Journal
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
Volume 23, Issue 9, Pages 16267-16279Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2022.3149449
Keywords
Computer security; Transportation; Safety; Timing; Testing; Connected vehicles; Vehicle-to-everything; Traffic signal control system; cybersecurity; connected vehicles; security testing platform
Categories
Funding
- U.S. National Science Foundation through Secure and Trustworthy Cyberspace (SaTC) [1930041]
- Division Of Computer and Network Systems
- Direct For Computer & Info Scie & Enginr [1930041] Funding Source: National Science Foundation
Ask authors/readers for more resources
This study proposes a comprehensive analysis framework to address the cybersecurity problem in the traffic signal control system with connected vehicle technology. A case study is conducted to demonstrate the impact of data spoofing attacks and the corresponding mitigation measures.
Connected vehicle (CV) technology brings both opportunities and challenges to the traffic signal control (TSC) system. While safety and mobility performance could be greatly improved by adopting CV technologies, the connectivity between vehicles and transportation infrastructure may increase the risks of cyber threats. In the past few years, studies related to cybersecurity on the TSC systems were conducted. However, there still lacks a systematic investigation that provides a comprehensive analysis framework. In this study, our aim is to fill the research gap by proposing a comprehensive analysis framework for the cybersecurity problem of the TSC in the CV environment. With potential threats towards the major components of the system and their corresponding impacts on safety and efficiency analyzed, data spoofing attack is considered the most plausible and realistic attack approach. Based on this finding, different attack strategies and defense solutions are discussed. A case study is presented to show the impact of the data spoofing attacks towards a selected CV based TSC system and corresponding mitigation countermeasures. This case study is conducted on a hybrid security testing platform, with virtual traffic and a real V2X communication network. To the best of our knowledge, this is the first study to present a comprehensive analysis framework to the cybersecurity problem of the CV-based TSC systems.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available