Towards Quantitative Cybersecurity Risk Assessment in Transportation Infrastructure
-
2022-07-31
Details
-
Creators:
-
Corporate Creators:
-
Corporate Contributors:
-
Subject/TRT Terms:
-
Resource Type:
-
Geographical Coverage:
-
Edition:Final Report
-
Corporate Publisher:
-
Abstract:Along with the emergence of Intelligent Transportation Systems (ITS), cybersecurity in transportation infrastructure plays a key role in ensuring transportation safety and enhancing the infrastructure durability and longevity. Cybersecurity protection in transportation infrastructure however is challenging because ITS are in essential cyber-physical systems where cyber systems and components (computing facilities, communication networks, etc.) are used to control physical systems and components (vehicles, traffic lights, etc.), and impact human individuals (motorists, riders, etc.) as well. It is of critical importance to identify the vulnerabilities of existing cyber infrastructures deployed in ITS, the consequences of an attack, and the resulted safety-related incidents along with their impact on the infrastructure durability/longevity. Considering the broad range of cyberinfrastructures in ITS, this project focuses on the cybersecurity analysis for wireless networks that are deployed in ITS for various sensing applications. We aim to gain deep understandings on i) the challenges and design goals of the wireless networks deployed in representative ITS, and ii) the cybersecurity requirements associated with those wireless solutions. We perform a comprehensive security analysis on those wireless networks in a layer-by-layer fashion to study i) the vulnerabilities and potential attacks that may happen in each layer of the protocol stacks, ii) the advantages and disadvantages of existing countermeasures, and iii) potential solutions to further improve the cybersecurity protection. To counter the attacks on the network topology at the network layer, we develop a suite of Intrusion Detection Systems (IDS) to detect attacks against the routing protocol that could disrupt the stability and availability of the wireless networks. These IDS include ARM (Authenticated Rank and Routing Metric), ARM-Pro and FORCE (Forged Rank and Routing Metric Detector). All these proposed IDS are implemented in the simulation tools and on the real-life testbed for design validation and performance evaluation.
-
Format:
-
Funding:
-
Collection(s):
-
Main Document Checksum:urn:sha-512:59744c9a7d4405a093233a02caf4e3e7cfe24ca4e7b01ca58b92bdec0c7b91c46a8574e4ab8c2b6f4d0e430185fb293d69f58cd399db2f9a0640c7bbfd1a46a6
-
Download URL:
-
File Type: