A man who has an anti-society personality and is a talented hacker taking
laptop and evil intentions with him is walking in the streets of Washington, DC.
Then he stops at the crossroads during rush hour and enters the city's traffic
sensor system through his laptop .After that he lights a cigar, and seems to be
waiting for something.Suddenly he puts out the cigar and quickly presses the key
on Keyboard, after which all the traffic lights in the center of city turn
red.Immediately in less than a minute, vehicles from all direction of the
intersection are out of control and crash into each other which bring the main
routes to gridlock .He makes the spacious streets become a parking lot full of
cars.
However there is a car successfully being pulled out of the chaos
center and fleeing the scene, only leaving the police emergency vehicle trapped
in traffic jam helplessly.
Maybe most people think the above looks good in the Hollywood
blockbuster of anti - Utopian but is impossible in real life .However in fact
,with urban traffic system becoming more and more intelligent ,it can be
true.
Digital security researcher ,Cerrudo Cesar, has led a research in basic
facilities of traffic lights of different cities around the world,including
United States, Britain, Australia, China, and Canada. he has been demonstrate
how he hijacked a traffic light system in dozens of cities of the United States.
Students of Michigan University also said that they have completed a similar
pilot projects to control more than one thousand traffic lights in a city.
How does Cerrudo invade the traffic control system?
There are sensor in the road to monitor the number of cars
Periodically ,and transmit the information to a corresponding traffic access
point. Then the traffic light controller system will collect information from
each access point. According to the information, the central computer will draw
a conclusion of the traffic flow by comparing the different data in two section
of same time. Based on this information, traffic light controller determines how
traffic lights change.
However, the information is directly transmitted to the traffic
management system without any encryption from each traffic access point, which
allows hackers to capture all the information through a special device and
transmitted wirelessly the tampered data to traffic light controller .
Without encryption and protection measures in the process of
transmitting,it will be easy to be hacked .
The vulnerabilities are very attractive to hackers and terrorists,
because the infrastructure can cause more damage, and they are easy to be
hijacked.
A hacker attack with elaborate plan can cause more than half a
million dollars loss.In addition,maintenance costs and labor costs will reach
two million. However compared with the economic losses , the loss of innocent
life can not be measured.Once the attack led to loss of life, it will cause
incalculable human misery.
The intellectual system of the city in future are interconnected,so
that once the intelligent transportation system is under attack, it will be
utilized by hacker as a platform to attack other systems further, which will
trigger a domino effect .
In our country, the intelligent transportation system is the
direction of development of the future transportation system, so the intelligent
transportation product is also the product positioning of the BBM Technology
Co., Ltd. and other professional intelligent traffic lights Manufacturers In
China.
Every technological leap will be reflected in our real life, the
safety of intelligent life is not a personal problem,it also become a socially
concerned problem.
We ,as citizens ,hope more and more manufacturers of intelligent
transportation products can strengthen the safety awareness of products as BBM
by attaching more importance to basic security function of products, so as to
avoid traffic gridlock mentioned at the beginning of article and potential
security problems.
没有评论:
发表评论