Authentication and Data Security in ITS Telecommunications Solutions

Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solutions require different levels of quality. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure or other vehicles significantly and progressively grow. This trend leads to increase of the fatal problems if security of the wide area networks is not relevantly treated. Relevant communications security treatment becomes crucial part of the ITS telecommunications solution because probability of hazards appearances grow if vehicles networks are integrated in the dynamically organized wide area networks. Besides of available “off shelf” security tools solution based on non-public universal identifier with dynamical extension and data selection according to actor role or category is presented including performances indicators for the authentication process.

[1]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[2]  Martin Srotyr,et al.  Adaptive Multi-path Telecommunications Solutions for ITS , 2011 .

[3]  Miroslav Svitek,et al.  Communication tools for intelligent transport systems , 2006 .

[4]  Zuzana Bělinová,et al.  Intelligent Transport System Architecture Different Approaches and Future Trends , 2010 .

[5]  Miroslav Svitek,et al.  Identification of communication solution designated for transport telematic applications , 2008 .

[6]  Petr Bures,et al.  Evolving ITS Architecture - The Czech Experience , 2011, TST.

[7]  Miroslav Svitek,et al.  Communication scheme for airport service vehicles navigation , 2007 .

[8]  T. Zelinka,et al.  Communication solution for Vehicles Navigation on the Airport territory , 2007, 2007 IEEE Intelligent Vehicles Symposium.

[9]  Miroslav Svitek,et al.  Adaptive communications solutions in complex transport telematics systems , 2008, ICC 2008.

[10]  Miroslav Svitek,et al.  Decision processes in multi-path telematic communications systems , 2008, EATIS.

[11]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[12]  Zdenek Lokaj,et al.  Adaptive Decision Processes the Multi-path Wireless Access Solutions Implementable on the IP Routing layer , 2010 .

[13]  Mike McDonald,et al.  intelligent transport systems , 2010 .

[14]  Chanathip Namprempre,et al.  Security Proofs for Identity-Based Identification and Signature Schemes , 2008, Journal of Cryptology.

[15]  Miroslav Svitek,et al.  Decision processes in Communications Multi-path Access Systems applied within ITS , 2008 .

[16]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[17]  Kun Yang,et al.  Policy-based model-driven creation of adaptive services in wireless environments , 2007, IEEE Vehicular Technology Magazine.

[18]  Miroslav Svitek,et al.  Communication solution for GPS based airport service vehicles navigation , 2007, EATIS '07.

[19]  T. Zelinka,et al.  Communication scheme of airport over-ground traffic navigation system , 2007, 2007 International Symposium on Communications and Information Technologies.

[21]  Miroslav Svitek,et al.  Adaptive approach to management of the multi-path wireless solutions , 2009 .

[22]  Ieee Standards Board IEEE Standard for local and metropolitan area networks : supplement to Integrated Services (IS) LAN Interface at the Medium Access Control (MAC) and Physical (PHY) layers : Managed Object Conformance (MOCS) Proforma , 1996 .

[23]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[24]  Chanathip Namprempre,et al.  Security Proofs for Identity-Based Identification and Signature Schemes , 2004, EUROCRYPT.