Authentication and Data Security in ITS Telecommunications Solutions

Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solut...

Full description

Bibliographic Details
Main Authors: Tomas Zelinka, Michal Jerabek, Zdenek Lokaj
Format: Article
Language:English
Published: International Institute of Informatics and Cybernetics 2014-04-01
Series:Journal of Systemics, Cybernetics and Informatics
Subjects:
Online Access:http://www.iiisci.org/Journal/CV$/sci/pdfs/SA783UV13.pdf
id doaj-220dca566631458cacb857e2a2cf9165
record_format Article
spelling doaj-220dca566631458cacb857e2a2cf91652020-11-24T22:30:06ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242014-04-011227480Authentication and Data Security in ITS Telecommunications SolutionsTomas Zelinka0Michal Jerabek1Zdenek Lokaj2 Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solutions require different levels of quality. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure or other vehicles significantly and progressively grow. This trend leads to increase of the fatal problems if security of the wide area networks is not relevantly treated. Relevant communications security treatment becomes crucial part of the ITS telecommunications solution because probability of hazards appearances grow if vehicles networks are integrated in the dynamically organized wide area networks. Besides of available "off shelf" security tools solution based on non-public universal identifier with dynamical extension and data selection according to actor role or category is presented including performances indicators for the authentication process.http://www.iiisci.org/Journal/CV$/sci/pdfs/SA783UV13.pdf Telematicsdata securityIntelligent Transport SystemObject IdentificationAuthenticationSystem PerformancePerformance Indicator
collection DOAJ
language English
format Article
sources DOAJ
author Tomas Zelinka
Michal Jerabek
Zdenek Lokaj
spellingShingle Tomas Zelinka
Michal Jerabek
Zdenek Lokaj
Authentication and Data Security in ITS Telecommunications Solutions
Journal of Systemics, Cybernetics and Informatics
Telematics
data security
Intelligent Transport System
Object Identification
Authentication
System Performance
Performance Indicator
author_facet Tomas Zelinka
Michal Jerabek
Zdenek Lokaj
author_sort Tomas Zelinka
title Authentication and Data Security in ITS Telecommunications Solutions
title_short Authentication and Data Security in ITS Telecommunications Solutions
title_full Authentication and Data Security in ITS Telecommunications Solutions
title_fullStr Authentication and Data Security in ITS Telecommunications Solutions
title_full_unstemmed Authentication and Data Security in ITS Telecommunications Solutions
title_sort authentication and data security in its telecommunications solutions
publisher International Institute of Informatics and Cybernetics
series Journal of Systemics, Cybernetics and Informatics
issn 1690-4524
publishDate 2014-04-01
description Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solutions require different levels of quality. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure or other vehicles significantly and progressively grow. This trend leads to increase of the fatal problems if security of the wide area networks is not relevantly treated. Relevant communications security treatment becomes crucial part of the ITS telecommunications solution because probability of hazards appearances grow if vehicles networks are integrated in the dynamically organized wide area networks. Besides of available "off shelf" security tools solution based on non-public universal identifier with dynamical extension and data selection according to actor role or category is presented including performances indicators for the authentication process.
topic Telematics
data security
Intelligent Transport System
Object Identification
Authentication
System Performance
Performance Indicator
url http://www.iiisci.org/Journal/CV$/sci/pdfs/SA783UV13.pdf
work_keys_str_mv AT tomaszelinka authenticationanddatasecurityinitstelecommunicationssolutions
AT michaljerabek authenticationanddatasecurityinitstelecommunicationssolutions
AT zdeneklokaj authenticationanddatasecurityinitstelecommunicationssolutions
_version_ 1725741948656943104