Vulnerability analysis and defense framework for cybersecurity of a traffic control system
May 10, 2019
Traffic signals are among the most popular targets of hacking in fiction. In a number of movies, TV shows and video games, traffic signals are manipulated to let the hacker and his/her friends make their escape from police pursuit. These scenes may not be realistic now because existing transportation infrastructure is mostly deployed in a private wired network, and control decisions are made based on infrastructure-based sensors (e.g., in-pavement loop detectors). The only way that hackers can compromise the system is through the central traffic management systems such as traffic management centers (TMCs), which are usually firewall protected.