2017
DOI: 10.3141/2619-06
|View full text |Cite
|
Sign up to set email alerts
|

Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet

Abstract: The increasing connectivity in transportation infrastructure is driving a need for additional security in transportation systems. For security decisions in a budget-constrained environment, the possible effect of a cyberattack must be numerically characterized. The size of an effect depends on the level of access and the vehicular demand on the intersections being controlled. This paper proposes a framework for better understanding of the levels of access and the effect that can be had in scenarios with varyin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…The results also demonstrate that the co-simulation approach is very useful for evaluating the physical impacts of real cyber attacks. Moreover, unlike the work by Ernst and Michaels [5], no assumptions had to be made about the effects of cyber attacks on the traffic light control components.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The results also demonstrate that the co-simulation approach is very useful for evaluating the physical impacts of real cyber attacks. Moreover, unlike the work by Ernst and Michaels [5], no assumptions had to be made about the effects of cyber attacks on the traffic light control components.…”
Section: Resultsmentioning
confidence: 99%
“…road corridor used by Ernst and Michaels [5]. The experimental setup shown in Figure 8 comprised six coordinated signalized intersections, each spaced 100 m apart.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are studies demonstrating attacks that can realize non-existent jams and virtual vehicles, tamper with signal schedules [46], [47], [48], [49]. Considering the impact of successful attacks, it is imperative to systematically understand the existence of vulnerabilities, and design security frameworks to protect traffic infrastructure against such malicious attacks [50], [51].…”
Section: Related Workmentioning
confidence: 99%
“…Existing research efforts on vehicular communications discuss possible attacks and their mitigation methods ( 5 , 8 ). A recent study on current signal cabinets presents the idea that the possible impact of attacks could be unmanageable queues ( 13 ). Overall, ITS applications require protocols that conflict with anonymity and privacy requirements.…”
mentioning
confidence: 99%