Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Cyber Security

Australian Information Security Management Conference

Articles 1 - 1 of 1

Full-Text Articles in Information Security

An Investigation Of Potential Wireless Security Issues In Traffic Lights, Brian Bettany, Michael N. Johnstone, Matthew Peacock Jan 2016

An Investigation Of Potential Wireless Security Issues In Traffic Lights, Brian Bettany, Michael N. Johnstone, Matthew Peacock

Australian Information Security Management Conference

The purpose of automated traffic light systems is to safely and effectively manage the flow of vehicles through (usually) urban environments. Through the use of wireless-based communication protocols, sets of traffic lights are increasingly being connected to larger systems and also being remotely accessed for management purposes, both for monitoring and emergency purposes. These protocols, however, were not designed with security as a primary requirement, thus systems may operate with sub-standard or non-existent security implementations. This research aims to test if the same issues and vulnerabilities that appear to be present in traffic light systems in the USA are prevalent …