Time
May 2017 – August 2017
Related publications
- Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, and Henry X. Liu, One Car to Block Them All: Exposing Congestion Attack on CV-based Traffic Signal Control, To appear in The Network and Distributed System Security Symposium 2018 (NDSS’ 2018), San Diego, United States, February 2018
- Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, and Henry X. Liu: Exposing Falsified Data Attacks on CV-based Traffic Signal Control, Poster in 26th USENIX Security Symposium (USENIX Security’17), Vancouver, BC, Canada, August 2017
Summary
I worked with Prof. Z. Morley Mao and her Ph.D. student, Qi Alfred Chen at University of Michigan, on a project called “Security Analysis of Connected Vehicle (CV) based Traffic Control System”. In this project, we performed the first detailed security analysis of one representative next-generation CV-based transportation system chosen by USDOT called Intelligent Traffic Signal System (I-SIG). Our overall goal is to try to exploit the vulnerabilities of the system (especially, causing congestion on the road) through sending only one vehicle’s spoofed message. Our related paper “One Car to Block Them All: Exposing Congestion Attack on CV-based Traffic Signal Control” has been accepted by NDSS 2018 and our related poster has been accepted by USENIX Security’17.
Background
- The development of Connected Vehicle (CV) technology
- Improve transportation mobility efficiency
- Come with cyber attack
- Target one USDOT sponsored CV-based traffic control system
- Multi-Modal Intelligent Traffic Safety System (MMITSS)
- CV data spoofing with one single attack car
- Security analysis of the CV-based traffic control system
- Congestion (attack highly effective, focus of this paper)
- Personal Gain (not included, more efforts and time needed)
- Safety (not included, more efforts and time)
The blocking effect of congestion attack
- Vulnerability analysis
- Brute force attack (try all data spoofing options)
- Analyze high effective cases and design attack strategy (limitations of computation power)
- Construct practical exploits and evaluate under real-world situations
Example of an arrival table
Details
NDSS submission contribution
- Implement an attack from the pedestrian app (not included)
- Brute force result analysis
- Small-scale analysis (70 cases) (2-stage, 5-stage; full, transition)
- Standard analysis (~900 cases) (2-stage, 5-stage; full, transition)
- Exploit implementation
- Congestion (2-stage, 5-stage; full, transition)
- Personal Gain (2-stage, 5-stage; full, transition) (not included)
- Experiment setup and post result analysis
- Setup experiment environment
- Post result analysis
- All parts implemented in C++
Attack from the pedestrian app (not included)
- Attacker side
- Receive ped map from MMITSS ped map broadcast
- Bypass error check
- Send a phase No. to PedRequestServer
- RSU (Road-Side Unit) side
- Receive ped request phase
- Send it to controller
Brute force result analysis
- Brute force attack implemented by Alfred
- Evaluate brute force attack effect
- Congestion
- For each snapshot, total travel time Increases
- 2-stage, 5-stage
- Full deployment, transition period (EVLS)
- Personal gain (not included)
- For each vehicle, travel time decreases
- 2-stage, 5-stage
- Full deployment, transition period (EVLS)
Brute force analysis example (congestion)
Exploit Implementation
- Design strategy
- Code implementation
- Attack evaluation (strategic attack analysis; comparison with brute force)
- Repeat step 1-3 to iteratively improve the strategy


Experiment setup
Experiment post result analysis
Congestion time increases example
Attack total vehicle #: 3888
Total delay w/o attack: 104365
Delay time inc. (abs): 253830
Delay time inc. (%): 243.2
Per vehicle analysis example
Future work
- Personal gain, safety analysis
- Combine pedestrian calls into whole system
- Defense directions based on the analysis
- Robust algorithm design for the transition period
- Performance improvement for RSUs
- Data spoofing detection using infrastructure-controlled sensor
Related code
You can contact me if you want to see the actual implementation. I can add you to the private Github repo.