2015年12月18日星期五

Urban Crisis Hidden Behind The Intelligent Transportation

   A man who has an anti-society personality and is a talented hacker taking laptop and evil intentions with him is walking in the streets of Washington, DC. Then he stops at the crossroads during rush hour and enters the city's traffic sensor system through his laptop .After that he lights a cigar, and seems to be waiting for something.Suddenly he puts out the cigar and quickly presses the key on Keyboard, after which all the traffic lights in the center of city turn red.Immediately in less than a minute, vehicles from all direction of the intersection are out of control and crash into each other which bring the main routes to gridlock .He makes the spacious streets become a parking lot full of cars.
  
   However there is a car successfully being pulled out of the chaos center and fleeing the scene, only leaving the police emergency vehicle trapped in traffic jam helplessly.
  
     
   Maybe most people think the above looks good in the Hollywood blockbuster of anti - Utopian but is impossible in real life .However in fact ,with urban traffic system becoming more and more intelligent ,it can be true.
  
   Digital security researcher ,Cerrudo Cesar, has led a research in basic facilities of traffic lights of different cities around the world,including United States, Britain, Australia, China, and Canada. he has been demonstrate how he hijacked a traffic light system in dozens of cities of the United States. Students of Michigan University also said that they have completed a similar pilot projects to control more than one thousand traffic lights in a city.
  
  How does Cerrudo invade the traffic control system?
  
 
   There are sensor in the road to monitor the number of cars Periodically ,and transmit the information to a corresponding traffic access point. Then the traffic light controller system will collect information from each access point. According to the information, the central computer will draw a conclusion of the traffic flow by comparing the different data in two section of same time. Based on this information, traffic light controller determines how traffic lights change.
  
   However, the information is directly transmitted to the traffic management system without any encryption from each traffic access point, which allows hackers to capture all the information through a special device and transmitted wirelessly the tampered data to traffic light controller .
        
   Without encryption and protection measures in the process of transmitting,it will be easy to be hacked .
  
   The vulnerabilities are very attractive to hackers and terrorists, because the infrastructure can cause more damage, and they are easy to be hijacked.
  
       
   A hacker attack with elaborate plan can cause more than half a million dollars loss.In addition,maintenance costs and labor costs will reach two million. However compared with the economic losses , the loss of innocent life can not be measured.Once the attack led to loss of life, it will cause incalculable human misery.
  
   The intellectual system of the city in future are interconnected,so that once the intelligent transportation system is under attack, it will be utilized by hacker as a platform to attack other systems further, which will trigger a domino effect .
  
   In our country, the intelligent transportation system is the direction of development of the future transportation system, so the intelligent transportation product is also the product positioning of the BBM Technology Co., Ltd. and other professional intelligent traffic lights Manufacturers In China.
  
  Every technological leap will be reflected in our real life, the safety of intelligent life is not a personal problem,it also become a socially concerned problem.

 
  We ,as citizens ,hope more and more manufacturers of intelligent transportation products can strengthen the safety awareness of products as BBM by attaching more importance to basic security function of products, so as to avoid traffic gridlock mentioned at the beginning of article and potential security problems.

没有评论:

发表评论