Service quality management for the ITS mobile wireless multipath telecommunications subsystems

T. Zelinka, Z. Lokaj, M. Svítek
{"title":"Service quality management for the ITS mobile wireless multipath telecommunications subsystems","authors":"T. Zelinka, Z. Lokaj, M. Svítek","doi":"10.1145/2261605.2261652","DOIUrl":null,"url":null,"abstract":"Quality of telecommunication service and wide area coverage guaranteed in defined tolerance range represent typical requirements of the ITS (Intelligent Transport Systems) applications. Extensive range of wireless data services with reasonable coverage is available from public wireless services providers, however, mostly no relevant range of availability, quality and security is guaranteed. ITS services require cost-effectively solution and it can be resolved by combination of the “core” public solution with the other public as well as private services where and when it is needed. Such approach requires implementation of the relevant flexible system architecture supported by the efficient decision processes. ITS specific service security requirements would not underestimated, as well. Special situation is identified in case of the C2I (Car to Infrastructure) and C2C (Car to Car) communication namely if the vehicle on board unit is interconnected with the vehicle CAN (Controlled Area Network) based network. Such configurations significantly increase potential of dangerous intruders' attacks. Probability of the critical hazards appearances significantly grows if the ITS data are transferred via publically reachable wide area networks. That is also the main reason why relevant telecommunications security support is understood as one of the crucial part of the ITS telecommunications solution.","PeriodicalId":164789,"journal":{"name":"2012 6th Euro American Conference on Telematics and Information Systems (EATIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 6th Euro American Conference on Telematics and Information Systems (EATIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2261605.2261652","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Quality of telecommunication service and wide area coverage guaranteed in defined tolerance range represent typical requirements of the ITS (Intelligent Transport Systems) applications. Extensive range of wireless data services with reasonable coverage is available from public wireless services providers, however, mostly no relevant range of availability, quality and security is guaranteed. ITS services require cost-effectively solution and it can be resolved by combination of the “core” public solution with the other public as well as private services where and when it is needed. Such approach requires implementation of the relevant flexible system architecture supported by the efficient decision processes. ITS specific service security requirements would not underestimated, as well. Special situation is identified in case of the C2I (Car to Infrastructure) and C2C (Car to Car) communication namely if the vehicle on board unit is interconnected with the vehicle CAN (Controlled Area Network) based network. Such configurations significantly increase potential of dangerous intruders' attacks. Probability of the critical hazards appearances significantly grows if the ITS data are transferred via publically reachable wide area networks. That is also the main reason why relevant telecommunications security support is understood as one of the crucial part of the ITS telecommunications solution.
ITS移动无线多径通信子系统的服务质量管理
在规定的公差范围内保证电信服务质量和广域覆盖是ITS(智能交通系统)应用的典型要求。公共无线服务供应商提供范围广泛、覆盖范围合理的无线数据服务,但大多没有相关的可用范围、质量和安全性得到保证。智能交通系统服务需要具有成本效益的解决方案,可以在需要的地方和时间将“核心”公共解决方案与其他公共和私人服务结合起来解决。这种方法需要在有效决策过程的支持下实施相关的灵活系统架构。ITS特定的服务安全需求也不容低估。在C2I(车对基础设施)和C2C(车对车)通信的情况下,即如果车载单元与基于车辆CAN(受控区域网络)的网络互连,则确定了特殊情况。这样的配置大大增加了危险入侵者攻击的可能性。如果ITS数据通过公共可达的广域网传输,则出现严重危害的可能性会显著增加。这也是为什么相关的电信安全支持被理解为ITS电信解决方案的关键部分之一的主要原因。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信