Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control

Similar documents
Emerging Connected Vehicle based

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Green Lights Forever: Analyzing the Security of Traffic Infrastructure

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities

USDOT CONNECTED VEHICLE PILOT. ITS Midwest 2017 September 19, 2017

ITS 5C Summit. Operationalizing Connected Vehicle Services

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use

Security for V2X Communications

Industry 4.0 & Transport for Digital Infrastructure

Upgrading Traffic Signals to Enable a Connected Vehicle Test Bed Somerville, Massachusetts

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Leadership. 25 years leading in cyber. 165,000 trained since ,000+ students annually

Stuck in Traffic (SiT) Attacks

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

NCHRP Project Impacts of Connected Vehicles and Automated Vehicles on State and Local Transportation Agencies

Common transportation user experience through unified fundamental data definition and movement from mobile elements, to roadside, to centers.

A New Security Model for the IoE World. Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization

External Supplier Control Obligations. Cyber Security

Connected Vehicle (CV) Technology Procurement State of the Practice Analysis

Identity-Based Cyber Defense. March 2017

LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT

Power Grid Resilience, Reliability and Security Research at Idaho National Laboratory

Singapore Autonomous Vehicle Initiative (SAVI)

Planning for Connectivity in a Maturing Connected Environment

IT SECURITY FOR NONPROFITS

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

Cybersecurity with Automated Certificate and Password Management for Surveillance

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

CYBER SECURITY WHITEPAPER

Introducing Cyber Observer

Examining future priorities for cyber security management

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Next Generation Distribution Automation Phase III, Intelligent Modern Pole (IMP) Field Demonstration

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Threat Centric Vulnerability Management

Cyber Security: Threat and Prevention

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Managing Cybersecurity Risk

Deception: Deceiving the Attackers Step by Step

Dom Nessi Burns Engineering March 29, 2017 CYBERSECURITY TRENDS 2017 REPORT

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

A SMART PORT CITY IN THE INTERNET OF EVERYTHING (IOE) ERA VERNON THAVER, CTO, CISCO SYSTEMS SOUTH AFRICA

Network Access Control and VoIP. Ben Hostetler Senior Information Security Advisor

SPaT Challenge Overview and Lessons Learned

V2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Multi-Sector Urban System Initiatives

RiskSense Attack Surface Validation for IoT Systems

Machine-Powered Learning for People-Centered Security

CIP Security Pull Model from the Implementation Standpoint

Enterprise D/DoS Mitigation Solution offering

Deploy Symantec Cloud Workload Protection for Storage

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Cybersecurity, Trade, and Economic Development

David Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque, NM

6 KEY SECURITY REQUIREMENTS

THEA CV PILOT OVERVIEW, STATUS, CHALLENGES, AND LESSONS LEARNED

ARC-IT v8 Workshop ARC-IT TOOL SET

MIOVISION DEEP LEARNING TRAFFIC ANALYTICS SYSTEM FOR REAL-WORLD DEPLOYMENT. Kurtis McBride CEO, Miovision

Security Gap Analysis: Aggregrated Results

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

The Value of Automated Penetration Testing White Paper

Overview of Challenges in VANET

Office 365 Buyers Guide: Best Practices for Securing Office 365

Future Trends in ITS Industry view

Secure Development Lifecycle

CompTIA Security+ Study Guide (SY0-501)

Session 5311 Critical Testing Programs for Security Operations

Security & Phishing

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Kaspersky Security Network

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

Bridging The Gap Between Industry And Academia

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Transportation Security Risk Assessment

Interdomain Routing Design for MobilityFirst

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Regional TSM&O Vision and ITS Architecture Update

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

NEXT GENERATION SECURITY OPERATIONS CENTER

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

CYBER RESILIENCE & INCIDENT RESPONSE

DHS Automated Information Sharing (AIS) Program

Where are we with C-ITS today? Joint CIMEC/CODECS City Pool workshop Barcelona, 14 November 2016

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Project Overview Mapping Technology Assessment for Connected Vehicle Highway Network Applications

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

Symantec Advanced Threat Protection: Endpoint

HUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series

Verizon Software Defined Perimeter (SDP).

SMARTATL. A Smart City Overview and Roadmap. Evanta CIO Executive Summit 1

n Explain penetration testing concepts n Explain vulnerability scanning concepts n Reconnaissance is the first step of performing a pen test

Are we breached? Deloitte's Cyber Threat Hunting

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

How to Create, Deploy, & Operate Secure IoT Applications

Cisco Advanced Malware Protection. May 2016

Battle between hackers and machine learning. Alexey Lukatsky Cybersecurity Business Consultant April 03, 2019

Transcription:

Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu University of Michigan

Background: Connected Vehicle technology Wirelessly connect vehicles & infrastructure Goal: Dramatically improve mobility, safety, environmental impact, & public agency operations Mobility CV technology OBU Safety Environmental impact RSU 2 Public agency operations CV = Connected Vehicle OBU = On-Board Unit RSU = Road-Side Unit

Background: Recent advances Will soon transform transportation systems today 2016.9, USDOT launched CV Pilot Program National effort to deploy, test, & operationalize CV-based transportation systems Launched in 3 sites CV = Connected Vehicle 3 USDOT = United States Department of Transportation

Cybersecurity of CV-based transportation However, such dramatically increased connectivity also opens a new door for cyber attacks Highly important to understand potential security vulnerabilities & new security challenges Need to ensure security & safety for vehicles, transportation infrastructure, drivers & pedestrians Need to perform study now so that they can be proactively addressed before nationwide deployment 4

First security analysis of CV-based transp. Target: Intelligent Traffic Signal System (I-SIG) Use real-time CV data for intelligent signal control USDOT sponsored design & impl. Fully implemented & tested in Anthem, AZ, & Palo Alto, CA 26.6% reduction in total vehicle delay Under deployment in NYC and Tampa, FL RSU Real-time CV data I-SIG Control 5 CV = Connected Vehicle OBU = On-Board Unit RSU = Road-Side Unit

Threat model Malicious vehicle owners deliberately control the OBU to send spoofed data OBU is compromised physically 1, wirelessly 2, or by malware 3 Can only spoof data, e.g., location & speed Can t spoof identity due to USDOT s vehicle certificate system Malicious vehicle owner Spoofed CV data RSU Real-time CV data I-SIG Control Influence signal control 6 1 Koscher et al.@ieee S&P 10 2 Checkoway et al.@usenix Security'11 3 Mazloom et al.@usenix WOOT 16

Attack goal Create traffic congestion Increase total delay of vehicles in the intersection Directly subvert the design goal of I-SIG Damage: City functions & individual (wasted fuel, time) Incentive: Politically or financially 7

Analysis approach overview Source code Analysis of Attack input data flow Data spoofing strategies Traffic snapshots from simulator Dynamic analysis Spoofing option enum Increased delay calc Real-time attack requirement (e.g., decision time 4 sec) Spoofing w/ top delay inc Congestion creation vuln. Exploit construction 8 Congestion creation exploit

Analysis result summary Source code Traffic snapshots from simulator Analysis of Attack input data flow Data spoofing strategies Dynamic analysis Spoofing option enum 2 strategies Increased delay calc Real-time attack requirement (e.g., decision time 4 sec) 2 types of vuln.: #1: Curse of transition period #2: Last vehicle advantage Spoofing w/ top delay inc Congestion creation vuln. Exploit construction 9 Congestion creation exploit

Vuln #1: Curse of transition period I-SIG has 2 operation modes based on PR: PR 95%, full deployment: Directly run an optimal signal planning algorithm PR < 95%, transition: The optimal algorithm becomes ineffective, use an unequipped vehicle estimation algorithm as pre-step Yes (full deployment period) PR 95% No (transition period) Unequipped vehicle estimation Vulnerable Optimal signal planning algorithm PR = Penetration Rate 10

Vulnerable queue estimation Find the queue estimation part highly vulnerable Data from one single attack vehicle can add a queue with tens of ghost vehicles Cause delay increased by 20-50%, sometimes even > 70% Spoof the vehicle location! Est. queue length = 3 Est. queue length = 7 11

An urgent & fundamental problem An urgent problem for the current design Transition period is unavoidable, and long (25-30 yrs est. by USDOT) First thing needs to be resolved for its deployment in practice Fundament cause: Lack a sufficiently robust signal control algorithm for the transition period Low PR is inherently more sensitive to data spoofing Fundamentally more challenging to ensure robustness Need joint research effort in both transportation & security communities 12 USDOT = United States Department of Transportation PR = Penetration Rate

Full deployment period is secure? PR 95% Yes (full deployment period) No (transition period) Unequipped vehicle estimation Vulnerable Vulnerable Optimal signal planning algorithm PR = Penetration Rate 13

Vuln #2: Last vehicle advantage Vulnerability: Latest arriving vehicle determines signal plan Attack: Spoof to arrive as late as possible to increase the delay of queuing vehicles in other directions Fundamental cause: Security vs deployability trade-off Limited decision time forces choice of a sub-optimal config. Such sub-optimal config unexpectedly exposes such vuln. Spoof to arrive as late as possible! Delay++ Green light Green length light length Green Green light light length length 14 More optimal

Attack video demo Demo time! 15

Defense discussion Robust algorithm design for the transition period Inherently challenging, need joint research efforts in both transportation & security communities Speed-up control algorithm to avoid sub-optimal config. E.g., offload computation to a nearby workstation or cloud Data spoofing detection using infrastructure-controlled sensors, e.g., camera Cross check validity of driving data from OBUs 16 CV = Connected Vehicle OBU = On-Board Unit RSU = Road-Side Unit

Conclusion The first security analysis of a CV based transportation system, I-SIG Discover new vulnerability & analyze causes Current control algorithm design & config. are highly vulnerable Construct & evaluate exploits to show the severity in practice Propose defense directions based on the analysis insights Hope to inspire follow-up studies E.g., other attack goals, other types of CV systems (60+ open sourced), defense solutions Reported to USDOT CV Pilot Program office & sites (NYC and Tampa) CV = Connected Vehicle https://tinyurl.com/congestion-attack 17 USDOT = United States Department of Transportation

Questions? 18