Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • Expert calls for high-tech traffic control
    November 29, 2012
    A leading Chinese transportation expert has called for China to develop smart traffic technologies that are more customer-oriented, while boosting greener, safer and more efficient modern transportation in the country. "China's ITS applications should shift their focus to provide more solutions for public transportation in the next decade, and the industry should get a new stimulus by responding to the needs of the market," said Wang Xiaojing, chief engineer at the Research Institute of Highway under the Mi
  • MIT study combines traffic data for smarter signal timings
    April 1, 2015
    Researchers at Massachusetts Institute of Technology (MIT) have found a method of combining vehicle-level data with less precise, but more comprehensive, city-level data on traffic patterns to produce better information than current systems provide. They claim this reduce delays, improve efficiency, and reduce emissions. The new findings are reported in a pair of papers by assistant professor of civil and environmental engineering Carolina Osorio and alumna Kanchana Nanduri, published in the journals Tra
  • Sorting sensible from shiny in tolling technology
    December 11, 2014
    Instead of always striving for the latest shiny toys Kevin Hoeflich of HNTB advises a 10-steps method for selecting the most appropriate technology. Amid the hype and razzmatazz surrounding the launch of Apple’s iPhone 6, the company also announced its new mobile payment system, Apple Pay. Built into the new iPhone 6, Apple Pay works at 220,000 merchants across America and is supported by major US banks and the big three credit card companies.
  • Reducing detection costs benefits intersection management
    February 3, 2012
    The continuing, favourable performance-versus-cost situation concerning detection and monitoring technologies is driving the proliferation of intelligence across road networks. The effective and safe management of intersections is a focus for network operators and systems manufacturers alike. The most complicated of road environments, and statistically among the least safe, intersections enjoy particular emphasis in longer-term work on cooperative infrastructure solutions. However there are current developm