{"title":"ITS移动无线多径通信子系统的服务质量管理","authors":"T. Zelinka, Z. Lokaj, M. Svítek","doi":"10.1145/2261605.2261652","DOIUrl":null,"url":null,"abstract":"Quality of telecommunication service and wide area coverage guaranteed in defined tolerance range represent typical requirements of the ITS (Intelligent Transport Systems) applications. Extensive range of wireless data services with reasonable coverage is available from public wireless services providers, however, mostly no relevant range of availability, quality and security is guaranteed. ITS services require cost-effectively solution and it can be resolved by combination of the “core” public solution with the other public as well as private services where and when it is needed. Such approach requires implementation of the relevant flexible system architecture supported by the efficient decision processes. ITS specific service security requirements would not underestimated, as well. Special situation is identified in case of the C2I (Car to Infrastructure) and C2C (Car to Car) communication namely if the vehicle on board unit is interconnected with the vehicle CAN (Controlled Area Network) based network. Such configurations significantly increase potential of dangerous intruders' attacks. Probability of the critical hazards appearances significantly grows if the ITS data are transferred via publically reachable wide area networks. That is also the main reason why relevant telecommunications security support is understood as one of the crucial part of the ITS telecommunications solution.","PeriodicalId":164789,"journal":{"name":"2012 6th Euro American Conference on Telematics and Information Systems (EATIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Service quality management for the ITS mobile wireless multipath telecommunications subsystems\",\"authors\":\"T. Zelinka, Z. Lokaj, M. Svítek\",\"doi\":\"10.1145/2261605.2261652\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Quality of telecommunication service and wide area coverage guaranteed in defined tolerance range represent typical requirements of the ITS (Intelligent Transport Systems) applications. Extensive range of wireless data services with reasonable coverage is available from public wireless services providers, however, mostly no relevant range of availability, quality and security is guaranteed. ITS services require cost-effectively solution and it can be resolved by combination of the “core” public solution with the other public as well as private services where and when it is needed. Such approach requires implementation of the relevant flexible system architecture supported by the efficient decision processes. ITS specific service security requirements would not underestimated, as well. Special situation is identified in case of the C2I (Car to Infrastructure) and C2C (Car to Car) communication namely if the vehicle on board unit is interconnected with the vehicle CAN (Controlled Area Network) based network. Such configurations significantly increase potential of dangerous intruders' attacks. Probability of the critical hazards appearances significantly grows if the ITS data are transferred via publically reachable wide area networks. That is also the main reason why relevant telecommunications security support is understood as one of the crucial part of the ITS telecommunications solution.\",\"PeriodicalId\":164789,\"journal\":{\"name\":\"2012 6th Euro American Conference on Telematics and Information Systems (EATIS)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 6th Euro American Conference on Telematics and Information Systems (EATIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2261605.2261652\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 6th Euro American Conference on Telematics and Information Systems (EATIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2261605.2261652","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Service quality management for the ITS mobile wireless multipath telecommunications subsystems
Quality of telecommunication service and wide area coverage guaranteed in defined tolerance range represent typical requirements of the ITS (Intelligent Transport Systems) applications. Extensive range of wireless data services with reasonable coverage is available from public wireless services providers, however, mostly no relevant range of availability, quality and security is guaranteed. ITS services require cost-effectively solution and it can be resolved by combination of the “core” public solution with the other public as well as private services where and when it is needed. Such approach requires implementation of the relevant flexible system architecture supported by the efficient decision processes. ITS specific service security requirements would not underestimated, as well. Special situation is identified in case of the C2I (Car to Infrastructure) and C2C (Car to Car) communication namely if the vehicle on board unit is interconnected with the vehicle CAN (Controlled Area Network) based network. Such configurations significantly increase potential of dangerous intruders' attacks. Probability of the critical hazards appearances significantly grows if the ITS data are transferred via publically reachable wide area networks. That is also the main reason why relevant telecommunications security support is understood as one of the crucial part of the ITS telecommunications solution.