{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:29:42Z","timestamp":1730320182842,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,18]]},"DOI":"10.1145\/3212480.3212500","type":"proceedings-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T16:38:41Z","timestamp":1530203921000},"page":"160-171","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Signal Jamming Attacks Against Communication-Based Train Control"],"prefix":"10.1145","author":[{"given":"Subhash","family":"Lakshminarayana","sequence":"first","affiliation":[{"name":"Advanced Digital Sciences Center, Illinois at Singapore, Singapore"}]},{"given":"Jabir Shabbir","family":"Karachiwala","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center, Illinois at Singapore, Singapore"}]},{"given":"Sang-Yoon","family":"Chang","sequence":"additional","affiliation":[{"name":"University of Colorado, Colorado Springs"}]},{"given":"Girish","family":"Revadigar","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Sristi Lakshmi Sravana","family":"Kumar","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center, Illinois at Singapore, Singapore"}]},{"given":"David K.Y.","family":"Yau","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Yih-Chun","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. Officials: Rogue Boston subway train was tampered with. (2015). http:\/\/wapo.st\/2zo78PU. 2015. Officials: Rogue Boston subway train was tampered with. (2015). http:\/\/wapo.st\/2zo78PU."},{"key":"e_1_3_2_1_2_1","unstructured":"2015. Rail companies to be fined for late-running services. (2015). http:\/\/bit.ly\/2iCikTh. 2015. Rail companies to be fined for late-running services. (2015). http:\/\/bit.ly\/2iCikTh."},{"key":"e_1_3_2_1_3_1","unstructured":"2016. Confirmation of a coordinated attack on the Ukrainian power grid. (2016). http:\/\/bit.ly\/10mxfnG. 2016. Confirmation of a coordinated attack on the Ukrainian power grid. (2016). http:\/\/bit.ly\/10mxfnG."},{"key":"e_1_3_2_1_4_1","unstructured":"2016. 'Rogue train' to blame for signal interference disruptions on circle line. (2016). http:\/\/bit.ly\/2yzXIlq. 2016. 'Rogue train' to blame for signal interference disruptions on circle line. (2016). http:\/\/bit.ly\/2yzXIlq."},{"key":"e_1_3_2_1_5_1","unstructured":"2016. Singapore Downton line signalling. (2016). https:\/\/tinyurl.com\/yacucyoe. 2016. Singapore Downton line signalling. (2016). https:\/\/tinyurl.com\/yacucyoe."},{"key":"e_1_3_2_1_6_1","unstructured":"2016. UK rail network attacked by hackers four times in a year. (2016). http:\/\/ind.pn\/29x1NGX. 2016. UK rail network attacked by hackers four times in a year. (2016). http:\/\/ind.pn\/29x1NGX."},{"key":"e_1_3_2_1_7_1","unstructured":"2017. Ettus research USRP software defined radio products. (2017). https:\/\/www.ettus.com\/. 2017. Ettus research USRP software defined radio products. (2017). https:\/\/www.ettus.com\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2017. GNU radio free and open software radio ecosystem. (2017). https:\/\/www.gnuradio.org\/. 2017. GNU radio free and open software radio ecosystem. (2017). https:\/\/www.gnuradio.org\/."},{"volume-title":"Signalling system firm Thales apologises for Joo Koon train collision","year":"2017","key":"e_1_3_2_1_9_1","unstructured":"2017. Signalling system firm Thales apologises for Joo Koon train collision ; assures commuters that its system is safe. ( 2017 ). http:\/\/bit.ly\/2hYKiIH. 2017. Signalling system firm Thales apologises for Joo Koon train collision; assures commuters that its system is safe. (2017). http:\/\/bit.ly\/2hYKiIH."},{"key":"e_1_3_2_1_10_1","unstructured":"2017 (accessed). GSM-R. (2017 (accessed)). https:\/\/uic.org\/gsm-r. 2017 (accessed). GSM-R. (2017 (accessed)). https:\/\/uic.org\/gsm-r."},{"key":"e_1_3_2_1_11_1","unstructured":"2017 (accessed). TETRA. (2017 (accessed)). http:\/\/www.etsi.org\/technologies-clusters\/technologies\/tetra. 2017 (accessed). TETRA. (2017 (accessed)). http:\/\/www.etsi.org\/technologies-clusters\/technologies\/tetra."},{"volume-title":"Cybersecurity considerations for public transit. Recommended Practice ATPA-SS-ECS-RP-001-14","year":"2014","author":"American Public Transportation Association (APTA). 2014.","key":"e_1_3_2_1_12_1","unstructured":"American Public Transportation Association (APTA). 2014. Cybersecurity considerations for public transit. Recommended Practice ATPA-SS-ECS-RP-001-14 ( 2014 ). American Public Transportation Association (APTA). 2014. Cybersecurity considerations for public transit. Recommended Practice ATPA-SS-ECS-RP-001-14 (2014)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056602"},{"volume-title":"Proc. EAI international conference on security and privacy in communication networks (SecureComm).","year":"2016","author":"Chang S-Y.","key":"e_1_3_2_1_14_1","unstructured":"S-Y. Chang , S. Cai , H. Seo , and Y-C. Hu . 2016 . Key update at train stations: Two-layer dynamic key update scheme for secure train communications . In Proc. EAI international conference on security and privacy in communication networks (SecureComm). S-Y. Chang, S. Cai, H. Seo, and Y-C. Hu. 2016. Key update at train stations: Two-layer dynamic key update scheme for secure train communications. In Proc. EAI international conference on security and privacy in communication networks (SecureComm)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348556"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2015.13"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MEMC.2014.7023203"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2661384"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185452"},{"volume-title":"Proc. IEEE\/ASME Joint Rail Conference. 253--262","author":"Hartong M.","key":"e_1_3_2_1_20_1","unstructured":"M. Hartong , R. Goel , and D. Wijesekera . 2006. Key management requirements for positive train control communications security . In Proc. IEEE\/ASME Joint Rail Conference. 253--262 . M. Hartong, R. Goel, and D. Wijesekera. 2006. Key management requirements for positive train control communications security. In Proc. IEEE\/ASME Joint Rail Conference. 253--262."},{"key":"e_1_3_2_1_21_1","first-page":"4","article-title":"I.A.G.O.: Command Control Link Using Coded Waveguide","volume":"116","author":"Heddbaut Degauque P.","year":"1990","unstructured":"Degauque P. Duhot D. Heddbaut , M. and J. Mainardi . 1990 . I.A.G.O.: Command Control Link Using Coded Waveguide . Journal of Transportation Engineering 116 , 4 (July 1990), 427--435. Degauque P. Duhot D. Heddbaut, M. and J. Mainardi. 1990. I.A.G.O.: Command Control Link Using Coded Waveguide. Journal of Transportation Engineering 116, 4 (July 1990), 427--435.","journal-title":"Journal of Transportation Engineering"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.928635"},{"key":"e_1_3_2_1_23_1","first-page":"3","article-title":"Leaky Waveguide for Train-to-Wayside Communication-Based Train Control. Vehicular Technology","volume":"58","author":"Heddebaut M.","year":"2009","unstructured":"M. Heddebaut . 2009 . Leaky Waveguide for Train-to-Wayside Communication-Based Train Control. Vehicular Technology , IEEE Transactions on 58 , 3 (March 2009), 1068--1076. M. Heddebaut. 2009. Leaky Waveguide for Train-to-Wayside Communication-Based Train Control. Vehicular Technology, IEEE Transactions on 58, 3 (March 2009), 1068--1076.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2011.6120048"},{"key":"e_1_3_2_1_25_1","first-page":"1","article-title":"Waveguide communication system for centralized railway traffic control","volume":"13","author":"Kawakami T.","year":"1959","unstructured":"T. Kawakami , T. Maruhama , T. Takeya , and S. Kohno . 1959 . Waveguide communication system for centralized railway traffic control . IRE Transactions on Vehicular Communications 13 , 1 (Sep 1959), 1--18. T. Kawakami, T. Maruhama, T. Takeya, and S. Kohno. 1959. Waveguide communication system for centralized railway traffic control. IRE Transactions on Vehicular Communications 13, 1 (Sep 1959), 1--18.","journal-title":"IRE Transactions on Vehicular Communications"},{"volume-title":"Proc. IEEE\/IFIP International conference on dependable systems and networks (DSN). 383--394","author":"Lakshminarayana S.","key":"e_1_3_2_1_26_1","unstructured":"S. Lakshminarayana , Z. T. Teo , R. Tan , D.K. Y. Yau , and P. Arboleya . 2016. On false data injection attacks against railway traction power systems . In Proc. IEEE\/IFIP International conference on dependable systems and networks (DSN). 383--394 . S. Lakshminarayana, Z. T. Teo, R. Tan, D.K. Y. Yau, and P. Arboleya. 2016. On false data injection attacks against railway traction power systems. In Proc. IEEE\/IFIP International conference on dependable systems and networks (DSN). 383--394."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1982.1095533"},{"volume-title":"APTA Rail Conference.","author":"Alan","key":"e_1_3_2_1_28_1","unstructured":"Alan F. Rumsey and Sue Cox. 2012. So who really needs a \"Fall-back\" signaling system with communications-based train control? . In APTA Rail Conference. Alan F. Rumsey and Sue Cox. 2012. So who really needs a \"Fall-back\" signaling system with communications-based train control?. In APTA Rail Conference."},{"key":"e_1_3_2_1_29_1","unstructured":"M. Simon J. Omura R. Scholtz and B. Levitt. 1994. Spread spectrum communications handbook. McGraw-Hill: New York. M. Simon J. Omura R. Scholtz and B. Levitt. 1994. Spread spectrum communications handbook. McGraw-Hill: New York."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.9"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939935"},{"key":"e_1_3_2_1_32_1","first-page":"1061","article-title":"Modeling of Communication-Based Train Control (CBTC) Radio Channel With Leaky Waveguide. Antennas and Wireless Propagation Letters","volume":"12","author":"Wang Hongwei","year":"2013","unstructured":"Hongwei Wang , F.R. Yu , Li Zhu , Tao Tang , and Bin Ning . 2013 . Modeling of Communication-Based Train Control (CBTC) Radio Channel With Leaky Waveguide. Antennas and Wireless Propagation Letters , IEEE 12 (2013), 1061 -- 1064 . Hongwei Wang, F.R. Yu, Li Zhu, Tao Tang, and Bin Ning. 2013. Modeling of Communication-Based Train Control (CBTC) Radio Channel With Leaky Waveguide. Antennas and Wireless Propagation Letters, IEEE 12 (2013), 1061--1064.","journal-title":"IEEE"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2377115"},{"volume-title":"European Control Conference (ECC). 4556--4561","author":"Wang Y.","key":"e_1_3_2_1_34_1","unstructured":"Y. Wang , B. De Schutter , T. van den Boom, and B. Ning. 2013. Optimal trajectory planning for trains under a moving block signaling system . In European Control Conference (ECC). 4556--4561 . Y. Wang, B. De Schutter, T. van den Boom, and B. Ning. 2013. Optimal trajectory planning for trains under a moving block signaling system. In European Control Conference (ECC). 4556--4561."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2735960.2735985"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2388356"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2435515"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2291533"}],"event":{"name":"WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Stockholm Sweden","acronym":"WiSec '18"},"container-title":["Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3212480.3212500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T23:21:31Z","timestamp":1673047291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3212480.3212500"}},"subtitle":["Attack Impact and Countermeasure"],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":38,"alternative-id":["10.1145\/3212480.3212500","10.1145\/3212480"],"URL":"http:\/\/dx.doi.org\/10.1145\/3212480.3212500","relation":{},"subject":[],"published":{"date-parts":[[2018,6,18]]},"assertion":[{"value":"2018-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}