This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
At present, railway is developing rapidly around the world, especially in China, where the high-speed railway (HSR) has a total length of 35,000 kilometers, accounting for approximately 66.7% of the world’s high-speed railways [1]. China has also made significant progress in urban rail transit; there are more than 200 lines, and the total operation length is more than 6000 km [2]. Ensuring the punctuality of trains is the most significant goal of railways, and it can promote the sustainable development and bring the maintenance of social stabilization.
Communication-based train control (CBTC) is the key technology of urban rail transit to keep trains operation safe and efficient, which can provide real-time operation information for trains and generate control and dispatch strategies. In order to increase the automation and informatization level of CBTC systems, communication, computer, and control technologies have been widely applied [3]. Additionally, security risks are introduced in CBTC systems and can cause the destruction of railway transportation organization, which is the same as the other industrial control systems [4, 5].
Generally, a CBTC system can be taken as a typical cyber-physical system [6], where the computer network is working at the cyber domain while trains are running at the physical domain. Cyber attacks are usually carried out on computer nodes or communication links, which will cause information delay and tampering. Considering the principles of CBTC systems, the normal operation of trains could be disturbed, such as emergency braking. For example, wireless local area networks (WLANs) are adopted as the main method of bidirectional train-ground communications of train control systems [7, 8], which could be easily interfered and attacked [9] as WLANs work at the public frequency and the authentication mechanism is unidirectional. Once wireless links are cut off under denial of service (DoS) attacks, trains cannot receive the movement authority (MA) from the control center, and emergency braking must be implemented in order to keep trains safe. Obviously, the operation efficiency is seriously reduced.
As urban railways are designed to deliver passengers, CBTC systems are safety-critical, and the fail-safe mechanisms are applied in order to achieve the demanded performance including reliability, availability, maintainability, and safety (RAMS) [10, 11]. In the traditional assessment approach to CBTC systems, RAMS is the significant statistical indicator system [12, 13] according to IEC 62278 [14], where qualitative measures include failure probabilities, mean time to failure (MTTF), mean time between failures (MTBF), and two-dimensional risk matrixes (risk probabilities and risk consequences). Therefore, the existing assessment approach focuses on the large time scale, which cannot determine in real time the effects caused by the temporal or sudden disruption. However, security events are often unexpected, and malicious attacks are implemented depending on the subjective will of attackers, being random. As a result, it is not appropriate to adopt traditional statistics indicators to evaluate performance of train control systems under attack.
As mentioned above, CBTC systems are designed to provide transportation service, and the robustness and recovery capability are critical when cyber attacks are performed. The Department of Homeland Security developed a plan to achieve critical infrastructure security and resilience in 2013 [15]. The transportation systems sector-specific plan [16] was also proposed. It identifies the transportation system’s security and resilience priorities and describes the approach to managing critical infrastructure risks, where the railway system is included. Therefore, a novel assessment approach based on resilience is proposed in this paper.
The resilience of a CBTC system could be illustrated as Figure 1 according to [17]. Generally, a CBTC system keeps at the normal operation level, and trains are running according to the predesigned timetable. At
[figure omitted; refer to PDF]
The rest of this paper is organized as follows. A typical CBTC system is shown in Section 2. Section 3 describes the assessment model based on structural information entropy. Section 4 presents simulation results and some discussions. Finally, we conclude the study in Section 5.
2. Overview of CBTC Systems
Figure 2 demonstrates a typical CBTC system for urban rail transit, which includes some critical equipment, e.g., automatic train supervision (ATS), data storage unit (DSU), computer interlock (CI), zone controller (ZC), and vehicle on-board controller (VOBC). VOBC receives the control command from ZC and transmits the train status through wireless communications, where WLANs and long-term evolution for metro (LTE-M) are usually applied. WLANs-based train-ground communication systems consist of wayside access points (APs) and on-board mobile stations (MSs).
[figure omitted; refer to PDF]
Generally, trains are running at a high speed and sending the corresponding information including velocity, position, and direction to the ZC. ZC generates movement authorities (MAs) to trains to inform the train about the location of the nearest obstacle, which could be a running train, a station, or a turnout. The train obtaining the MA should calculate the permitted maximum velocity to keep a safe distance to the nearest obstacle. During the process, messages between trains and ZCs are transmitted through WLANs or LTE-M. Obviously, the reliability and dependability of wireless communications are significant to CBTC systems.
As mentioned above, the fail-safe mechanisms are embedded in the operating principle of the CBTC system so that when a specific type of failure occurs, it will not cause harm to other equipment, the environment, or the personnel or cause minimal harm. Therefore, redundant and fault tolerance architectures are applied, such as double 2-vote-2 architecture for ZC, DSU, and CI. On the left part of Figure 2, the double 2-vote-2 architecture is demonstrated, where there are two communication controllers (CCs), four processing units (PUs), and two logic decision makers. In the architecture, one CC, two PUs, and one logic decision maker make up the main system while the others are the standby system. Generally, when the main system does not work well, the standby system switches to the main role. Therefore, ZC, DSU, CI, and ATS are not standalone devices but subsystems. For example, ATS includes database servers, communication servers, application servers, and network gate computers. Some dedicated protocols are developed to keep the confidentiality, integrity, and availability of information, such as railway signalling safe protocols (RSSP) derived from EN 50159.
Conversely, applications of general information technologies could bring security risks, such as server message block (SMB) protocol vulnerabilities, remote code execution vulnerabilities, authentication vulnerabilities, DoS threats on wireless communications, and false data injection threats. The combined effects of security threats and vulnerabilities can generally bring changes of CBTC network topology, such as the downtime of one server due to virus, which can lead to interruptions of communications from the server to any other equipment. For some specific scenarios, under protection of fail-safe mechanisms, changes of CBTC topology cannot affect the normal train operation. With dual-network redundancy of wireless communications, although one wireless link between a train and ZC is blocked due to jamming attacks or DoS attacks, the train could still keep the preset running trajectory as the other wireless link can provide one channel to transmit the control command. Therefore, a security assessment approach should consider effects of the existing fail-safety mechanisms, which can precisely evaluate the practical robustness and the recovery capability of train control systems.
3. The Resilience Assessment Model of CBTC Systems
As mentioned above, cyber domain of CBTC system is a computer network with different computer nodes and communication links. The physical domain consists of trains with effects of traction and braking according to commands from the cyber domain. Obviously, abnormal performance of cyber domain could affect the operation of trains and bring on disturbance to the transportation service of urban rail transit.
According to the definition of resilience, system performance indicators should be determined based on the characteristics of CBTC. As a cyber-physical system, there are amounts of performance indicators of cyber domain and physical domain. Therefore, the performance variance due to cyber attacks should be described based on difference indicators. In this section, we develop a novel method based on the structural information entropy to demonstrate the real-time system performance of both the cyber domain and the physical domain.
3.1. Cyber Domain
As a CBTC system could be treated as a computer network, we built a graph model
Equation (1) assumes that each vertex and each edge is completely the same. However, in CBTC systems, different operation systems and hardware platforms are adopted based on functional attributes of devices. Meanwhile, according to safety-critical requirements, RSSP-1 and RSSP-2 are individually applied to the closed network and the open network. As a matter of fact, some private protocols (PPs) are also developed due to specific requirements. For some unsafe communication links, information is transmitted in clear text. Therefore, there are a few types of vertexes and edges, which means every element of a CBTC graph model should be described with specific parameters according to its inherent features.
Based on the password strength, the security protection policies, and the number and level of vulnerabilities, a security factor of a node could be designed. Vulnerabilities could be classified into five levels according to the common vulnerability scoring system (CVSS), where the corresponding weight of a node can be determined.
Similarly, for an edge, based on protocols of communication links, the weight of each edge could be determined as follows:
Therefore, the structural entropy of a CBTC system can be formulated as follows:
3.2. Physical Domain
The structural entropy in (4) can demonstrate changes of network typologies due to node failures and interruptions of communication links caused by security issues, which is the performance variance of cyber space. However, due to cyber-physical characteristics of CBTC systems, performance variances of physical space should also be considered. Based on the transportation service attribute of CBTC systems, the achievement rate of timetables can be used to describe effects caused by security attacks on train operation. Firstly, the normalized value of the performance loss of a train is expressed as follows, where the min–max principle is applied.
Therefore, the performance of a whole subway line under attack can be formulated as follows, which is the y axis of Figure 1.
3.3. Resilience of CBTC Systems
Equation (6) demonstrates the overall performance of CBTC systems under attack. With the attacking process being implemented, states of nodes and edges are changing. Therefore,
According to the metric proposed in [19], there are three attributes to measure resilience: absorptive capacity, adaptive capacity, and restorative capacity, and the corresponding expression is shown as follows:
In addition, the recovery speed factor is determined according to some key timing.
Considering operation principles of CBTC systems, when attacks are performed and cause failures of critical equipment such as ZC, trains will implement emergency braking to keep safe based on fail-safe mechanisms. Obviously, the performance of the whole subway line will fall down to a lowest level
4. Simulation Results and Discussions
4.1. Simulation Description
Take Beijing Subway Yizhuang Line, for example, where there are 13 stations, 6 ZCs, and 6 CIs and the length is
[figure omitted; refer to PDF]
The normal timetable of Beijing Subway Yizhuang Line is taken as the input of simulations as shown in Figure 4. The typical jamming attack is implemented on train-ground wireless communications. There are two scenarios:
Scenario 1 took ZCs as attacking targets. Generally, ZC failures could cause serious disturbances to train operations, as trains have to perform the emergency braking when they cannot receive MAs from ZCs. Therefore, operators must try their best to repair failures or implement some other emergency response measures. We assume that operators should take several minutes to make the system recover from ZC failures. According to the architecture in Figure 2, the attacking path is CC1 (
Scenario 2 took trains as attacking targets, where DoS attacks were implemented on wireless communications between ZCs and VOBCs. Through sending a large number of data packets to exhaust bandwidth resources, communication interruptions could be caused, and trains have to perform the emergency braking to keep safe based on “fail-safe” mechanisms. Therefore, trains worked under the degraded mode depending on operation of drivers until wireless communications recovered to normal. In the scenario, we attacked the
[figure omitted; refer to PDF]
Figure 6 demonstrates the network performance under scenario 2, where wireless communications between trains and ZC were blocked by DoS attacks. The network performance had little influence, which means attacks on single or several wireless links could hardly bring obvious changes of the network topology. However, communication interruptions could lead to the emergency braking of trains, which obviously affected the operation of a subway line. Therefore, gentle changes of network performance cannot describe effects of DoS attacks on CBTC systems.
[figure omitted; refer to PDF]
As shown in Figure 9, the train operation performance (defined in (6)) of the subway line decreased as several ZCs broke down (
[figure omitted; refer to PDF]
The train operation performance of the subway line under DoS attacks on wireless communications is shown in Figure 10. It began to decrease (area A) and fell to the lowest point (area B) at
[figure omitted; refer to PDF]
According to fitting results, the key parameters of (8) and (9) were determined as shown in Table 1. The lowest value of the security level under the two scenarios was close. In scenario 1, failures of one single ZC could affect all the trains within its control. Meanwhile, with the longer attacking time, the affected area was wider. Hence, it should take more time to recover to the normal level compared with scenario 2. In addition, interruptions of wireless communication could directly affect performance of trains. Therefore, the performance fading rate of scenario 2 was larger. In scenario 2, due to the DoS attack on the wireless communication between ZCs and VOBCs, although it still causes train delays, system performance will return to normal levels after the attack ends.
Table 1
Resilience parameters of CBTC system under two different scenarios.
Resilience parameters | Scenario 1 | Scenario 2 |
7.6754 | 7.6754 | |
4.9438 | 4.8213 | |
6.2394 | 7.6754 | |
3400 | 2500 | |
2119 | 3672 | |
4821 | 3672 |
We could calculate three attributes of resilience as shown in Table 2. The absorptive capacities under the two scenarios were almost the same, which indicated that the CBTC system had similar robustness. As one ZC can control several trains, adaptability and recovery capacity of CBTC systems were weaker under scenario 1. Therefore, resilience can be quantitatively assessed according to the process of attacks.
Table 2
Resilience assessment results of CBTC systems under two scenarios.
Assessment metrics | Scenario 1 | Scenario 2 |
Absorptive capacity | 0.6441 | 0.6281 |
Adaptability | 0.8129 | 1 |
Recovery capacity | 1.6049 | 1.2310 |
Resilience index | 0.6446 | 1.7734 |
5. Conclusion
In this paper, a resilience-based assessment approach is proposed to measure the security level of CBTC systems. The two-dimensional structure entropy is adopted to describe the performance of the cyber domain, and that of physical space is calculated according to the practical timetable and running states of trains. Based on stages of attacks, resilience metrics are utilized to analyze the security level of the whole subway line, where both cyber space and physical space are considered. Two typical attacking scenarios were built, and a practical subway line was taken as an example. Simulation results show that the resilience-based approach can efficiently evaluate the security level of CBTC systems under different attacks.
Acknowledgments
This paper was supported by grants from the Fundamental Research Funds for the Central Universities (No. 2021QY007), National Natural Science Foundation of China under Grant (U18341211, 61925302, 61971030, 61973026), the Railway Traffic joint fund of Beijing Natural Science Foundation and TCT Technology (L181004), Traffic Control Technology (TCT) Innovation Funding under Grant 9907006509, the open project of State Key Laboratory of Synthetical Automation for Process Industries, Beijing Natural Science Foundation: L201002, and Natural Science Foundation of China under Grants: 61973026.
[1] S. Peng, X. Yang, H. Wang, H. Dong, B. Ning, H. Tang, Z. Ying, R. Tang, "Dispatching high-speed rail trains via utilizing the reverse direction track: adaptive rescheduling strategies and application," Sustainability, vol. 11 no. 8,DOI: 10.3390/su11082351, 2019.
[2] X. Yang, H. Yin, J. Wu, Y. Qu, Z. Gao, T. Tang, "Recognizing the critical stations in urban rail networks: an analysis method based on the smart-card data," IEEE Intelligent Transportation Systems Magazine, vol. 11 no. 1, pp. 29-35, DOI: 10.1109/mits.2018.2884492, 2019.
[3] R. Pascoe, T. Eichorn, "What is communication-based train control?," IEEE Vehicular Technology Magazine, vol. 4 no. 4, pp. 16-21, DOI: 10.1109/mvt.2009.934665, 2009.
[4] O. A. Alimi, K. Ouahada, A. M. Abu-Mahfouz, "Real time security assessment of the power system using a hybrid support vector machine and multilayer perceptron neural network algorithms," Sustainability, vol. 11,DOI: 10.3390/su11133586, 2019.
[5] S. M. Wu, D. Guo, Y. J. Wu, Y. C. Wu, "Future development of taiwans smart cities from an information security perspective," Sustainability, vol. 10,DOI: 10.3390/su10124520, 2018.
[6] L. Bu, D. Xie, X. Chen, L. Wang, X. Li, "Demo abstract: bachol- modeling and verification of cyber-physical systems online," Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems,DOI: 10.1109/iccps.2012.43, .
[7] L. Zhu, F. R. Yu, B. Ning, T. Tang, "Cross-layer handoff design in MIMO-enabled WLANs for communication-based train control (CBTC) systems," IEEE Journal on Selected Areas in Communications, vol. 30 no. 4, pp. 719-728, DOI: 10.1109/jsac.2012.120506, 2012.
[8] H. Wang, F. R. Yu, L. Zhu, T. Tang, B. Ning, "A cognitive control approach to communication-based train control systems," IEEE Transactions on Intelligent Transportation Systems, vol. 16 no. 4, pp. 1676-1689, DOI: 10.1109/tits.2014.2377115, 2015.
[9] H. Wang, F. R. Yu, H. Wang, "A cognitive control approach to interference mitigation in communications-based train control (cbtc) coexisting with passenger information systems (piss)," EURASIP Journal on Wireless Communications and Networking, vol. 2017,DOI: 10.1186/s13638-017-0959-3, 2017.
[10] Y. Cao, H. Lu, T. Wen, "A safety computer system based on multi-sensor data processing," Sensors, vol. 19 no. 4,DOI: 10.3390/s19040818, 2019.
[11] Y. Cao, Y. Zhang, T. Wen, P. Li, "Research on dynamic nonlinear input prediction of fault diagnosis based on fractional differential operator equation in high-speed train control system," Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 29 no. 1,DOI: 10.1063/1.5085397, 2019.
[12] S. Hiraguri, K. Iwata, I. Watanabe, A Method of Evaluating Railway Signalling System Based on Rams Concept, pp. 97-105, DOI: 10.1007/978-3-642-14261-1_10, 2011.
[13] F. Yan, C. Gao, T. Tang, Y. Zhou, "A safety management and signaling system integration method for communication-based train control system," Urban Rail Transit, vol. 3 no. 2, pp. 90-99, DOI: 10.1007/s40864-017-0051-7, 2017.
[14] E. CENELEC, Railway Applications the Specification and Demonstration of Reliability, Availability, Maintainability and Safety (Rams), 1999.
[15] S. O. Johnsen, M. Veen, "Risk assessment and resilience of critical communication infrastructure in railways," Cognition, Technology & Work, vol. 15 no. 1, pp. 95-107, DOI: 10.1007/s10111-011-0187-2, 2013.
[16] U. DHS, Nipp 2013: Partnering for Critical Infrastructure Security and Resilience, 2013.
[17] Q. Zhu, D. Wei, K. Ji, Hierarchical Architectures of Resilient Control Systems: Concepts, Metrics and Design Principles, 2015.
[18] A. Li, Q. Hu, J. Liu, Y. Pan, "Resistance and security index of networks: structural information perspective of network security," Scientific Reports, vol. 6 no. 1,DOI: 10.1038/srep26810, 2016.
[19] R. Francis, B. Bekera, "A metric and frameworks for resilience analysis of engineered and infrastructure systems," Reliability Engineering & System Safety, vol. 121, pp. 90-103, DOI: 10.1016/j.ress.2013.07.004, 2014.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2021 Ruiming Lu et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
With the rapid development of urban rail transit systems, large amounts of information technologies are applied to increase efficiency of train control systems, such as general computers, communication protocols, and operation systems. With the continuous exposure of information technology vulnerabilities, security risks are increasing, and information is easy to use by malicious attackers, which can bring huge property and economic losses. The communication-based train control (CBTC) system is the most important subsystem of urban rail transit. The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. The proposed method can demonstrate the robustness and recovery ability of CBTC systems under different security attacks. Based on the structural information entropy, the fusion of different indicators is achieved. Two typical attacking scenarios are analyzed, and the simulation results illustrate the effectiveness of the proposed assessment approach.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details






1 National Research Center of Railway Safety Assessment, Beijing Jiaotong University, Beijing, China
2 State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China
3 State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, China