Skip to main content

MIT researchers hack into traffic lights

With permission from a local road agency, researchers in from the University of Michigan hacked into nearly 100 wirelessly networked traffic lights, highlighting security issues that they say are likely to pervade networked traffic infrastructure around the country. More than 40 states currently use such systems to keep traffic flowing as efficiently as possible, helping to reduce emissions and delays. The team, led by University of Michigan computer scientist J. Alex Halderman, found three major weaknes
August 22, 2014 Read time: 3 mins

With permission from a local road agency, researchers in from the 5594 University of Michigan hacked into nearly 100 wirelessly networked traffic lights, highlighting security issues that they say are likely to pervade networked traffic infrastructure around the country. More than 40 states currently use such systems to keep traffic flowing as efficiently as possible, helping to reduce emissions and delays.

The team, led by University of Michigan computer scientist J. Alex Halderman, found three major weaknesses in the traffic light system: unencrypted wireless connections, the use of default usernames and passwords that could be found online and a debugging port that is easy to attack.

“The vulnerabilities we discover in the infrastructure are not a fault of any one device or design choice, but rather show a systemic lack of security consciousness,” the researchers report in a paper they’re presenting this week at a computer security conference. They did not disclose exactly where in Michigan they did the research.

Although the road agency responsible for implementing the system has never faced serious computer security threats, the possibility will become more of a problem as transportation authorities and car makers test new ways for infrastructure and vehicles to communicate in order to reduce congestion and accidents.

“They need to be worrying about this and think about security - it needs to be one of their top priorities,” says Branden Ghena, a graduate student who worked on the project. “It’s hard to get people to care about these things in the same way that it’s hard to get people to change their passwords.”

Wirelessly networked traffic lights have four key components. There are sensors that detect cars, controllers that use the sensor data to control the lights at a given intersection, radios for wireless communication among intersections, and malfunction management units (MMUs), which return lights to safe fallback configurations if an ‘invalid’ configuration occurs. For example, if somehow every light at an intersection is green, the system might fall back to having them all become flashing red lights.

The Michigan researchers found that anyone with a computer that can communicate at the same frequency as the intersection radios, in this case, 5.8 gigahertz, could access the entire unencrypted network. It takes just one point of access to get into the whole system.

After gaining access to one of the controllers in their target network, the researchers were able to turn all lights red or alter the timing of neighbouring intersections, for example, to make sure someone hit all green lights on a given route. They could also trigger the lights’ MMUs by attempting invalid configurations.

At the end of their report, Halderman and his group propose simple recommendations for improving the security of traffic infrastructure. First and foremost, traffic-system administrators should not use default usernames and passwords. Also, they should stop broadcasting communications unencrypted for ‘casual observers and curious teenagers’ to see.

The researchers note that their study has implications beyond traffic lights. More and more devices like voting machines, cars, and medical devices are computer controlled and will ultimately be networked. This phase change, as they call it, comes with “potential for catastrophic security failures.”

For more information on companies in this article

Related Content

  • Authorities select enforce now, pay later option
    October 19, 2015
    Outsouring of enforcement services is on the increase internationally as highway and traffic authorities seek further support in resources and expertise from the private sector. Jon Masters reports. Signs of a significant company making moves into a new market can usually be read as indication of likely growth in that particular sector. Q-Free’s expansion from tolling operations into general traffic enforcement could be viewed as surprising as it is moving into what are relatively mature and consolidating m
  • US enforcement regulation to deliver clearer guidelines?
    February 2, 2012
    Jim Tuton of American Traffic Solutions looks at the evolution of automated enforcement in North America "Technological regulation will become more sophisticated at the federal level, giving states clearer guidelines" Jim Tuton In just 20 years, photo enforcement in North America has grown from a single speed camera in a small town in Arizona to thousands of photo traffic enforcement cameras which are now operating in 350 communities spread across 27 states and three Canadian provinces. Most of these p
  • San Francisco bans facial recognition
    July 23, 2019
    San Francisco has become the first US city to ban facial recognition software – and it is a move which has implications for transit agencies as well as police forces worldwide Big Brother is watching you’, goes the famous saying. Well, not in San Francisco he isn’t. Legislators in the Californian city – home to the tech gold rush and embracers of all things forward-looking – have decided that, after all, there should be limits to technology’s hold over us. By a margin of eight votes to one, the city’s
  • Global automotive cyber security market to be ‘worth US$31.8 million by 2021’
    July 12, 2016
    A new report from MarketsandMarkets projects the global automotive security market to grow at a CAGR of 13.3 per cent between 2016 and 2021, reaching a market size of US$31.8 million by 2021. According to the report, Automotive Cyber Security Market by Security Type, the major factors behind the growth of the global automotive cyber security market are the growing connected cars being introduced from OEMs and rising security concerns among end-users.