will address the vulnerability of field devices (e.g., traffic signal controllers and cabinets, dynamic message signs, V2I roadside units, weigh-in-motion systems, road-weather information systems, remote processing and sensing units, and other IP-addressable devices), field communications networks, and field-to-center communications. It will not address vulnerabilities within a traffic management center, within center-to-center communications, or due to insider risk (accidental or intentional). It is anticipated that the guidance will take the form of a web-based deliverable that uses a guided risk-based decision tree (similar to a capability maturity model) to identify the most relevant content for a user. The users will range from small, local agencies with limited risks and limited capabilities to those with substantial traffic management systems and more resources available to protect them. If a viable approach and host for the implementation and maintenance (including updating content and addressing emerging technologies) of this type of product is not found, a traditional NCHRP document will be produced. NCHRP has begun discussions with the National Operations Center of Excellence as a possible host but they should not be contacted by proposers regarding this effort.


  • English


  • Status: Active
  • Contract Numbers:

    Project 03-127

  • Sponsor Organizations:

    National Cooperative Highway Research Program

    Transportation Research Board
    500 Fifth Street, NW
    Washington, DC  United States  20001

    American Association of State Highway and Transportation Officials (AASHTO)

    444 North Capitol Street, NW
    Washington, DC  United States  20001

    Federal Highway Administration

    1200 New Jersey Avenue, SE
    Washington, DC  United States  20590
  • Project Managers:

    Derr, B

  • Performing Organizations:

    Southwest Research Institute

    6220 Culebra Road, P.O. Drawer 28510
    San Antonio, TX  United States  78228-0510
  • Principal Investigators:

    Zajac, Daniel

  • Start Date: 20170816
  • Expected Completion Date: 20190815
  • Actual Completion Date: 0
  • Source Data: RiP Project 41302

Subject/Index Terms

Filing Info

  • Accession Number: 01618809
  • Record Type: Research project
  • Source Agency: Transportation Research Board
  • Contract Numbers: Project 03-127
  • Files: TRB, RiP
  • Created Date: Dec 16 2016 1:00AM