Vulnerability of Transportation Networks to Traffic-Signal Tampering

Traffic signals were originally standalone hardware devices running on fixed schedules, but by now, they have evolved into complex networked systems. As a consequence, traffic signals have become susceptible to attacks through wireless interfaces or even remote attacks through the Internet. Indeed, recent studies have shown that many traffic lights deployed in practice have easily exploitable vulnerabilities, which allow an attacker to tamper with the configuration of the signal. Due to hardware-based failsafes, these vulnerabilities cannot be used to cause accidents. However, they may be used to cause disastrous traffic congestions. Building on Daganzo's well- known traffic model, we introduce an approach for evaluating vulnerabilities of transportation networks, identifying traffic signals that have the greatest impact on congestion and which, therefore, make natural targets for attacks. While we prove that finding an attack that maximally impacts congestion is NP-hard, we also exhibit a polynomial-time heuristic algorithm for computing approximately optimal attacks. We then use numerical experiments to show that our algorithm is extremely efficient in practice. Finally, we also evaluate our approach using the SUMO traffic simulator with a real-world transportation network, demonstrating vulnerabilities of this network. These simulation results extend the numerical experiments by showing that our algorithm is extremely efficient in a microsimulation model as well.

[1]  C. Daganzo THE CELL TRANSMISSION MODEL.. , 1994 .

[2]  Carlos F. Daganzo,et al.  THE CELL TRANSMISSION MODEL, PART II: NETWORK TRAFFIC , 1995 .

[3]  Michael G.H. Bell,et al.  A game theory approach to measuring the performance reliability of transport networks , 2000 .

[4]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[5]  Athanasios K. Ziliaskopoulos,et al.  A Linear Programming Model for the Single Destination System Optimum Dynamic Traffic Assignment Problem , 2000, Transp. Sci..

[6]  Daniel Krajzewicz,et al.  SUMO (Simulation of Urban MObility) - an open-source traffic simulation , 2002 .

[7]  Darren M. Scott,et al.  Network Robustness Index : a new method for identifying critical links and evaluating the performance of transportation networks , 2006 .

[8]  Tansu Alpcan,et al.  Security Games for Vehicular Networks , 2008, IEEE Transactions on Mobile Computing.

[9]  M G H Bell,et al.  Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[10]  Darren M. Scott,et al.  Identifying Critical Road Segments and Measuring System-Wide Robustness in Transportation Networks with Isolating Links: A Link-Based Capacity-Reduction Approach , 2010 .

[11]  E. Jenelius Large-scale road network vulnerability analysis , 2010 .

[12]  Daniel Krajzewicz,et al.  SUMO - Simulation of Urban MObility An Overview , 2011 .

[13]  Nicola Bellomo,et al.  On the Modeling of Traffic and Crowds: A Survey of Models, Speculations, and Perspectives , 2011, SIAM Rev..

[14]  Kun Yang,et al.  A Random Road Network Model for Mobility Modeling in Mobile Delay-Tolerant Networks , 2012, 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[15]  Erik Jenelius,et al.  Road network vulnerability analysis of area-covering disruptions: A grid-based approach with case study , 2012 .

[16]  Kun Yang,et al.  A Random Road Network Model and Its Effects on Topological Characteristics of Mobile Delay-Tolerant Networks , 2014, IEEE Transactions on Mobile Computing.

[17]  J. Alex Halderman,et al.  Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.

[18]  Michael Patriksson,et al.  The Traffic Assignment Problem: Models and Methods , 2015 .

[19]  Alexandre M. Bayen,et al.  On Cybersecurity of Freeway Control Systems: Analysis of Coordinated Ramp Metering Attacks , 2015 .