Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • Developing an integrated WIM/ANPR enforcement system
    July 31, 2012
    The weigh in motion market remains especially buoyant and technological development continues to reflect this. Although there are major differences in operating philosophies, particularly between developed and developing countries, both the numbers of countries using Weigh In Motion (WIM) technology and the numbers of systems that they deploy are on the increase.
  • UK start-up receives funding for artificial intelligence that could end traffic jams
    May 17, 2017
    UK start-up Vivacity Labs, creators of a sensor with in-built machine-learning that can identify individual road users and manage traffic accordingly has secured a total of US$3.8 million (£3 million) in funding, that could pave the way for driverless cars and truly smart cities that can recognise different vehicles and regulate traffic in real-time. The company has secured a US$2.2 million (£1.7 million) project grant from Innovate UK to roll out a city-wide sensor network for the VivaMK project and a str
  • Need for performance standards for road user charging systems
    February 2, 2012
    GNSS-based road use metering systems need performance metrics, as well as ways to test and reliably compare them. Bern Grush and Joaquín Cosmen write about the function of the GNSS Metering Association for Road-use charging (GMAR), recently set up to address this issue
  • Drivers ‘need reassurance on safety, cybercrime and terrorism if truck platoons are to deliver’
    August 29, 2017
    Commenting on the UK Department of Transport announcement regarding trialling of platoons of self-driving lorries on England's motorways, independent road safety charity is advising there must be more reassurances on issues such as cyber attacks as well as basic road safety needs such as telling other drivers which trucks are in the platoon. The trial, due for 2018, will see up to three lorries travel in automated convoys which will be controlled by a driver in the lead vehicle in a bid to cut congestion an