ITSC 2025 Paper Abstract

Close

Paper FR-EA-T33.3

BENGHENAME, YASMINE (Lab. Heuristic and Diagnostic of Complex Systems), Lounis, Ahmed (Université de Technologie de Compiègne), Sallak, Mohamed (Compiegne University of Technology)

Toward Secure and Safe Railway Operations: Embedding Safety in Cybersecurity Frameworks

Scheduled for presentation during the Regular Session "S33b-Intelligent Control for Next-Generation Railway Systems" (FR-EA-T33), Friday, November 21, 2025, 14:10−14:30, Southport 3

2025 IEEE 28th International Conference on Intelligent Transportation Systems (ITSC), November 18-21, 2025, Gold Coast, Australia

This information is tentative and subject to change. Compiled on October 18, 2025

Keywords Autonomous Rail Systems and Advanced Train Control Technologies, Real-time Coordination of Air, Road, and Rail Transport for Incident Management

Abstract

The digital transformation of railway systems is enhancing automation, connectivity, and operational efficiency. However, it also introduces complex cybersecurity risks that can propagate into safety-critical failures. Existing frameworks often treat cybersecurity and safety as separate domains, limiting their ability to address the interdependent threats facing modern railway infrastructures. This paper presents a novel, integrated risk management framework that explicitly links cybersecurity threats to their potential safety consequences. Our approach is attacker-oriented, considering adversarial capabilities and intent, and safety-informed, meaning the security analysis is guided by safety-related principles and constraints to ensure the protection of safety-critical functions. The framework is grounded in, and harmonized with, international standards including ISO/IEC 27001, ISO/SAE 21434, and EN 50126, ensuring methodological consistency with current industry practices. To demonstrate the framework’s practical applicability, we conduct a detailed case study on the ERTMS/ETCS Level 1 signaling system. Using a dynamic driving emulator under realistic operational conditions, we identify key vulnerabilities, assess their exploitability by plausible attackers, and evaluate their potential to compromise safety integrity.

 

 

All Content © PaperCept, Inc.


This site is protected by copyright and trademark laws under US and International law.
All rights reserved. © 2002-2025 PaperCept, Inc.
Page generated 2025-10-18  21:24:12 PST  Terms of use