Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering
Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

Citation
Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos. "Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering". 9th International Symposium on Resilient Control Systems, August, 2016.

Abstract
— Recent experimental studies have shown that traf- fic management systems are vulnerable to cyber-attacks on sensor data. This paper studies the vulnerability of fixedtime control of signalized intersections when sensors measuring traffic flow information are compromised and perturbed by an adversary. The problems are formulated by considering three malicious objectives: 1) worst-case network accumulation, which aims to destabilize the overall network as much as possible; 2) worst-case lane accumulation, which aims to cause worstcase accumulation on some target lanes; and 3) risk-averse target accumulation, which aims to reach a target accumulation by making the minimum perturbation to sensor data. The problems are solved using bilevel programming optimization methods. Finally, a case study of a real network is used to illustrate the results.

Electronic downloads

Citation formats  
  • HTML
    Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon
    Koutsoukos. <a
    href="http://www.cps-forces.org/pubs/237.html"
    >Vulnerability of Fixed-Time Control of Signalized
    Intersections to Cyber-Tampering</a>, 9th
    International Symposium on Resilient Control Systems,
    August, 2016.
  • Plain text
    Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon
    Koutsoukos. "Vulnerability of Fixed-Time Control of
    Signalized Intersections to Cyber-Tampering". 9th
    International Symposium on Resilient Control Systems,
    August, 2016.
  • BibTeX
    @inproceedings{GhafouriAbbasVorobeychikKoutsoukos16_VulnerabilityOfFixedTimeControlOfSignalizedIntersections,
        author = {Amin Ghafouri and Waseem Abbas and Yevgeniy
                  Vorobeychik and Xenofon Koutsoukos},
        title = {Vulnerability of Fixed-Time Control of Signalized
                  Intersections to Cyber-Tampering},
        booktitle = {9th International Symposium on Resilient Control
                  Systems},
        month = {August},
        year = {2016},
        abstract = {â Recent experimental studies have shown that
                  traf- fic management systems are vulnerable to
                  cyber-attacks on sensor data. This paper studies
                  the vulnerability of fixedtime control of
                  signalized intersections when sensors measuring
                  traffic flow information are compromised and
                  perturbed by an adversary. The problems are
                  formulated by considering three malicious
                  objectives: 1) worst-case network accumulation,
                  which aims to destabilize the overall network as
                  much as possible; 2) worst-case lane accumulation,
                  which aims to cause worstcase accumulation on some
                  target lanes; and 3) risk-averse target
                  accumulation, which aims to reach a target
                  accumulation by making the minimum perturbation to
                  sensor data. The problems are solved using bilevel
                  programming optimization methods. Finally, a case
                  study of a real network is used to illustrate the
                  results.},
        URL = {http://cps-forces.org/pubs/237.html}
    }
    

Posted by Waseem Abbas on 2 Mar 2017.
Groups: forces
For additional information, see the Publications FAQ or contact webmaster at cps-forces org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.