Authentication and Data Security in ITS Telecommunications Solutions
Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solut...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Institute of Informatics and Cybernetics
2014-04-01
|
Series: | Journal of Systemics, Cybernetics and Informatics |
Subjects: | |
Online Access: | http://www.iiisci.org/Journal/CV$/sci/pdfs/SA783UV13.pdf
|
id |
doaj-220dca566631458cacb857e2a2cf9165 |
---|---|
record_format |
Article |
spelling |
doaj-220dca566631458cacb857e2a2cf91652020-11-24T22:30:06ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242014-04-011227480Authentication and Data Security in ITS Telecommunications SolutionsTomas Zelinka0Michal Jerabek1Zdenek Lokaj2 Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solutions require different levels of quality. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure or other vehicles significantly and progressively grow. This trend leads to increase of the fatal problems if security of the wide area networks is not relevantly treated. Relevant communications security treatment becomes crucial part of the ITS telecommunications solution because probability of hazards appearances grow if vehicles networks are integrated in the dynamically organized wide area networks. Besides of available "off shelf" security tools solution based on non-public universal identifier with dynamical extension and data selection according to actor role or category is presented including performances indicators for the authentication process.http://www.iiisci.org/Journal/CV$/sci/pdfs/SA783UV13.pdf Telematicsdata securityIntelligent Transport SystemObject IdentificationAuthenticationSystem PerformancePerformance Indicator |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Tomas Zelinka Michal Jerabek Zdenek Lokaj |
spellingShingle |
Tomas Zelinka Michal Jerabek Zdenek Lokaj Authentication and Data Security in ITS Telecommunications Solutions Journal of Systemics, Cybernetics and Informatics Telematics data security Intelligent Transport System Object Identification Authentication System Performance Performance Indicator |
author_facet |
Tomas Zelinka Michal Jerabek Zdenek Lokaj |
author_sort |
Tomas Zelinka |
title |
Authentication and Data Security in ITS Telecommunications Solutions |
title_short |
Authentication and Data Security in ITS Telecommunications Solutions |
title_full |
Authentication and Data Security in ITS Telecommunications Solutions |
title_fullStr |
Authentication and Data Security in ITS Telecommunications Solutions |
title_full_unstemmed |
Authentication and Data Security in ITS Telecommunications Solutions |
title_sort |
authentication and data security in its telecommunications solutions |
publisher |
International Institute of Informatics and Cybernetics |
series |
Journal of Systemics, Cybernetics and Informatics |
issn |
1690-4524 |
publishDate |
2014-04-01 |
description |
Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solutions require different levels of quality. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure or other vehicles significantly and progressively grow. This trend leads to increase of the fatal problems if security of the wide area networks is not relevantly treated. Relevant communications security treatment becomes crucial part of the ITS telecommunications solution because probability of hazards appearances grow if vehicles networks are integrated in the dynamically organized wide area networks. Besides of available "off shelf" security tools solution based on non-public universal identifier with dynamical extension and data selection according to actor role or category is presented including performances indicators for the authentication process. |
topic |
Telematics data security Intelligent Transport System Object Identification Authentication System Performance Performance Indicator |
url |
http://www.iiisci.org/Journal/CV$/sci/pdfs/SA783UV13.pdf
|
work_keys_str_mv |
AT tomaszelinka authenticationanddatasecurityinitstelecommunicationssolutions AT michaljerabek authenticationanddatasecurityinitstelecommunicationssolutions AT zdeneklokaj authenticationanddatasecurityinitstelecommunicationssolutions |
_version_ |
1725741948656943104 |