OS_REPORT
OS_REPORT
ENGINEERING
Submitted by
SYSTEM ARCHITECTURE:
The components used are:
Traffic LED Signals
Raspberry Pi (central control unit
GPON router (network access)
Attacker Device - Linux / Windows Machine
Jumper Wires
Breadboard
The Raspberry Pi acts as the brain of the system, running the necessary software for traffic
signal control and communication with external devices. It interfaces with the traffic signals
through GPIO (General Purpose Input/Output) pins to send control commands. The system is
accessible remotely via SSH (Secure Shell) for administration and monitoring purposes. SSH
allows authorized users to securely access the Raspberry Pi over the network, facilitating
configuration, maintenance, and troubleshooting. Additionally, the system is connected to a
GPON (Gigabit Passive Optical Network) home gateway/router for network connectivity.
The GPON router serves as the entry point to the system's network and provides internet
access, enabling remote access and data exchange. This architecture enables traffic
monitoring and control while facilitating remote management and configuration. However, it
also introduces potential vulnerabilities that need to be assessed and addressed to ensure the
security and reliability of the smart traffic signal management system.
METHODOLOGY:
This section details the steps taken to assess the security of the prototype smart traffic signal
system:
1. Initial Access:
The assessment began by identifying the Raspberry Pi's IP address through the GPON home
gateway. This IP address was used to establish a connection via SSH, the Secure Shell
protocol. We used the command ssh [email protected] to connect to our Raspberry Pi
over our computer network. We successfully leveraged the weak SSH Vulnerability to gain
unauthorized access.
SSH Connection:
numerical IP address.
o Authentication:
open, read, write: These handle tasks like reading private keys (if used) and
Sudo Execution:
o Forking and Executing:
fork: Creates a copy of the current process, allowing sudo to run the
execve: Replaces the current process with the shutdown program ( shutdown).
Shutdown Command:
o System Halt:
reboot or halt: Initiates the system shutdown process, preparing the system
o File Manipulation:
open, read, write: These are the workhorses, enabling nano to open the file,
o Terminal Control:
ioctl: This system call allows nano to interact with the terminal device,
managing the text editor's interface elements like displaying text and
o File Removal:
unlink: This call removes the specified file from the file system, essentially
deleting it.
RESULT:
Attacker gained the access to the file where the code was stored for the traffic light
management system. The vulnerability assessment of the smart traffic signal management
system prototype revealed critical security weaknesses, including default credentials,
unrestricted SSH access, weak Wi-Fi security, and insufficient file permissions. These
findings underscore the importance of prioritizing security measures to safeguard against
potential threats and ensure the integrity and reliability of the system. By implementing the
recommended mitigation strategies, stakeholders can mitigate risks and enhance the security
posture of the traffic signal management system, thereby enabling safe and efficient traffic
operations in the future.
Fig11. Prototype
CONCLUSION:
The vulnerabilities discovered in the smart traffic signal management system prototype
represent critical weaknesses that could potentially compromise the security and functionality
of the entire system. These vulnerabilities, if left unaddressed, have the potential to expose the
system to unauthorized access, manipulation, and disruption, posing serious risks to the safety
and efficiency of traffic management operations. It is crucial to prioritize the implementation
of the recommended mitigation measures to address these vulnerabilities promptly. By
proactively strengthening security measures, stakeholders can fortify the system against
potential threats, safeguarding its integrity and reliability. This proactive approach ensures
that the smart traffic signal management system remains resilient and capable of facilitating
safe and efficient traffic flow management operations, thereby enhancing overall
transportation safety and efficiency.
REFERENCES:
B. E B, A. M, S. G, D. Jose and H. J. Magadum, "Intelligent Traffic Monitoring and
Management System," 2023 International Conference on Computer, Electronics & Electrical
Engineering & their Applications (IC2E3), Srinagar Garhwal, India, 2023, pp. 1-5, doi:
10.1109/IC2E357697.2023.10262689.
N. Jain, R. Parwanda and A. Chauhan, "Real-Time Smart Traffic Control and Simulation: An
Approach for Urban Congestion Management," 2023 IEEE IAS Global Conference on
Emerging Technologies (GlobConET), London, United Kingdom, 2023, pp. 1-6, doi:
10.1109/GlobConET56651.2023.10150057.
R. H. Goudar and H. N. Megha, "Next generation intelligent traffic management system and
analysis for smart cities," 2017 International Conference On Smart Technologies For Smart
Nation (SmartTechCon), Bengaluru, India, 2017, pp. 999-1003, doi:
10.1109/SmartTechCon.2017.8358521.
M. M. Abo-Zahhad, "A Methodology for the Design of IoT-Based Intelligent Vehicular
Management Systems in Smart Cities," 2022 10th International Japan-Africa Conference on
Electronics, Communications, and Computations (JAC-ECC), Alexandria, Egypt, 2022, pp.
181-185, doi: 10.1109/JAC-ECC56395.2022.10044014.