4.7 Article

On the Cybersecurity of Traffic Signal Control System With Connected Vehicles

Journal

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
Volume 23, Issue 9, Pages 16267-16279

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2022.3149449

Keywords

Computer security; Transportation; Safety; Timing; Testing; Connected vehicles; Vehicle-to-everything; Traffic signal control system; cybersecurity; connected vehicles; security testing platform

Funding

  1. U.S. National Science Foundation through Secure and Trustworthy Cyberspace (SaTC) [1930041]
  2. Division Of Computer and Network Systems
  3. Direct For Computer & Info Scie & Enginr [1930041] Funding Source: National Science Foundation

Ask authors/readers for more resources

This study proposes a comprehensive analysis framework to address the cybersecurity problem in the traffic signal control system with connected vehicle technology. A case study is conducted to demonstrate the impact of data spoofing attacks and the corresponding mitigation measures.
Connected vehicle (CV) technology brings both opportunities and challenges to the traffic signal control (TSC) system. While safety and mobility performance could be greatly improved by adopting CV technologies, the connectivity between vehicles and transportation infrastructure may increase the risks of cyber threats. In the past few years, studies related to cybersecurity on the TSC systems were conducted. However, there still lacks a systematic investigation that provides a comprehensive analysis framework. In this study, our aim is to fill the research gap by proposing a comprehensive analysis framework for the cybersecurity problem of the TSC in the CV environment. With potential threats towards the major components of the system and their corresponding impacts on safety and efficiency analyzed, data spoofing attack is considered the most plausible and realistic attack approach. Based on this finding, different attack strategies and defense solutions are discussed. A case study is presented to show the impact of the data spoofing attacks towards a selected CV based TSC system and corresponding mitigation countermeasures. This case study is conducted on a hybrid security testing platform, with virtual traffic and a real V2X communication network. To the best of our knowledge, this is the first study to present a comprehensive analysis framework to the cybersecurity problem of the CV-based TSC systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available