Impact Evaluation of Falsified Data Attacks on Connected Vehicle Based Traffic Signal Control

Connected vehicle (CV) technology enables data exchange between vehicles and transportation infrastructure and therefore has great potentials to improve current traffic signal control systems. However, this connectivity might also bring cyber security concerns. As the first step in investigating the cyber security of CV-based traffic signal control (CV-TSC) systems, potential cyber threats need to be identified and corresponding impact needs to be evaluated. In this paper, we aim to evaluate the impact of cyber attacks on CV-TSC systems by considering a realistic attack scenario in which the control logic of a CV-TSC system is unavailable to attackers. Our threat model presumes that an attacker may learn the control logic using a surrogate model. Based on the surrogate model, the attacker may launch falsified data attacks to influence signal control decisions. In the case study, we realistically evaluate the impact of falsified data attacks on an existing CV-TSC system (i.e., I-SIG).

[1]  Shihong Huang,et al.  Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data , 2018 .

[2]  Sing-Tze Bow,et al.  Pattern recognition and image preprocessing , 1992 .

[3]  Ilsoo Yun,et al.  Cumulative Travel-Time Responsive Real-Time Intersection Control Algorithm in the Connected Vehicle Environment , 2013 .

[4]  Shihong Huang,et al.  Traffic Signal Optimization Using Crowdsourced Vehicle Trajectory Data , 2018 .

[5]  Dipak Ghosal,et al.  Delay-Based Traffic Signal Control for Throughput Optimality and Fairness at an Isolated Intersection , 2018, IEEE Transactions on Vehicular Technology.

[6]  S. Ilgin Guler,et al.  Using connected vehicle technology to improve the efficiency of intersections , 2014 .

[7]  Alan J. Michaels,et al.  Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet , 2017 .

[8]  Shiwen Mao,et al.  An Overview of 3GPP Cellular Vehicle-to-Everything Standards , 2017, GETMBL.

[9]  Zhen Yang,et al.  Eco-Trajectory Planning with Consideration of Queue along Congested Corridor for Hybrid Electric Vehicles , 2019 .

[10]  Dipak Ghosal,et al.  Adaptive Traffic Signal Control With Vehicular Ad hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[11]  Dipak Ghosal,et al.  Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms , 2018, 2018 IEEE Vehicular Networking Conference (VNC).

[12]  Bo Zhao,et al.  Location Spoofing in a Location-Based Game: A Case Study of Pokémon Go , 2017 .

[13]  J. Alex Halderman,et al.  Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.

[14]  Suvrajeet Sen,et al.  Controlled Optimization of Phases at an Intersection , 1997, Transp. Sci..

[15]  Yiheng Feng,et al.  Spatiotemporal intersection control in a connected and automated vehicle environment , 2018 .

[16]  Ryan M. Gerdes,et al.  Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers , 2020, AutoSec@CODASPY.

[17]  Ananthram Swami,et al.  Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.

[18]  Saurabh Amin,et al.  Vulnerability of Transportation Networks to Traffic-Signal Tampering , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[19]  Shwetak N. Patel,et al.  Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.

[20]  Aaron Hunter,et al.  A Security Analysis of an In-Vehicle Infotainment and App Platform , 2016, WOOT.

[21]  Wan Li,et al.  Connected Vehicles Based Traffic Signal Timing Optimization , 2019, IEEE Transactions on Intelligent Transportation Systems.

[22]  Yiheng Feng,et al.  Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control , 2018, NDSS.

[23]  Yiheng Feng,et al.  Corridor level cooperative trajectory optimization with connected and automated vehicles , 2019, Transportation Research Part C: Emerging Technologies.

[24]  Yiheng Feng,et al.  Adaptive Coordination Based on Connected Vehicle Technology , 2017 .

[25]  Jianfeng Zheng,et al.  Real-Time Detector-Free Adaptive Signal Control with Low Penetration of Connected Vehicles , 2018 .

[26]  William Whyte,et al.  A security credential management system for V2V communications , 2013, 2013 IEEE Vehicular Networking Conference.

[27]  Ron Kohavi,et al.  Irrelevant Features and the Subset Selection Problem , 1994, ICML.

[28]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[29]  Alexandre M. Bayen,et al.  Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security , 2016 .

[30]  Eran Yahav,et al.  Exploiting Social Navigation , 2014, ArXiv.

[31]  Jun Ding,et al.  Multi-modal traffic signal control with priority, signal actuation and coordination , 2014 .

[32]  Byungkyu Park,et al.  Traffic Signal Control with Connected Vehicles , 2013 .

[33]  Stephen D. Boyles,et al.  Implications of traffic signal cybersecurity on potential deliberate traffic disruptions , 2019, Transportation Research Part A: Policy and Practice.

[34]  Cade Braud,et al.  Traffic signal timing manual. , 2008 .

[35]  Jun Ding,et al.  PAMSCOD: Platoon-based arterial multi-modal signal control with online data , 2011 .

[36]  Leo Breiman,et al.  Classification and Regression Trees , 1984 .

[37]  Yevgeniy Vorobeychik,et al.  Vulnerability of fixed-time control of signalized intersections to cyber-tampering , 2016, 2016 Resilience Week (RWS).

[38]  Yi-Zeng Liang,et al.  Monte Carlo cross validation , 2001 .

[39]  Yiheng Feng,et al.  A real-time adaptive signal control in a connected vehicle environment , 2015 .

[40]  Christian Priemer,et al.  A decentralized adaptive traffic signal control using V2I communication data , 2009, 2009 12th International IEEE Conference on Intelligent Transportation Systems.

[41]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[42]  Alexander Skabardonis,et al.  Oversaturated Freeway Flow Algorithm for Use in Next Generation Simulation , 2008 .

[43]  William Whyte,et al.  A Security Credential Management System for V2X Communications , 2018, IEEE Transactions on Intelligent Transportation Systems.