Abstract
With the advancement of modern rail transport systems, high-speed railways’ safety and reliability is improved enormously due to proper intelligent traffic management systems. The automatic train control and operating system receive the train location beacons and the railway line’s essential information through various channels, such as Balise wirelessly. However, this technology is vulnerable to cyber-physical attacks. This article aims to investigate the existing cyber attacks on Balise that can result a physical turmoil. Due to the limitations and constraints of the railway infrastructures, the attacks and failure detection methods are proposed based on machine learning. Also, a fuzzy countermeasure system is developed to improve train safety against known and unknown cyber-attacks. The simulation results show 92% accuracy in the proposed successful attacks detection system. Moreover, a small amount of false-positive and false-negative warnings can be also revealed employing the proposed scheme. The proposed method does not require change railway infrastructure.
Similar content being viewed by others
References
International Union of Railways: Railway statistics synopsis 2020 edition. 33, 2 (2020)
Gheth, W., Rabie, K.M., Adebisi, B., Ijaz, M., Harris, G.: Communication systems of high-speed railway: a survey. Trans. Emerg. Telecommun. Technol. 32, e4189 (2021). https://doi.org/10.1002/ett.4189
Lundberg, P., Prieels, P.: Test specification for Eurobalise FFFIS. Eur. Railw. Agency. 1–341 (2015)
Lim, H.W., Temple, W.G., Tran, B.A.N., Chen, B., Kalbarczyk, Z., Zhou, J.: Data integrity threats and countermeasures in railway spot transmission systems. ACM Trans. Cyber-Physical Syst. 4, 1–26 (2019). https://doi.org/10.1145/3300179
Rannjbar, V., Olsson, N.O.E.: Towards mobile and intelligent railway transport: a review of recent ERTMS related research. In: Computers in Railways XIV. pp. 65–73 (2020)
Wu, Y., Wei, Z., Weng, J., Deng, R.H.: Position manipulation attacks to Balise-based train automatic stop control. IEEE Trans. Veh. Technol. 67, 5287–5301 (2018). https://doi.org/10.1109/TVT.2018.2802444
Guo, H., Wei Sim, J.Z., Veeravalli, B., Lu, J.: Protecting train Balise telegram data integrity. In: 2018 21st International Conference on Intelligent Transportation Systems (ITSC). pp. 806–811. IEEE (2018)
Ronald, L.: Security improvement on Balise-based train control system. Int. J. Adv. Res. Sci. Eng. Technol. 6, 9829–9836 (2019)
Wu, Y., Weng, J., Tang, Z., Li, X., Deng, R.H.: Vulnerabilities, attacks, and countermeasures in Balise-based train control systems. IEEE Trans. Intell. Transp. Syst. 18, 814–823 (2017). https://doi.org/10.1109/TITS.2016.2590579
Temple, W.G., Tran, B.A.N., Chen, B., Kalbarczyk, Z., Sanders, W.H.: On train automatic stop control using balises: attacks and a software-only countermeasure. Proc. IEEE Pacific Rim Int. Symp. Dependable Comput. PRDC. 274–283 (2017). https://doi.org/10.1109/PRDC.2017.52
Falahati, A., Jannati, H.: Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack. Int. J. Ad Hoc Ubiquitous Comput. 22, 71–83 (2016). https://doi.org/10.1504/ijahuc.2016.077199
Jannati, H., Falahati, A.: An RFID search protocol secured against relay attack based on distance bounding approach. Wirel. Pers. Commun. 85, 711–726 (2015). https://doi.org/10.1007/s11277-015-2804-5
Lauer, M., Stein, D.: A train localization algorithm for train protection systems of the future. IEEE Trans. Intell. Transp. Syst. 16, 970–979 (2015). https://doi.org/10.1109/TITS.2014.2345498
Xu, Z., Wang, W., Sun, Y.: Performance degradation monitoring for onboard speed sensors of trains. IEEE Trans. Intell. Transp. Syst. 13, 1287–1297 (2012). https://doi.org/10.1109/tits.2012.2188629
Malvezzi, M., Vettori, G., Allotta, B., Pugi, L., Ridolfi, A., Cuppini, F., Salotti, F.: Train position and speed estimation by integration of odometers and IMUs. 9th World Congr. Railw. Res. 22–26 (2011)
Systems, T.C.: A novel intrusion detection model using a fusion of network and device states for communication-based train control systems. (2020). https://doi.org/10.3390/electronics9010181
Chi, M., Bu, B., Wang, H., Lv, Y., Yi, S., Yang, X., Li, J.: Multi-channel man-in-the-middle attack against communication-based train control systems: attack implementation and impact. In: Lecture Notes in Electrical Engineering. pp. 129–139 (2020)
Gao, B., Bu, B.: A novel intrusion detection method in train-ground communication system. IEEE Access 7, 178726–178743 (2019). https://doi.org/10.1109/ACCESS.2019.2958198
Harshan, J., Chang, S.-Y., Kang, S., Hu, Y.-C.: Securing balise-based train control systems using cryptographic random fountains. In: 2017 IEEE Conference on Communications and Network Security (CNS). pp. 405–410. IEEE (2017)
Thamilarasu, G., Sridhar, R.: Intrusion detection in RFID systems. In: MILCOM 2008 - 2008 IEEE Military Communications Conference. pp. 1–7. IEEE (2008)
Torchio, R., Cirimele, V., Alotto, P., Freschi, F.: Modelling of road–embedded transmitting coils for wireless power transfer. Comput. Electr. Eng. 88, 106850 (2020). https://doi.org/10.1016/j.compeleceng.2020.106850
Hosseini, S., Zade, B.M.H.: New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Comput. Networks 173, 107168 (2020). https://doi.org/10.1016/j.comnet.2020.107168
Libor Hadacek, Lenka Sivakova, Radovan Sousek, Mikael Zeegers: Assessment of security risks in railway transport using the fuzzy logical deduction method. Commun. - Sci. Lett. Univ. Zilina. 22, 79–87 (2020). https://doi.org/10.26552/com.C.2020.2.79-87
P Sangameswar Raju, Nikhath, F.J., Farook, S., Raju, P.S., Nikhath, F.J., Farook, S.: Automatic train operation and control using MATLAB. Int. J. Electr. Electron. Eng. Telecommun. 2, 148–155 (2013)
de Mooij, N.. A.: How to optimize train performance during delays with the use of intelligent automation, (2018)
Wardoyo, R., Afifa, L.N.: Computing the time complexity of ANFIS algorithm. Int. J. Adv. Res. Comput. Eng. Technol. 7, 132–135 (2018)
Canedo, E.D., Mendes, B.C.: Software requirements classification using machine learning algorithms. Entropy. 22, (2020). https://doi.org/10.3390/E22091057
Orponen, P.: Computational complexity of neural networks: a survey. Nord. J. Comput. 8, 99–117 (1995)
Lakshminarayana, S., Karachiwala, J.S., Chang, S.-Y., Revadigar, G., Kumar, S.L.S., Yau, D.K.Y., Hu, Y.-C.: Signal jamming attacks against communication-based train control. In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks. pp. 160–171. ACM, New York, NY, USA (2018)
Moon, S., Park, S., Lee, J.-H., Lee, Y.: Rapid Balise telegram decoder with modified LFSR architecture for train protection systems. IEEE Trans. Circuits Syst. II Express Briefs. 7747, 1–1 (2018) https://doi.org/10.1109/TCSII.2018.2844731
Falahati, A., Jannati, H.: All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices. Electron. Commer. Res. 15, 75–95 (2015). https://doi.org/10.1007/s10660-014-9167-y
Jannati, H., Falahati, A.: Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel. Inf. Process. Lett. 115, 623–629 (2015). https://doi.org/10.1016/j.ipl.2015.02.012
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Falahati, ., Shafiee, E. Improve Safety and Security of Intelligent Railway Transportation System Based on Balise Using Machine Learning Algorithm and Fuzzy System. Int. J. ITS Res. 20, 117–131 (2022). https://doi.org/10.1007/s13177-021-00274-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13177-021-00274-1