{"title":"基于LTE-R的无线列车控制系统分析及安全需求分析:基于无线电的列车控制系统的安全性","authors":"Jae-Hoon Lee, Chan-Kuk Jang, Okyeon Yi","doi":"10.1109/CAIPT.2017.8320741","DOIUrl":null,"url":null,"abstract":"In this paper, we analyze the radio based train control system using LTE-R to construct a secure communication environment, and examine the necessity of security by analyzing the risk of attack. In addition, we define the security requirements considering characteristics of the radio train control system and propose a security model by comparing with the security model in similar environment.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Analysis of radio based train control system using LTE-R and analysis of security requirements: The security of the radio based train control system\",\"authors\":\"Jae-Hoon Lee, Chan-Kuk Jang, Okyeon Yi\",\"doi\":\"10.1109/CAIPT.2017.8320741\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we analyze the radio based train control system using LTE-R to construct a secure communication environment, and examine the necessity of security by analyzing the risk of attack. In addition, we define the security requirements considering characteristics of the radio train control system and propose a security model by comparing with the security model in similar environment.\",\"PeriodicalId\":351075,\"journal\":{\"name\":\"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CAIPT.2017.8320741\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIPT.2017.8320741","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of radio based train control system using LTE-R and analysis of security requirements: The security of the radio based train control system
In this paper, we analyze the radio based train control system using LTE-R to construct a secure communication environment, and examine the necessity of security by analyzing the risk of attack. In addition, we define the security requirements considering characteristics of the radio train control system and propose a security model by comparing with the security model in similar environment.