Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-030-01950-1_41guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System

Published: 29 October 2018 Publication History

Abstract

Traffic systems and signals are used to improve traffic flow, reduce congestion, increase travel time consistency and ensure safety of road users. Malicious interruption or manipulation of traffic signals may cause disastrous instants including huge delays, financial loss and loss of lives. Intrusion into traffic signals by hackers can create such interruption whose consequences will only increase with the introduction of driverless vehicles. Recently, many traffic signals across the world are reported to have intruded, highlighting the importance of accurate detection. To reduce the impact of an intrusion, in this paper, we introduce an intrusion detection technique using the flow rate and phase time of a traffic signal as evidential information to detect the presence of an intrusion. The information received from flow rate and phase time are fused with the Dempster Shaffer (DS) theory. Historical data are used to create the probability mass functions for both flow rate and phase time. We also developed a simulation model using a traffic simulator, namely SUMO for many types of real traffic situations including intrusion. The performance of the proposed Intrusion Detection System (IDS) is appraised with normal traffic condition and induced intrusions. Simulated results show our proposed system can successfully detect intruded traffic signals from normal signals with significantly high accuracy (above 91%).

References

[1]
Pojani D and Stead D Sustainable urban transport in the developing world: beyond megacities Sustainability 2015 7 6 7784-7805
[2]
Feng, Y., et al.: Vulnerability of traffic control system under cyber-attacks using falsified data. In: Transportation Research Board 2018 Annual Meeting (TRB) (2018)
[3]
Yousef KM, Al-Karaki MN, and Shatnawi AM Intelligent traffic light flow control system using wireless sensors networks J. Inf. Sci. Eng. 2010 26 3 753-768
[4]
Khekare GS and Sakhare AV Intelligent traffic system for VANET: a survey Int. J. Adv. Comput. Res. 2012 2 4 99-102
[5]
Sundar R, Hebbar S, and Golla V Implementing intelligent traffic control system for congestion control, ambulance clearance, and stolen vehicle detection IEEE Sens. J. 2015 15 2 1109-1113
[6]
Al-Sakran HO Intelligent traffic information system based on integration of Internet of Things and Agent technology Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2015 6 2 37-43
[7]
Coogan, M.A., et al.: Intercity Passenger Rail in the Context of Dynamic Travel Markets. Transportation Research Board (2016)
[8]
Mahindra, R., et al.: A practical traffic management system for integrated LTE-WiFi networks. In: Proceedings of the 20th Annual International Conference on Mobile Computing and Networking. ACM (2014)
[9]
Lakshmi, C.J., Kalpana, S.: Intelligent traffic signaling system. In: 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE (2017)
[10]
Chowdhury, A. Priority based and secured traffic management system for emergency vehicle using IoT. In: International Conference on Engineering & MIS (ICEMIS). IEEE (2016)
[11]
Nilsson, G., et al.: Entropy-like Lyapunov functions for the stability analysis of adaptive traffic signal controls. In: 2015 IEEE 54th Annual Conference on Decision and Control (CDC). IEEE (2015)
[12]
Services, N.T.R.a.M.: The benchmark in urban traffic control (2018). http://www.scats.com.au/files/an_introduction_to_scats_6.pdf. Accessed 6 July 2018
[13]
Passeri, P.: May 2016 Cyber Attacks Statistics (2016). http://www.hackmageddon.com/category/security/cyber-attacks-statistics/. Accessed 10 June 2018
[14]
Kaspersky Lab: Kaspersky DDoS Intelligence Report for Q1 2016 (2016). https://securelist.com/analysis/quarterly-malware-reports/74550/kaspersky-ddos-intelligence-report-for-q1-2016/. Accessed 10 June 2018
[15]
OWASP: Category: OWASP Top Ten Project (2016). https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2013. Accessed 10 June 2018
[16]
Chawla, A., Patial, R.K., Kumar, D.: Comparative analysis of Sybil attack detection techniques in VANETs. Indian J. Sci. Technol. 9(47) (2016)
[17]
Chowdhury Abdullahi Batten Lynn and Li Gang Recent cyber security attacks and their mitigation approaches – an overview Applications and Techniques in Information Security 2016 Singapore Springer 54-65
[18]
Cerrudo, C.: An emerging us (and world) threat: cities wide open to cyber attacks. Securing Smart Cities (2015)
[19]
Directory, V.G.D.: Traffic signal strategic monitor detector data (2017). https://www.data.vic.gov.au/data/dataset/traffic_signal_strategic_monitor_detector_data. Accessed 8 June 2018
[20]
Ajayi, E.: The Impact of Cyber Crimes on Global Trade and Commerce. Available at SSRN (2016)
[21]
Poole A and Kotsialos A Second order macroscopic traffic flow model validation using automatic differentiation with resilient backpropagation and particle swarm optimisation algorithms Transp. Res. Part C: Emerg. Technol. 2016 71 356-381
[22]
Song, J., et al.: Research on car-following model based on SUMO. In: 2014 IEEE 7th International Conference on Advanced Infocomm Technology (ICAIT), IEEE (2014)

Cited By

View all
  • (2023)CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active DirectoryProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607228(426-439)Online publication date: 16-Oct-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings
Oct 2018
775 pages
ISBN:978-3-030-01949-5
DOI:10.1007/978-3-030-01950-1

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 29 October 2018

Author Tags

  1. Traffic signal
  2. Intrusion detection
  3. Intelligent Traffic System

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active DirectoryProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607228(426-439)Online publication date: 16-Oct-2023

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media