Understanding the Security of Traffic Signal Infrastructure
Zhenyu Ning, Fengwei Zhang, and Stephen Remias
COMPASS Lab Wayne State University
DIMVA, June 19, 2019
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 1
Understanding the Security of Traffic Signal Infrastructure Zhenyu - - PowerPoint PPT Presentation
Understanding the Security of Traffic Signal Infrastructure Zhenyu Ning , Fengwei Zhang, and Stephen Remias COMPASS Lab Wayne State University DIMVA, June 19, 2019 Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 1
COMPASS Lab Wayne State University
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 1
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 2
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 3
◮ Traditional traffic signal systems use rotating gears and wheels
◮ Modern traffic signal systems have achieved a efficient control
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 4
source: https://www.orangetraffic.com/product/mtq-traffic-light-distribution-and-control-cabinet/ Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 5
source: https://www.orangetraffic.com/product/mtq-traffic-light-distribution-and-control-cabinet/ Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 6
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 7
◮ Previous research mainly focus on the traffic controller and
◮ However, traffic signal systems are actually comprised of many
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 8
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 9
◮ A modern traffic signal systems is comprised of many
◮ These components are normally placed in a roadside cabinet. ◮ Cabinet standards are applied to the components inside the
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 10
◮ The TS-2 Cabinet Standard was initially commissioned by
◮ The ITS Cabinet Standard is designed to supersede the
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 11
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 12
◮ Build upon a Linux kernel with BusyBox. ◮ Directly controls the traffic signals with specific software. ◮ E.g., Intelight Model 2070 ATCs and Siemens Model 60 ATCs.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 13
◮ Malfunction Management Unit (MMU) in TS-2 Standard. ◮ Cabinet Monitor Unit (CMU) in ITS Standard.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 14
ATC Controlling MMU Monitoring
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 15
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 16
ATC Controlling MMU Monitoring
ATC Controlling MMU Monitoring
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 17
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 18
ATC Controlling MMU Controlling
◮ In Programming Card, the conflict status is defined by
◮ Datakey is an EEPROM memory device.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 19
source: https://www.flickr.com/photos/robklug/5617557995/in/photostream/ Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 20
source: https://manualzz.com/doc/8353064/888-1212-001-monitorkey-operation-manual Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 21
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 22
◮ Methodology: Partnering with a municipality in USA. ◮ Analysis Environment:
◮ Devices:
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 23
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 24
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 25
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 26
◮ Surveillance Camera ◮ Cabinet Lock ◮ Cabinet Door Status Monitoring
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 27
◮ There are 750 vehicle intersections in the municipality. ◮ 275 vehicle intersections are covered by traffic cameras. ◮ More than 60% of the intersections are out of surveillance.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 28
◮ However, the Corbin #2 master key is sold online. ◮ The sold key is marked with the ability to open most traffic
◮ With $5 USD, we are able to open all cabinets in the
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 29
◮ ATC send query message to CMU to get the door status. ◮ In real-world deployment,
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 30
◮ Surveillance Camera
◮ Cabinet Lock
◮ Cabinet Door Status Monitoring
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 31
◮ Previous work [3] has shown that the wireless communication
◮ We find that the both type of ATCs use default credentials for
◮ The public IP addresses of a number of ATCs can be
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 32
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 33
◮ The signal pattern can be configured by the control buttons
◮ No authentication is activated in analyzed ATCs.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 34
◮ Directly write commands to the serial ports.
◮ Manipulate the driver of the front panel.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 35
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 36
◮ For MMU, resolder the wire jumpers of the programming
◮ For CMU, reconfigure the parameters stored in the Datakey.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 37
◮ With remote only access, we are not able to bypass the
◮ We design a transient avoidance tactic to fight the fail-safe
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 38
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 39
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 40
◮ Due to the geography that must be covered, the deployed
◮ Redundant protocols are not used due to extra cost of
◮ Troubleshooting process of the traffic system mainly focus on
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 41
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 42
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 43
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 44
◮ Stealthy Manipulation and Control
◮ Ransomware Deployment
◮ All-Direction Green Lights
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 45
◮ In a certain time window, the duration of green light is
◮ In practice, 24ms green light on-time with 17ms off-time will
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 46
◮ Avoid default password and master key. ◮ The design should put security in mind.
◮ Open access to the related software and specification with
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 47
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 48
◮ We present a comprehensive vulnerability analysis of the
◮ Attackers can conduct a variety of attacks including
◮ More attention should be paid to the security threats in the
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 49
[1]
[2]
vehicle based traffic signal control,” in Proceedings of 25th Network and Distributed System Security Symposium (NDSS’18), 2018. [3]
security of traffic infrastructure,” in Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT’14), 2014. [4] Shodan, “Search engine for Internet-connected devices,” https://www.shodan.io/. Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 50
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 51