Skip to main content

Analysis and Assessment of Risk in Digital Railway Radio Communication System

  • Conference paper
  • First Online:
Research Methods and Solutions to Current Transport Problems (ISCT21 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1032))

Included in the following conference series:

  • 769 Accesses

Abstract

This paper presents an analysis of potential threats to information transmission in a GSM-R system, including technical factors, human factors and organizational factors. Modern telecommunications systems are exposed to a variety of hazards variable in time. In this paper, they are divided into three underlying groups: hardware and software related, intentional and unintentional as well as internal and external.

The role of risk assessment in information security management is presented. Distinct phases of risk assessment process are characterized. Methods used in the process of risk assessment and risk planning are discussed, taking into account possible responses to threats and opportunities. Lastly, an original method for identifying threats and detecting vulnerabilities in railway radio communication systems is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xun, D., Xin, C., Wenyi, J.: The analysis of GSM-R redundant network and reliability models on high-speed railway. In: 2010 International Conference on Electronics and Information Engineering (ICEIE 2010), Kyoto, Japan (2010)

    Google Scholar 

  2. Kowalewski, M., Kowalewski, J.: Information security policy in practice. Library IT Professional (2014)

    Google Scholar 

  3. Kowalewski, M., Kowalewski, J.: Threats of Information in Cyberspace Cyberterrorism. Publishing House of Warsaw University of Technology, Warsaw (2017)

    Google Scholar 

  4. Krzykowska, K., Siergiejczyk, M.: Selected aspects of risk analysis and assessment of the use of air navigation satellite systems. In: Smith, I. (ed.) Logistics Magazine 6/2014. Institute of Logistics and Warehousing, Conference TransComp (2014). ISSN 1231-5478

    Google Scholar 

  5. Lehrbaum, M.: GSM-R Disaster Recovery, GSM-R Business Operations, Warsaw, October 2009

    Google Scholar 

  6. Liderman, K.: Risk analysis and protection of information in computer systems. PWN Warsaw (2009)

    Google Scholar 

  7. Pawlik, M.: The European Rail Traffic Management System, an overview of the features and technical solutions - from concept to implementation and operation. KOW, Warsaw (2015)

    Google Scholar 

  8. Pawlik, M., Siergiejczyk, M., Gago, S.: European rail transport management system mobile transmission safety analysis. In: Walls, L., Revie, M., Bedford, T. (eds.) Risk, Reliability and Safety: Innovating Theory and Practice © 2017. Taylor & Francis Group, London, (2017)

    Google Scholar 

  9. Perzynski, T., Lewinski, A., Lukasik, Z.: The Concept of Emergency Notification System for Inland Navigation. Monograph Information, Communication and Environment, Radom (2015)

    Chapter  Google Scholar 

  10. ISO/IEC 17799: 2003 Information technology. Practical information security management

    Google Scholar 

  11. PN-ISO/IEC 27001:2007. Information security management systems. Requirements

    Google Scholar 

  12. Project Management Institute: A guide to the Project Management Body of Knowledge (PMBOK Guide). Ingram International Inc. (2013)

    Google Scholar 

  13. Siergiejczyk, M.: Analysis of information secure transmission methods in the intelligent transport systems. Arch. Transp. Syst. Telematics 10(3) (2017)

    Google Scholar 

  14. Siergiejczyk, M.: Critical assessment of ERTMS systems reliability based on the example of the GSM-R system. J. KONES 23(4) (2016)

    Article  Google Scholar 

  15. Siergiejczyk, M., Gago, S.: Ensure information security problems in the GSM-R network. In: Siergiejczyk, M. (ed.) Scientific Papers of Warsaw University of Technology. Transport, Z. 92. Publishing House of Warsaw University of Technology, Warsaw (2013)

    Google Scholar 

  16. Siergiejczyk, M., Gago, S.: Safety and security, availability and certification of the GSM-R network for ETCS purposes. Arch. Transp. Syst. Telematics 7(1) (2014)

    Google Scholar 

  17. Siergiejczyk, M., Gago, S.: Selected problems of reliability and security of data transmission in the GSM-R system. Railway Probl. 58(162) (2014)

    Google Scholar 

  18. UIC project EIRENE. System Requirements Specification, GSM-R Operators Group, System Requirements Specification (SRS) Version 16.0.0, December 2015

    Google Scholar 

  19. UIC project EIRENE. Functional Requirements Specification (FRS) Version 8.0.0, December 2015

    Google Scholar 

  20. Winter, P.: International Union of Railways, Compendium on ERTMS. Eurail Press, Hamburg (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mirosław Siergiejczyk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Siergiejczyk, M. (2020). Analysis and Assessment of Risk in Digital Railway Radio Communication System. In: Siergiejczyk, M., Krzykowska, K. (eds) Research Methods and Solutions to Current Transport Problems. ISCT21 2019. Advances in Intelligent Systems and Computing, vol 1032. Springer, Cham. https://doi.org/10.1007/978-3-030-27687-4_39

Download citation

Publish with us

Policies and ethics