Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System

  • Abdullahi ChowdhuryEmail author
  • Gour KarmakarEmail author
  • Joarder KamruzzamanEmail author
  • Tapash SahaEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11149)


Traffic systems and signals are used to improve traffic flow, reduce congestion, increase travel time consistency and ensure safety of road users. Malicious interruption or manipulation of traffic signals may cause disastrous instants including huge delays, financial loss and loss of lives. Intrusion into traffic signals by hackers can create such interruption whose consequences will only increase with the introduction of driverless vehicles. Recently, many traffic signals across the world are reported to have intruded, highlighting the importance of accurate detection. To reduce the impact of an intrusion, in this paper, we introduce an intrusion detection technique using the flow rate and phase time of a traffic signal as evidential information to detect the presence of an intrusion. The information received from flow rate and phase time are fused with the Dempster Shaffer (DS) theory. Historical data are used to create the probability mass functions for both flow rate and phase time. We also developed a simulation model using a traffic simulator, namely SUMO for many types of real traffic situations including intrusion. The performance of the proposed Intrusion Detection System (IDS) is appraised with normal traffic condition and induced intrusions. Simulated results show our proposed system can successfully detect intruded traffic signals from normal signals with significantly high accuracy (above 91%).


Traffic signal Intrusion detection Intelligent Traffic System 


  1. 1.
    Pojani, D., Stead, D.: Sustainable urban transport in the developing world: beyond megacities. Sustainability 7(6), 7784–7805 (2015)CrossRefGoogle Scholar
  2. 2.
    Feng, Y., et al.: Vulnerability of traffic control system under cyber-attacks using falsified data. In: Transportation Research Board 2018 Annual Meeting (TRB) (2018)Google Scholar
  3. 3.
    Yousef, K.M., Al-Karaki, M.N., Shatnawi, A.M.: Intelligent traffic light flow control system using wireless sensors networks. J. Inf. Sci. Eng. 26(3), 753–768 (2010)Google Scholar
  4. 4.
    Khekare, G.S., Sakhare, A.V.: Intelligent traffic system for VANET: a survey. Int. J. Adv. Comput. Res. 2(4), 99–102 (2012)Google Scholar
  5. 5.
    Sundar, R., Hebbar, S., Golla, V.: Implementing intelligent traffic control system for congestion control, ambulance clearance, and stolen vehicle detection. IEEE Sens. J. 15(2), 1109–1113 (2015)CrossRefGoogle Scholar
  6. 6.
    Al-Sakran, H.O.: Intelligent traffic information system based on integration of Internet of Things and Agent technology. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 6(2), 37–43 (2015)Google Scholar
  7. 7.
    Coogan, M.A., et al.: Intercity Passenger Rail in the Context of Dynamic Travel Markets. Transportation Research Board (2016)Google Scholar
  8. 8.
    Mahindra, R., et al.: A practical traffic management system for integrated LTE-WiFi networks. In: Proceedings of the 20th Annual International Conference on Mobile Computing and Networking. ACM (2014)Google Scholar
  9. 9.
    Lakshmi, C.J., Kalpana, S.: Intelligent traffic signaling system. In: 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE (2017)Google Scholar
  10. 10.
    Chowdhury, A. Priority based and secured traffic management system for emergency vehicle using IoT. In: International Conference on Engineering & MIS (ICEMIS). IEEE (2016)Google Scholar
  11. 11.
    Nilsson, G., et al.: Entropy-like Lyapunov functions for the stability analysis of adaptive traffic signal controls. In: 2015 IEEE 54th Annual Conference on Decision and Control (CDC). IEEE (2015)Google Scholar
  12. 12.
    Services, N.T.R.a.M.: The benchmark in urban traffic control (2018). Accessed 6 July 2018
  13. 13.
    Passeri, P.: May 2016 Cyber Attacks Statistics (2016). Accessed 10 June 2018
  14. 14.
    Kaspersky Lab: Kaspersky DDoS Intelligence Report for Q1 2016 (2016). Accessed 10 June 2018
  15. 15.
    OWASP: Category: OWASP Top Ten Project (2016). Accessed 10 June 2018
  16. 16.
    Chawla, A., Patial, R.K., Kumar, D.: Comparative analysis of Sybil attack detection techniques in VANETs. Indian J. Sci. Technol. 9(47) (2016)Google Scholar
  17. 17.
    Chowdhury, Abdullahi: Recent cyber security attacks and their mitigation approaches – an overview. In: Batten, Lynn, Li, Gang (eds.) ATIS 2016. CCIS, vol. 651, pp. 54–65. Springer, Singapore (2016). Scholar
  18. 18.
    Cerrudo, C.: An emerging us (and world) threat: cities wide open to cyber attacks. Securing Smart Cities (2015)Google Scholar
  19. 19.
    Directory, V.G.D.: Traffic signal strategic monitor detector data (2017). Accessed 8 June 2018
  20. 20.
    Ajayi, E.: The Impact of Cyber Crimes on Global Trade and Commerce. Available at SSRN (2016)Google Scholar
  21. 21.
    Poole, A., Kotsialos, A.: Second order macroscopic traffic flow model validation using automatic differentiation with resilient backpropagation and particle swarm optimisation algorithms. Transp. Res. Part C: Emerg. Technol. 71, 356–381 (2016)CrossRefGoogle Scholar
  22. 22.
    Song, J., et al.: Research on car-following model based on SUMO. In: 2014 IEEE 7th International Conference on Advanced Infocomm Technology (ICAIT), IEEE (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Federation University AustraliaBallaratAustralia
  2. 2.VicRoadsKewAustralia

Personalised recommendations