We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Hacking Traffic Lights

00:00

Formal Metadata

Title
Hacking Traffic Lights
Title of Series
Number of Parts
374
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
New systems are connected to the internet every day to make our lives easier or more comfortable. We are starting to see connected traffic and smart traffic lights innovations to improve traffic flow, safety and comfort. With smart systems entering and controlling our physical world, ethical hacking such systems to find possible ways of manipulation becomes even more important to society. In the Netherlands there are some public innovations where traffic light systems are being connected to smartphone apps. We have looked at these innovations to see if these systems could be manipulated and how manipulation could benefit an attacker. Specifically, we found a way in two different platforms, that allows us to successfully fake a continuous flow of bicyclists that turns the cyclist traffic light instantly green or decreases the time to green. More than 10 municipalities in the Netherlands connected a part of their cyclist traffic lights to the affected platforms. It was possible to perform these hacks from any remote location, which allows someone to remotely influence the traffic at scale. The hack results in turning the cyclists lights to green, while other lights on the intersection will turn to red. The regular security systems that make sure lights are not turned green simultaneously stays intact. There are similar projects that turn the car traffic lights green for ambulances or trucks. If an attacker succeeds to exploit these projects with a similar attack, he could remotely influence the car traffic lights directly.
Asynchronous Transfer ModeInformationComputing platformHacker (term)Mobile appTotal S.A.Conditional-access moduleMessage passingContent (media)Position operatorIdentifiabilityPhysical systemInformation securityCycle (graph theory)Order (biology)SoftwareContext awarenessDataflowObject (grammar)Position operatorMessage passingComa BerenicesMobile appInternet der DingeGreen's functionSign (mathematics)GoogolTotal S.A.Information1 (number)FrequencyMultiplicationMereologyType theoryConnected spaceCartesian coordinate systemComputing platformDifferent (Kate Ryan album)Point cloudMultiplication signStandard deviationNeuroinformatikService (economics)Traffic reportingProjective planeView (database)Public key certificatePoint (geometry)Right angleLatent heatExpert systemSoftware testingHacker (term)State of matterConditional-access moduleDivisorMalwareComputer animation
Information securityMessage passingHacker (term)Asynchronous Transfer ModeRange (statistics)Computer-generated imageryModule (mathematics)Object (grammar)Conditional-access moduleFunction (mathematics)Suite (music)Front and back endsPhysical systemScripting languageKey (cryptography)Standard deviationSystem programmingProcess (computing)ImplementationBlock (periodic table)AuthenticationConditional-access moduleFunctional (mathematics)Multiplication signAndroid (robot)Physical systemOcean currentContext awarenessExistencePresentation of a groupReal numberHacker (term)Mobile appMoment (mathematics)Information securityCartesian coordinate systemAuthorizationEmailInformationAnalytic continuationLoop (music)PhysicalismForm (programming)Arithmetic meanType theoryRight angleDataflowCycle (graph theory)Order (biology)Scripting languageConnected spaceStandard deviationDifferent (Kate Ryan album)MereologySign (mathematics)Information privacyMessage passingTwitterGreen's functionSoftware6 (number)Front and back endsSimilarity (geometry)Slide ruleDemo (music)Server (computing)Group actionBlock (periodic table)AuthenticationGoodness of fitVideoconferencingCASE <Informatik>Object (grammar)Beta functionSystem callHoaxLetterpress printingComputer animation
Asynchronous Transfer ModeComputer animation
Transcript: English(auto-generated)