Vulnerability of fixed-time control of signalized intersections to cyber-tampering

Recent experimental studies have shown that traffic management systems are vulnerable to cyber-attacks on sensor data. This paper studies the vulnerability of fixed-time control of signalized intersections when sensors measuring traffic flow information are compromised and perturbed by an adversary. The problems are formulated by considering three malicious objectives: 1) worst-case network accumulation, which aims to destabilize the overall network as much as possible; 2) worst-case lane accumulation, which aims to cause worst-case accumulation on some target lanes; and 3) risk-averse target accumulation, which aims to reach a target accumulation by making the minimum perturbation to sensor data. The problems are solved using bilevel programming optimization methods. Finally, a case study of a real network is used to illustrate the results.

[1]  Richard E. Allsop,et al.  Estimating the traffic capacity of a signalized road junction , 1972 .

[2]  D. White,et al.  A solution method for the linear static Stackelberg problem using penalty functions , 1990 .

[3]  Pierre Hansen,et al.  New Branch-and-Bound Rules for Linear Bilevel Programming , 1989, SIAM J. Sci. Comput..

[4]  Paul H. Calamai,et al.  Bilevel and multilevel programming: A bibliography review , 1994, J. Glob. Optim..

[5]  Wang,et al.  Review of road traffic control strategies , 2003, Proceedings of the IEEE.

[6]  Johan Efberg,et al.  YALMIP : A toolbox for modeling and optimization in MATLAB , 2004 .

[7]  J. Lofberg,et al.  YALMIP : a toolbox for modeling and optimization in MATLAB , 2004, 2004 IEEE International Conference on Robotics and Automation (IEEE Cat. No.04CH37508).

[8]  Patrice Marcotte,et al.  An overview of bilevel optimization , 2007, Ann. Oper. Res..

[9]  Cade Braud,et al.  Traffic signal timing manual. , 2008 .

[10]  Danwei Wang,et al.  Distributed traffic signal control for maximum network throughput , 2012, 2012 15th International IEEE Conference on Intelligent Transportation Systems.

[11]  Pravin Varaiya,et al.  Max pressure control of a network of signalized intersections , 2013 .

[12]  Pravin Varaiya,et al.  The Max-Pressure Controller for Arbitrary Networks of Signalized Intersections , 2013 .

[13]  J. Alex Halderman,et al.  Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.

[14]  P. Varaiya,et al.  Analysis of fixed-time control☆ , 2014, 1408.4229.

[15]  Cesar Cerrudo,et al.  An Emerging US (and World) Threat: Cities Wide Open to Cyber Attacks , 2015 .

[16]  Saurabh Amin,et al.  Vulnerability of Transportation Networks to Traffic-Signal Tampering , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).