Understanding the Security of Traffic Signal Infrastructure
Zhenyu Ning, Fengwei Zhang, and Stephen Remias
COMPASS Lab Wayne State University
DIMVA, June 19, 2019
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 1
Understanding the Security of Traffic Signal Infrastructure Zhenyu - - PowerPoint PPT Presentation
Understanding the Security of Traffic Signal Infrastructure Zhenyu Ning , Fengwei Zhang, and Stephen Remias COMPASS Lab Wayne State University DIMVA, June 19, 2019 Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 1
COMPASS Lab Wayne State University
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 1
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 2
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 3
◮ Traditional traffic signal systems use rotating gears and wheels
◮ Modern traffic signal systems have achieved an efficient
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 4
source: https://www.orangetraffic.com/product/mtq-traffic-light-distribution-and-control-cabinet/ Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 5
source: https://www.orangetraffic.com/product/mtq-traffic-light-distribution-and-control-cabinet/ Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 6
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 7
◮ Previous research mainly focus on the traffic controller and
◮ However, traffic signal systems are actually comprised of many
et, al.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 8
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 9
◮ A modern traffic signal systems is comprised of many
◮ These components are normally placed in a roadside cabinet. ◮ Cabinet standards are applied to the components inside the
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 10
◮ Build upon a Linux kernel with BusyBox. ◮ Directly controls the traffic signals with specific software. ◮ E.g., Intelight Model 2070 ATCs and Siemens Model 60 ATCs.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 11
◮ Malfunction Management Unit (MMU) in TS-2 Standard. ◮ Cabinet Monitor Unit (CMU) in ITS Standard.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 12
ATC Controlling MMU/CMU Monitoring
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 13
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 14
ATC Controlling MMU/CMU Monitoring
ATC Controlling MMU/CMU Monitoring
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 15
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 16
ATC Controlling MMU/CMU Controlling
◮ In Programming Card, the conflict status is defined by
◮ Datakey is an EEPROM memory device.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 17
source: https://www.flickr.com/photos/robklug/5617557995/in/photostream/ Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 18
source: https://manualzz.com/doc/8353064/888-1212-001-monitorkey-operation-manual Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 19
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 20
◮ Methodology: Partnering with a municipality in USA. ◮ Analysis Environment:
◮ Devices:
MMU-16LE.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 21
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 22
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 23
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 24
◮ Surveillance Camera ◮ Cabinet Lock ◮ Cabinet Door Status Monitoring
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 25
◮ There are 750 vehicle intersections in the municipality. ◮ 275 vehicle intersections are covered by traffic cameras. ◮ More than 60% of the intersections are out of surveillance.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 26
◮ However, the Corbin #2 master key is sold online. ◮ The sold key is marked with the ability to open most traffic
◮ With $5 USD, we are able to open all cabinets in the
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 27
◮ ATC send query message to CMU to get the door status. ◮ In real-world deployment,
minute.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 28
◮ Surveillance Camera
◮ Cabinet Lock
◮ Cabinet Door Status Monitoring
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 29
◮ Previous work [3] has shown that the wireless communication
◮ We find that both types of ATCs use default credentials for
ATC over SSH.
◮ The public IP addresses of a number of ATCs can be
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 30
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 31
◮ The signal pattern can be configured by the control buttons
◮ No authentication is activated in analyzed ATCs.
partnering municipality didn’t do so.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 32
◮ Directly write commands to the serial ports.
◮ Manipulate the driver of the front panel.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 33
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 34
◮ For MMU, resolder the wire jumpers of the programming
◮ For CMU, reconfigure the parameters stored in the Datakey.
Uno starter-kit.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 35
◮ With remote only access, we are not able to bypass the
◮ We design a transient avoidance tactic to fight the fail-safe
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 36
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 37
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 38
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 39
◮ Stealthy Manipulation and Control
◮ Ransomware Deployment
◮ All-Direction Green Lights
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 40
◮ In a certain time window, the duration of green light is
◮ In practice, 24ms green light on-time with 17ms off-time will
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 41
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 42
◮ Avoid default password and master key. ◮ The design should put security in mind.
◮ Open access to the related software and specification with
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 43
◮ Introduction ◮ Background ◮ Security Analysis ◮ Attacks and Mitigations ◮ Conclusion
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 44
◮ We present a comprehensive vulnerability analysis of the
◮ Attackers can conduct a variety of attacks including
◮ More attention should be paid to the security threats in the
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 45
[1]
[2]
vehicle based traffic signal control,” in Proceedings of 25th Network and Distributed System Security Symposium (NDSS’18), 2018. [3]
security of traffic infrastructure,” in Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT’14), 2014. [4] Shodan, “Search engine for Internet-connected devices,” https://www.shodan.io/. Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 46
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 47
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 48
◮ The TS-2 Cabinet Standard was initially commissioned by
◮ The ITS Cabinet Standard is designed to supersede the
Transportation Officials (AASHTO), Institute of Transportation Engineers (ITE), and NEMA.
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 49
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 50
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 51
◮ Due to the geography that must be covered, the deployed
◮ Redundant protocols are not used due to extra cost of
◮ Troubleshooting process of the traffic system mainly focus on
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 52
Understanding the Security of Traffic Signal Infrastructure, DIMVA 19 53