Skip to main content

SwRI investigates cybersecurity weaknesses in transportation management systems

Southwest Research Institute (SwRI), in San Antonio, has been awarded a $750,000 (£573,000) contract from the Transportation Research Board to help state and local agencies address cyber-attack risks on current transportation systems and those posed by future connected vehicles. Cyber security firm, Praetorian will support SwRI by conducting a security audit of traffic management systems and develop a web-based guide to help transportation agencies learn how to safeguard equipment.
November 6, 2017 Read time: 2 mins

Southwest Research Institute (SwRI), in San Antonio, has been awarded a $750,000 (£573,000) contract from the Transportation Research Board to help state and local agencies address cyber-attack risks on current transportation systems and those posed by future connected vehicles. Cyber security firm, Praetorian will support 588 SwRI by conducting a security audit of traffic management systems and develop a web-based guide to help transportation agencies learn how to safeguard equipment.

SwRI’s assessment will include white hat hacking (penetration testing) to assess vulnerabilities and recommend mitigation strategies. These recommendations will also consider how agencies with limited resources can implement cybersecurity measures.

For future research, SwRI will evaluate potential access points where hackers could exploit connected vehicles. Government agencies and the automotive industry are preparing vehicles and transportation infrastructure to include more wireless networking to enable safer driving with vehicle-to-vehicle and vehicle-to-infrastructure communications.

Figures revealed from the institute show that more than 400,000 traffic signal systems across the United States have varying levels of network access and embedded security. System managers and government stakeholders may be unaware of cyber risks to controllers, dynamic message signs, road-weather information systems, and other devices that relay data.

Daniel Zajac, SwRI engineer and principal investigator, said: “The goal is to create security guidance for traffic management centres,”

IT and security personnel need to understand threats to their equipment, standards for managing passwords, and then move up to advanced network security.”

For more information on companies in this article

Related Content

  • Cybersecurity in the connected car
    March 31, 2017
    A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles. According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity,
  • New report investigates cyber security of connected vehicles
    February 9, 2016
    TU-Automotive has just released a new 60-page report, Cyber Security in the Connected Vehicle 2016, which looks at the role of robust cyber security practices and systems in the connected vehicle now and in the future of the automotive industry.
  • ITS European Congress: safer and cleaner mobility
    August 6, 2019
    Smart mobility and the increasing digitalisation of transport were among the main themes of this year’s ITS European Congress in the Netherlands. Ben Spencer picks some highlights from conference sessions which considered possible future developments Navigating between the Evoluon conference centre - a former science museum that resembles a giant-sized UFO - and an automotive campus, there was a lot to see at the 13th ITS European Congress in Brainport, Eindhoven. Organised by Ertico – ITS Europe and th
  • Terrestrial solution to stellar shortcomings
    December 5, 2013
    Inherent weaknesses in satellite communications are leading several countries to re-evaluate terrestrial-based backup systems. There is a tale frequently told in satellite navigation circles, of how landing systems at Newark Airport were disrupted by a truck driver using GPS jamming equipment as he drove along the New Jersey Turnpike. While there was no threat to flight safety as the interference to GPS reference stations being tested, the story highlights how apparently benign threats have the potential t