Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

Related Content

  • October 22, 2014
    Smoothing the path to reducing traffic pollution
    David Crawford reviews a new approach to traffic smoothing. A key objective for the Californian city of Bakersfield’s upgraded traffic operations centre (TOC), which opened in June 2014, is to help improve living conditions in a region with one of the worst air quality problems in the US. The TOC is speeding up the smoothing of traffic flows by delivering faster and better-informed traffic signal retiming and synchronisation.
  • November 13, 2012
    Standardised technology aids low cost wireless communication
    In the UK, the necessary radio spectrum has been identified and standardised technology developed to allow cost effective wireless communication between cars, devices and other ‘machines’. This by Professor William Webb. A world free of traffic congestion, with intelligent systems directing vehicles and alerting drivers to free parking spaces may sound a far off fantasy to motorists stuck in seemingly endless queues on the outskirts of London. Yet this is a scenario not confined to the world of science fict
  • March 14, 2012
    Bridging the highway travel information gap
    A new traffic management solution is attempting to bridge the gap in information available on freeways and arterial roadways. Andrew Bardin Williams reports. Agencies responsible for national networks of roads around the world have the ability to measure, analyse and disseminate accurate travel information to drivers. Millions of dollars go into data collection infrastructure to collect traffic congestion and travel time information on major freeways or highways. For example, a driver on the I-210 in the Lo
  • January 26, 2012
    What's next for traffic management and data collection?
    As the technologies and stakeholders in traffic management evolve, what can we expect to see happening in the coming years? For many, the conversation of the moment is just how, and how far, the newer technologies and services provided principally by the private sector should be allowed to intrude into the realms of traffic management.