Transportation control systems are emerging intelligent applications nowadays. There are many users, controllers, actors, and operators involved in the transportation control systems. Each of these entities directly or indirectly change the way commodity is flowing. Interaction and cooperation among controllers, actors, and operators in transportation systems are now enabled by means of Center to Field (C2F), Center to Center (C2C) and Vehicle to Vehicle (V2V) communication. To ensure the goals of safer and more efficient transportation systems, testing and evaluation are required before deployment of transportation control systems. This paper provides a security model of transportation control system which integrates the classic network security and transportation requirement, and the threat source of transportation control system is also analyzed. Based on security model and threat source, this paper presents a protocol testing method for securing transportation control system applications based on message customization in real networks. A typical protocol test case on ONVIF (Open Network Video Interface Forum) camera in transportation control systems is also presented for the testing framework and method as well as to elaborate on potential use cases of it. Experiment result from the test case shows the protocol testing method in this paper can check the security of transportation control systems and find out their vulnerability. Challenges from combining the different application protocol tests into one framework, and limitations are also reported and discussed. Finally, the paper concludes with future development directions and applications of the testing method in transportation control systems.
[1]
Jian Zhang,et al.
Designing a Dynamic Control Platform of Electric Bus Vehicles
,
2017
.
[2]
Azzedine Boukerche,et al.
SERVitES: An efficient search and allocation resource protocol based on V2V communication for vehicular cloud
,
2017,
Comput. Networks.
[3]
Michelle S. Wangham,et al.
Reliable data dissemination protocol for VANET traffic safety applications
,
2017,
Ad Hoc Networks.
[4]
Hong Liu,et al.
Securing wireless communications of connected vehicles with artificial intelligence
,
2017,
2017 IEEE International Symposium on Technologies for Homeland Security (HST).
[5]
Zong Tian,et al.
Comparison of performance between Virtual Controller Interface Device and Controller Interface Device
,
2018
.
[6]
Hong Liu,et al.
Message authentication in driverless cars
,
2016,
2016 IEEE Symposium on Technologies for Homeland Security (HST).