{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:13:29Z","timestamp":1726031609080},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030220372"},{"type":"electronic","value":"9783030220389"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22038-9_8","type":"book-chapter","created":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T19:02:31Z","timestamp":1560106951000},"page":"154-174","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Understanding the Security of Traffic Signal Infrastructure"],"prefix":"10.1007","author":[{"given":"Zhenyu","family":"Ning","sequence":"first","affiliation":[]},{"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Remias","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,6]]},"reference":[{"key":"8_CR1","unstructured":"2070 ATC (Advanced Transportation Controllers) Equipment Parts and Accessories. \n                      http:\/\/esbd.cpa.state.tx.us\/bid_show.cfm?bidid=139594\n                      \n                    . Accessed 31 May 2017"},{"key":"8_CR2","unstructured":"Search Federal, State, and Local Government Contracts, Government Bids, and RFPs. \n                      https:\/\/www.bidcontract.com\/government-contracts-bids\/search-government-Bids-Contracts.aspx?s=2070&t=FE&is=0\n                      \n                    . Accessed 31 May 2017"},{"key":"8_CR3","unstructured":"The Traffic Signal Museum: Eagle Signal Model EF-15 Traffic Controller (2015). \n                      http:\/\/www.trafficsignalmuseum.com\/pages\/ef15.html"},{"key":"8_CR4","unstructured":"1103 v03 - NTCIP Transportation Management Protocols (TMP) v03 (2017). \n                      https:\/\/www.ntcip.org\/library\/standards\/default.asp?documents=yes&qreport=no&standard=1103%20v03"},{"key":"8_CR5","unstructured":"AASHTO: American association of state highway and transportation officials. \n                      https:\/\/www.transportation.org\/"},{"key":"8_CR6","unstructured":"AASHTO, ITE, and NEMA: Advanced transportation controller application programming interface reference implementation software user manual (2015). \n                      https:\/\/www.ite.org\/pub\/?id=31058d5b-ccfb-5b00-30d1-61c715ada9a4"},{"key":"8_CR7","unstructured":"AASHTO, ITE, and NEMA: Advanced Transportation Controller (ATC) standard version 06 (2018). \n                      https:\/\/www.ite.org\/pub\/?id=acaf6aca-d1fd-f0ec-86ca-79ad05a7cab6"},{"key":"8_CR8","unstructured":"Arduino: Starter kit. \n                      https:\/\/store.arduino.cc\/usa\/arduino-starter-kit\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR9","unstructured":"ATEK Access Technologies: Access the power of technology. \n                      http:\/\/atekcompanies.com\/access-technologies\n                      \n                    . Accessed 31 May 2017"},{"key":"8_CR10","unstructured":"ATEK Access Technologies: Datakey microwire protocol specification (2014). \n                      http:\/\/datakey.com\/downloads\/223-0017-003_REVI_MWInterfaceSpec_SBM.pdf"},{"key":"8_CR11","unstructured":"ATEK Access Technologies: Datakey LCK series specification sheet (2015). \n                      http:\/\/datakey.com\/downloads\/LCK_Series_DS_REV.D.pdf"},{"key":"8_CR12","unstructured":"Boston Transportation Department: The benefits of retiming\/rephasing traffic signals in the back bay. \n                      https:\/\/www.cityofboston.gov\/images_documents\/The%20Benefits%20of%20Traffic%20Signal%20Retiming%20Report_tcm3-18554.pdf\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR13","unstructured":"Cerrudo, C.: Hacking US (and UK, Australia, France, etc.) Traffic Control Systems. IOActive Blog (2014)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Chen, Q.A., Yin, Y., Feng, Y., Mao, Z.M., Liu, H.X.: Exposing congestion attack on emerging connected vehicle based traffic signal control. In: Network and Distributed Systems Security (NDSS) Symposium 2018 (2018)","DOI":"10.14722\/ndss.2018.23222"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Cozzi, E., Graziano, M., Fratantonio, Y., Balzarotti, D.: Understanding Linux malware. In: IEEE Symposium on Security & Privacy (2018)","DOI":"10.1109\/SP.2018.00054"},{"key":"8_CR16","unstructured":"Eberle Design, Inc.: CMU-212. \n                      https:\/\/www.editraffic.com\/wp-content\/uploads\/888-0212-001-CMU-212-Operation-Manual.pdf\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR17","unstructured":"Eberle Design, Inc.: MMU-16LE series SmartMonitor. \n                      https:\/\/www.editraffic.com\/wp-content\/uploads\/888-0116-001-MMU-16LE-Operation-Manual.pdf\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR18","unstructured":"Eberle Design, Inc.: Traffic control software. \n                      https:\/\/www.editraffic.com\/support-traffic-control-software\/\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR19","unstructured":"Fourth Dimension Traffic: The D4 traffic signal controller software. \n                      https:\/\/fourthdimensiontraffic.com\/about\/about.html\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR20","unstructured":"Ghena, B., Beyer, W., Hillaker, A., Pevarnek, J., Halderman, J.A.: Green lights forever: analyzing the security of traffic infrastructure. In: 8th USENIX Workshop on Offensive Technologies (WOOT 2014). USENIX Association, San Diego (2014). \n                      https:\/\/www.usenix.org\/conference\/woot14\/workshop-program\/presentation\/ghena"},{"issue":"4","key":"8_CR21","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1504\/IJAHUC.2014.066419","volume":"17","author":"K Grover","year":"2014","unstructured":"Grover, K., Lim, A., Yang, Q.: Jamming and anti-jamming techniques in wireless networks: a survey. Int. J. Ad Hoc Ubiquit. Comput. 17(4), 197\u2013215 (2014)","journal-title":"Int. J. Ad Hoc Ubiquit. Comput."},{"key":"8_CR22","unstructured":"Institute of Transportation Engineers: About the institute of transportation engineers. \n                      http:\/\/www.ite.org\/aboutite\/index.asp"},{"key":"8_CR23","unstructured":"Institute of Transportation Engineers: Standard specification for roadside cabinets (2006). \n                      https:\/\/www.ite.org\/pub\/E26A4960-2354-D714-51E1-FCD483B751AA"},{"key":"8_CR24","unstructured":"Intelight: 2070 ATC controllers. \n                      https:\/\/www.intelight-its.com\/product-categories\/2070-type-controllers\/\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR25","unstructured":"Koonce, P., et al.: Traffic signal timing manual. Technical report (2008)"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Laszka, A., Potteiger, B., Vorobeychik, Y., Amin, S., Koutsoukos, X.: Vulnerability of transportation networks to traffic-signal tampering. In: Proceedings of the 7th ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS 2016), pp. 1\u201310. IEEE (2016)","DOI":"10.1109\/ICCPS.2016.7479122"},{"issue":"1","key":"8_CR27","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1049\/iet-cps.2016.0017","volume":"1","author":"Z Li","year":"2016","unstructured":"Li, Z., Jin, D., Hannon, C., Shahidehpour, M., Wang, J.: Assessing and mitigating cybersecurity tisks of traffic light systems in smart cities. IET Cyber-Phys. Syst. Theory Appl. 1(1), 60\u201369 (2016)","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"key":"8_CR28","unstructured":"National Electrical Manufacturers Association: Standards publication TS 2-2003 (2003). \n                      https:\/\/www.nema.org\/Standards\/ComplimentaryDocuments\/Contents%20and%20Scope%20TS%202-2003%20(R2008).pdf"},{"key":"8_CR29","unstructured":"NEMA: National electrical manufacturers association. \n                      https:\/\/www.nema.org\/pages\/default.aspx"},{"issue":"2","key":"8_CR30","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","volume":"13","author":"K Pelechrinis","year":"2011","unstructured":"Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245\u2013257 (2011)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"8_CR31","unstructured":"Shodan: Search engine for Internet-connected devices. \n                      https:\/\/www.shodan.io\/\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR32","unstructured":"Siemens: M60 series ATC. \n                      https:\/\/w3.usa.siemens.com\/mobility\/us\/en\/road-solutions\/Documents\/m60%20Series%20ATC%20Data%20Sheet%20FINAL.pdf\/\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR33","unstructured":"Siemens: SEPAC local controller software. \n                      https:\/\/w3.usa.siemens.com\/mobility\/us\/en\/road-solutions\/Documents\/SEPAC%20Local%20Controller%20Software.pdf\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR34","unstructured":"Spencer, D.: The Advanced Transportation Controller and Applications for Oregon Department of Transportation (2013). \n                      https:\/\/www.oregon.gov\/ODOT\/HWY\/TRAFFIC-ROADWAY\/docs\/pdf\/2013_conference\/ATCforODOT.pdf\n                      \n                    . Accessed 31 May 2017"},{"key":"8_CR35","unstructured":"The MITRE Corporation: Common vulnerabilities and exposures. \n                      https:\/\/cve.mitre.org\/cgi-bin\/cvekey.cgi?keyword=SSH\n                      \n                    . Accessed 1 Dec 2018"},{"key":"8_CR36","unstructured":"The White House: FACT SHEET: Announcing Over \\$80 million in New Federal Investment and a Doubling of Participating Communities in the White House Smart Cities Initiative (2016). \n                      https:\/\/obamawhitehouse.archives.gov\/the-press-office"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22038-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T19:09:47Z","timestamp":1560107387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22038-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030220372","9783030220389"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22038-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dimva2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"dimca2019.hotcrp.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}