Skip to main content

SwRI investigates cybersecurity weaknesses in transportation management systems

Southwest Research Institute (SwRI), in San Antonio, has been awarded a $750,000 (£573,000) contract from the Transportation Research Board to help state and local agencies address cyber-attack risks on current transportation systems and those posed by future connected vehicles. Cyber security firm, Praetorian will support SwRI by conducting a security audit of traffic management systems and develop a web-based guide to help transportation agencies learn how to safeguard equipment.
November 6, 2017 Read time: 2 mins

Southwest Research Institute (SwRI), in San Antonio, has been awarded a $750,000 (£573,000) contract from the Transportation Research Board to help state and local agencies address cyber-attack risks on current transportation systems and those posed by future connected vehicles. Cyber security firm, Praetorian will support 588 SwRI by conducting a security audit of traffic management systems and develop a web-based guide to help transportation agencies learn how to safeguard equipment.

SwRI’s assessment will include white hat hacking (penetration testing) to assess vulnerabilities and recommend mitigation strategies. These recommendations will also consider how agencies with limited resources can implement cybersecurity measures.

For future research, SwRI will evaluate potential access points where hackers could exploit connected vehicles. Government agencies and the automotive industry are preparing vehicles and transportation infrastructure to include more wireless networking to enable safer driving with vehicle-to-vehicle and vehicle-to-infrastructure communications.

Figures revealed from the institute show that more than 400,000 traffic signal systems across the United States have varying levels of network access and embedded security. System managers and government stakeholders may be unaware of cyber risks to controllers, dynamic message signs, road-weather information systems, and other devices that relay data.

Daniel Zajac, SwRI engineer and principal investigator, said: “The goal is to create security guidance for traffic management centres,”

IT and security personnel need to understand threats to their equipment, standards for managing passwords, and then move up to advanced network security.”

For more information on companies in this article

Related Content

  • US and UK Respondents call for stricter data security regulations for Connected Cars
    November 28, 2017
    Over 40% of both 1,000 US and UK adult consumers who took part in a new study feel that the government should apply stricter data security regulations for connected cars (CCs), according to Thales’ E-Security IoT Survey. A combined 60% of both respondents believe that CCs pose security concerns with integrity and malfunctions at the top of the list of apprehensions when asked to identify internet-connected devices which they felt were most vulnerable to hacking.
  • Making connections without compromising security
    November 10, 2017
    We listen in as global experts discuss connected vehicles and cybersecurity. By 2019 there will be almost 44 million connected cars globally and by 2022 that figure will be nearer 70 million; some 40% will be electric powered, according to market analyst Frost & Sullivan. But its report said the issue of end-to-end security for the new technology is still under debate, as vehicle OEMs engage with vendors to test specific security application areas for both over-the-air and vehicle-to-exterior services.
  • Irdeto security expert: ‘Think maliciously to beat hackers’
    September 4, 2018
    Increased connectivity in transportation is a potential goldmine for hackers. To stop them, Stacy Janes at Irdeto says it’s important to think ‘maliciously’. Adam Hill talks to him about ITS’s weak points – and why turning up car radios could be enough to bring auto manufacturers to their knees
  • Automotive industry releases vehicle cybersecurity best practices
    July 22, 2016
    Members of the US Automotive Information Sharing and Analysis Center (Auto-ISAC) have released an overview of comprehensive Automotive Cybersecurity Best Practices, developed as a proactive measure to further enhance vehicle cybersecurity throughout the industry. The Executive Summary has been released publicly on the Auto-ISAC website. The Best Practices provide guidance to assist an organisation's development in seven key topic areas, including governance, risk assessment and management, threat de