Attack-Resilient Traffic-Signal Configurations
Aron Laszka

Citation
Aron Laszka. "Attack-Resilient Traffic-Signal Configurations". Talk or presentation, 4, November, 2015.

Abstract
Traffic signals were originally standalone hardware devices running on fixed schedules, but by now, they have evolved into complex networked systems. While traditional hardware systems were susceptible only to attacks based on direct physical access, systems nowadays may be vulnerable to attacks through wireless interfaces, or even to remote attacks through the Internet. Due to hardware-based failsafes, these vulnerabilities cannot be used to cause accidents; however, they might be used to cause disastrous traffic congestions. Since eliminating all vulnerabilities from these systems is practically impossible, we must mitigate attacks through attack-resilient design. In order to be able to design transportation networks and traffic-signal configurations that are resilient to attacks, we first need to be able to determine how resilient a given configuration is. We show that this problem is computationally hard, and propose heuristic algorithms for finding worst-case attacks, which can be used to evaluate resilience and identify critical intersections. Using numerical results, we compare these heuristic algorithms to exhaustive search in terms of solution quality and running time. Finally, we present simulation-based results on an actual transportation network.

Electronic downloads


Internal. This publication has been marked by the author for FORCES-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Aron Laszka. <a
    href="http://www.cps-forces.org/pubs/102.html"
    ><i>Attack-Resilient Traffic-Signal
    Configurations</i></a>, Talk or presentation, 
    4, November, 2015.
  • Plain text
    Aron Laszka. "Attack-Resilient Traffic-Signal
    Configurations". Talk or presentation,  4, November,
    2015.
  • BibTeX
    @presentation{Laszka15_AttackResilientTrafficSignalConfigurations,
        author = {Aron Laszka},
        title = {Attack-Resilient Traffic-Signal Configurations},
        day = {4},
        month = {November},
        year = {2015},
        abstract = {Traffic signals were originally standalone
                  hardware devices running on fixed schedules, but
                  by now, they have evolved into complex networked
                  systems. While traditional hardware systems were
                  susceptible only to attacks based on direct
                  physical access, systems nowadays may be
                  vulnerable to attacks through wireless interfaces,
                  or even to remote attacks through the Internet.
                  Due to hardware-based failsafes, these
                  vulnerabilities cannot be used to cause accidents;
                  however, they might be used to cause disastrous
                  traffic congestions. Since eliminating all
                  vulnerabilities from these systems is practically
                  impossible, we must mitigate attacks through
                  attack-resilient design. In order to be able to
                  design transportation networks and traffic-signal
                  configurations that are resilient to attacks, we
                  first need to be able to determine how resilient a
                  given configuration is. We show that this problem
                  is computationally hard, and propose heuristic
                  algorithms for finding worst-case attacks, which
                  can be used to evaluate resilience and identify
                  critical intersections. Using numerical results,
                  we compare these heuristic algorithms to
                  exhaustive search in terms of solution quality and
                  running time. Finally, we present simulation-based
                  results on an actual transportation network.},
        URL = {http://cps-forces.org/pubs/102.html}
    }
    

Posted by Carolyn Winter on 4 Nov 2015.
Groups: forces
For additional information, see the Publications FAQ or contact webmaster at cps-forces org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.