0% found this document useful (0 votes)
15 views2 pages

ITS Security and Safety

Uploaded by

manikingfor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

ITS Security and Safety

Uploaded by

manikingfor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

 Confidentiality: This feature ensures that only authorized ITS users have access to data.

The data
cannot be snooped or hindered by unauthorized users. Confidentiality is an important service in
ITS, during the pseudonym registration and obtaining phases. Thus, it is important to ensure
confidentiality of ITS. Therefore, advanced cryptographic techniques should be considered.
 Integrity: Integrity can assure the exact delivery of messages. In ITS integrity is important,
because wrong or tampered messages can misguide honest ITS users. Integrity avoids expected
or unexpected intervention during the communication. In order to achieve fair integrity in ITS,
strong security mechanisms should be designed.
 Availability: This feature in ITS guarantees that the servers and data are always available to
authorize ITS users. In ITS, services are needed in real time. Therefore, the availability feature
should be considered.
 Identification: This feature can ensure that unauthorized ITS-S (vehicles) cannot be linked in ITS.
Identification of each ITS-S is difficult. Therefore, there is a need to design and develop effective
mechanisms for the identification of vehicles.
 Authentication: Authentication can ensure that the messages received are legitimate. However,
authentication can be carried out in ITS without revealing the real identity of the vehicle.
Efficient approaches are needed to deal with this feature.
 Non-Repudiation: This feature ensures that the communicating entities cannot deny the
previous communication. In order to avoid malicious threats in ITS, a non-repudiation feature
must be considered.
 Privacy: A privacy feature in ITS can guarantee that only the authorized servers can control the
anonymity. Confidentiality aims to encrypt the data, while privacy ensures that the real identity
of information cannot be revealed from messages/data . In ITS, privacy of a legitimate vehicle is
the most important attribute. In order to avoid tractability of an honest ITS user, there is a great
need for the design and development of security and privacy mechanisms.
 Trust: Trust can guarantee the preceding security and anonymous communication features to be
accomplished during the give and take phases among distinct entities. In ITS, the feature of trust
can be divided between applications and entities.
ITS Regional Architecture
Regional intelligent transportation systems (ITS) architecture is defined as A specific, tailored framework
for ensuring institutional agreement and technical integration for the implementation of ITS projects or
groups of projects in a particular region. It functionally defines what pieces of the system are linked to
others and what information is exchanged between them. Most of the regional ITS architecture is
devoted to showing all of the existing and planned operational transportation systems in a region and
how they will fit together. From a planning perspective, the regional ITS architecture should support the
regions objectives and also support the specific needs of transportation planning agencies. It should
show how data is collected, archived, and processed to support transportation planning and
performance monitoring. The strength of the regional ITS architecture process is its development of an
integrated view of the regional transportation system based on a set of identified services or strategies.
This complements the planning for operations approach, where the focus is on defining the most
effective strategies for a region based on high-level goals and operational objectives. By connecting the
two processes, one combines the strong basis for selecting strategies in planning for operations with the
strength of the architecture development process in defining an integrated framework based on
selected services.

You might also like