Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • UK's Hindhead tunnel pushes the boundaries of traffic management
    January 23, 2012
    The new Hindhead Tunnel is the first in the UK to use radar-based incident detection. Paul Arnold, project manager with the Highways Agency, talks about the project. The comparatively remote location of the A3 Hindhead Tunnel has resulted in it becoming one of the most sophisticated in the UK in terms of monitoring and control systems, according to Paul Arnold, project manager for the Highways Agency (HA), which manages strategic roads in England and Wales. It is the first tunnel in the UK to use radar for
  • ODOT plans ‘smarter highway’
    May 2, 2013
    Until they can raise the US$1 billion it would take to expand congestion-plagued Oregon 217, state traffic planners say they'll focus on making it a smarter highway. Oregon Department of Transportation (ODOT) engineers believe that a US$6.5 million artificial traffic intelligence project planned for the 217 corridor will permanently alter the Portland metro area's daily commuting culture. The interconnected system will rely on new underground sensors and advanced computer algorithms. The federal government
  • Securing V2X communications
    June 6, 2016
    Cybersecurity developments are moving fast in the automotive sector, but they’re a significant hurdle for the roll-out of C-ITS applications. Jon Masters reports. In the wake of the high-profile hacking of the Jeep Cherokee and problems like the flaw in the Nissan Leaf’s companion app that could compromise the security of data about recent journeys, initiatives linked to vehicle cybersecurity seem to be moving rapidly.
  • Cooperative infrastructure systems waiting for the go ahead
    February 3, 2012
    Despite much research and technological promise, progress towards cooperative infrastructure system deployment is still slow. Here, Robert Cone and John Miles take a considered look at how and when it might come about. From a systems engineering viewpoint it looks logical and inevitable that vehicles should be communicating between themselves and with the road infrastructure. But seen from a business viewpoint the case is not proven.