Vulnerability of Transportation Networks to Traffic-Signal Tampering

Traffic signals were originally standalone hardware devices running on fixed schedules, but by now, they have evolved into complex networked systems. As a consequence, traffic signals have become susceptible to attacks through wireless interfaces or even remote attacks through the Internet. Indeed,...

সম্পূর্ণ বিবরণ

গ্রন্থ-পঞ্জীর বিবরন
প্রধান লেখক: Laszka, Aron, Potteiger, Bradley, Vorobeychik, Yevgeniy, Amin, Saurabh, Koutsoukos, Xenofon
অন্যান্য লেখক: Massachusetts Institute of Technology. Department of Civil and Environmental Engineering
বিন্যাস: প্রবন্ধ
ভাষা:en_US
প্রকাশিত: Institute of Electrical and Electronics Engineers (IEEE) 2017
অনলাইন ব্যবহার করুন:http://hdl.handle.net/1721.1/110202
https://orcid.org/0000-0003-1554-015X
_version_ 1826213165595099136
author Laszka, Aron
Potteiger, Bradley
Vorobeychik, Yevgeniy
Amin, Saurabh
Koutsoukos, Xenofon
author2 Massachusetts Institute of Technology. Department of Civil and Environmental Engineering
author_facet Massachusetts Institute of Technology. Department of Civil and Environmental Engineering
Laszka, Aron
Potteiger, Bradley
Vorobeychik, Yevgeniy
Amin, Saurabh
Koutsoukos, Xenofon
author_sort Laszka, Aron
collection MIT
description Traffic signals were originally standalone hardware devices running on fixed schedules, but by now, they have evolved into complex networked systems. As a consequence, traffic signals have become susceptible to attacks through wireless interfaces or even remote attacks through the Internet. Indeed, recent studies have shown that many traffic lights deployed in practice have easily exploitable vulnerabilities, which allow an attacker to tamper with the configuration of the signal. Due to hardware-based failsafes, these vulnerabilities cannot be used to cause accidents. However, they may be used to cause disastrous traffic congestions. Building on Daganzo's well- known traffic model, we introduce an approach for evaluating vulnerabilities of transportation networks, identifying traffic signals that have the greatest impact on congestion and which, therefore, make natural targets for attacks. While we prove that finding an attack that maximally impacts congestion is NP-hard, we also exhibit a polynomial-time heuristic algorithm for computing approximately optimal attacks. We then use numerical experiments to show that our algorithm is extremely efficient in practice. Finally, we also evaluate our approach using the SUMO traffic simulator with a real-world transportation network, demonstrating vulnerabilities of this network. These simulation results extend the numerical experiments by showing that our algorithm is extremely efficient in a microsimulation model as well.
first_indexed 2024-09-23T15:44:22Z
format Article
id mit-1721.1/110202
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T15:44:22Z
publishDate 2017
publisher Institute of Electrical and Electronics Engineers (IEEE)
record_format dspace
spelling mit-1721.1/1102022022-10-02T03:48:49Z Vulnerability of Transportation Networks to Traffic-Signal Tampering Laszka, Aron Potteiger, Bradley Vorobeychik, Yevgeniy Amin, Saurabh Koutsoukos, Xenofon Massachusetts Institute of Technology. Department of Civil and Environmental Engineering Amin, Saurabh Traffic signals were originally standalone hardware devices running on fixed schedules, but by now, they have evolved into complex networked systems. As a consequence, traffic signals have become susceptible to attacks through wireless interfaces or even remote attacks through the Internet. Indeed, recent studies have shown that many traffic lights deployed in practice have easily exploitable vulnerabilities, which allow an attacker to tamper with the configuration of the signal. Due to hardware-based failsafes, these vulnerabilities cannot be used to cause accidents. However, they may be used to cause disastrous traffic congestions. Building on Daganzo's well- known traffic model, we introduce an approach for evaluating vulnerabilities of transportation networks, identifying traffic signals that have the greatest impact on congestion and which, therefore, make natural targets for attacks. While we prove that finding an attack that maximally impacts congestion is NP-hard, we also exhibit a polynomial-time heuristic algorithm for computing approximately optimal attacks. We then use numerical experiments to show that our algorithm is extremely efficient in practice. Finally, we also evaluate our approach using the SUMO traffic simulator with a real-world transportation network, demonstrating vulnerabilities of this network. These simulation results extend the numerical experiments by showing that our algorithm is extremely efficient in a microsimulation model as well. National Science Foundation (U.S.) (Award CNS-1238959) National Science Foundation (U.S.) (Award CNS-1238962) National Science Foundation (U.S.) (Award CNS- 1239054) National Science Foundation (U.S.) (Award CNS-1239166) United States. Air Force. Research Laboratory (Award FA8750-14-2-0180) Sandia National Laboratories 2017-06-23T13:54:21Z 2017-06-23T13:54:21Z 2016-05 2016-04 Article http://purl.org/eprint/type/ConferencePaper 978-1-5090-1772-0 http://hdl.handle.net/1721.1/110202 Laszka, Aron et al. “Vulnerability of Transportation Networks to Traffic-Signal Tampering.” 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS),11-14 April, Vienna, Austria, 2016, IEEE, 2016. https://orcid.org/0000-0003-1554-015X en_US http://dx.doi.org/10.1109/ICCPS.2016.7479122 Procceedings of the 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) Creative Commons Attribution-Noncommercial-Share Alike http://creativecommons.org/licenses/by-nc-sa/4.0/ application/pdf Institute of Electrical and Electronics Engineers (IEEE) Other repository
spellingShingle Laszka, Aron
Potteiger, Bradley
Vorobeychik, Yevgeniy
Amin, Saurabh
Koutsoukos, Xenofon
Vulnerability of Transportation Networks to Traffic-Signal Tampering
title Vulnerability of Transportation Networks to Traffic-Signal Tampering
title_full Vulnerability of Transportation Networks to Traffic-Signal Tampering
title_fullStr Vulnerability of Transportation Networks to Traffic-Signal Tampering
title_full_unstemmed Vulnerability of Transportation Networks to Traffic-Signal Tampering
title_short Vulnerability of Transportation Networks to Traffic-Signal Tampering
title_sort vulnerability of transportation networks to traffic signal tampering
url http://hdl.handle.net/1721.1/110202
https://orcid.org/0000-0003-1554-015X
work_keys_str_mv AT laszkaaron vulnerabilityoftransportationnetworkstotrafficsignaltampering
AT potteigerbradley vulnerabilityoftransportationnetworkstotrafficsignaltampering
AT vorobeychikyevgeniy vulnerabilityoftransportationnetworkstotrafficsignaltampering
AT aminsaurabh vulnerabilityoftransportationnetworkstotrafficsignaltampering
AT koutsoukosxenofon vulnerabilityoftransportationnetworkstotrafficsignaltampering