Skip to main content

Availability Factors in Delivery of Information and Communication Resources to Traffic System Users

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 715))

Abstract

Availability, as one of the basic elements of IC (information and communication) system security, plays an important role in its work and in operation of services that are provided through it. IC system and related services (IC resources) must be available to end users when needed. Availability of IC resources is especially evident in IC systems implemented in a traffic environment. The emergence of new concepts such as Internet of Things or Cloud Computing and technologies such as 5G resulting in an increasing processes automatization in the traffic system. In doing so, the unavailability of individual IC resource can result in negative user experience in usage of certain classes of services, but can also represent a potentially large security risk and compromised user safety. In such environment required level of IC resources availability are often extremely high so it is essential to know which factors affect it. This research aims to identify these factors, and the results of this research will provide guidelines by which factors needs to be managed to achieve the required level of IC service availability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hamida, E., Noura, H., Znaidi, W.: Security of cooperative intelligent transport systems: standards. Threats Anal. Cryptogr. Countermeas. Electron. 4(3), 380–423 (2015)

    Google Scholar 

  2. Cvitić, I., Peraković, D., Periša, M., Jerneić, B.: Availability protection of IoT concept based telematics system in transport. In: Mikulski, J. (ed.) TST 2016. CCIS, vol. 640, pp. 109–121. Springer, Cham (2016). doi:10.1007/978-3-319-49646-7_10

    Chapter  Google Scholar 

  3. Boudguiga, A., Kaiser, A., Cincilla, P.: Cooperative-ITS architecture and security challenges: a survey. In: 22nd ITS World Congress, pp. 5–9 (2015)

    Google Scholar 

  4. Othmane, L.B., Weffers, H., Mohamad, M.M., Wolf, M.: A survey of security and privacy in connected vehicles. In: Benhaddou, D., Al-Fuqaha, A. (eds.) Wireless sensor and mobile ad-hoc networks, pp. 217–247. Springer, New York (2015)

    Google Scholar 

  5. Sumra, I.A., Hasbullah, H.B., AbManan, J.B.: Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey. In: Laouiti, A., Qayyum, A., Saad, M.N.M. (eds.) Advances in Intelligent Systems and Computing, vol. 306, pp. 51–61. Springer, Singapore (2015)

    Google Scholar 

  6. Hoda, R., Roosta, A.K.: Calculating total system availability. Universiteit van Amsterdam (2014). https://staff.science.uva.nl/c.t.a.m.delaat/rp/2013-2014/p17/report.pdf. Accessed 13 Dec 2016

  7. Barabady, J.: Improvement of System Availability Using Reliability and Maintainability Analysis, Luleå University of Technology (2005)

    Google Scholar 

  8. ISACA: State of Cybersecurity: Implications for 2015, Rolling Meadows (2015)

    Google Scholar 

  9. Cardoso, R.M., Mastelari, N., Bassora, M.F.: Internet of things architecture in the context of intelligent transportation system: a case study towards a web-based application deployment. In: 22nd International Congress of Mechanical Engineering (COBEM 2013), pp. 7751–7760 (2013)

    Google Scholar 

  10. Periša, M., Peraković, D., Šarić, S.: Conceptual model of providing traffic navigation services to visually impaired persons. Promet Traffic Transp. 26(3), 209–218 (2014)

    Google Scholar 

  11. Peraković, D., Periša, M., Remenar, V.: Model of guidance for visually impaired persons in the traffic network. Transp. Res. Part F: Traffic Psychol. Behav. 31, 1–11 (2015)

    Article  Google Scholar 

  12. Ji, Z., Ganchev, I., O’Droma, M., Zhang, X.: A cloud-based intelligent car parking services for smart cities. In: 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), pp. 1–4 (2014)

    Google Scholar 

  13. Qi, L.: Research on intelligent transportation system technologies and applications. In: 2008 Workshop on Power Electronics and Intelligent Transportation System, pp. 529–531 (2008)

    Google Scholar 

  14. Zear, A., Kumar Singh, P., Singh, Y.: Intelligent transport system: a progressive review. Indian J. Sci. Technol. 9(32), 1–8 (2016)

    Article  Google Scholar 

  15. Lockwood, S., Auer, A., Feese, S.: History of Intelligent Transportation Systems. Washington, USA (2016)

    Google Scholar 

  16. United Nations ESCAP: Intelligent Transportation Systems for Sustainable Development in Asia and the Pacific, Bangkok, Thailand (2015)

    Google Scholar 

  17. Jonkers, E., Gorris, T.: Intelligent Transport Systems and Traffic Management for Urban Areas (2015)

    Google Scholar 

  18. Benz, T., et al.: Inception report and state-of-the-art review (2011)

    Google Scholar 

  19. 5G systems (2017). https://www.ericsson.com/assets/local/publications/white-papers/wp-5g-systems.pdf. Accessed 26 Jan 2017

  20. The Road to 5G: Drivers, Applications, Requirements and Technical Development (2015). http://www.huawei.com/minisite/5g/img/GSA_the_Road_to_5G.pdf. Accessed 18 Jan 2017

  21. European Commission, Intelligent Transport Systems – EU-funded research for efficient, clean and safe road transport, Brussels (2010)

    Google Scholar 

  22. Ashokkumar, K., Sam, B., Arshadprabhu, R.: Cloud based intelligent transport system. Procedia Comput. Sci. 50, 58–63 (2015)

    Article  Google Scholar 

  23. Levy-Bencheton, C., Darra, E.: Cyber Security and Resilience of Intelligent Public Transport: Good Practices and Recommendations. Heraklion, Greece (2015)

    Google Scholar 

  24. Jouini, M., Rabai, L.B.A., Aissa, A.B.: Classification of security threats in information systems. Procedia Comput. Sci. 32, 489–496 (2014)

    Article  Google Scholar 

  25. Gibson, D.: Managing Risk In Information Systems (2010)

    Google Scholar 

  26. Somal, L.K., Virk, K.S.: Classification of distributed denial of service attacks – architecture, taxonomy and tools. Int. J. Adv. Res. Comput. Sci. Technol. 2(2), 118–122 (2014)

    Google Scholar 

  27. Mittal, A., Shrivastava, A.K., Manoria, M.: A review of DDOS attack and its countermeasures in TCP based networks. Int. J. Comput. Sci. Eng. Surv. 2(4), 177–187 (2011)

    Article  Google Scholar 

  28. Cvitić, I., Vujić, M., Husnjak, S.: Classification of security risks in the IoT environment. In: 26th Daaam International Symposium on Intelligent Manufacturing and Automation, pp. 0731–0740 (2016)

    Google Scholar 

  29. Rose, K., Eldridge, S., Chapin, L.: The Internet of Things: An Overview. Geneva, Switzerland (2015)

    Google Scholar 

  30. Jansen, W.A.: Cloud hooks: security and privacy issues in cloud computing. In: 2011 44th Hawaii International Conference on System Sciences, no. 4, pp. 1–10 (2011)

    Google Scholar 

  31. National Consortium for the Study of Terrorism and Responses to Terrorism, Country Reports on Terrorism 2015, Maryland, USA (2016)

    Google Scholar 

  32. GSMA: Connected Car Forecast: Global Connected Car Market to Grow Threefold Within Five Years, London, UK (2013)

    Google Scholar 

  33. Cisco Systems Inc.: High Availability Disaster Recovery: Best Practices. http://www.cisco.com/en/US/technologies/collateral/tk869/tk769/white_paper_c11-453495.html. Accessed 12 Jan 2017

  34. Reuter, C.: Power outage communications: survey of needs, infrastructures and concepts. In: Proceedings of the 10th International ISCRAM Conference, pp. 884–889 (2013)

    Google Scholar 

  35. Gupta, E.: Process mining a comparative study. Int. J. Adv. Res. Comput. Commun. Eng. 3(11), 17–23 (2014)

    Google Scholar 

  36. Meneguette, R.I.: A vehicular cloud-based framework for the intelligent transport management of big cities. Int. J. Distrib. Sens. Netw. 2016, 1–9 (2016)

    Google Scholar 

  37. Ertaul, L., Singhal, S., Saldamli, G.: Security challenges in cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 36–42 (2013)

    Google Scholar 

  38. CERT® Division: Unintentional Insider Threats: A Foundational Study (2013). http://www.sei.cmu.edu/reports/13tn022.pdfedu. Accessed 18 Dec 2016

  39. Marinos, L., Belmonte, A., Rekleitis, E.: Threat Landscape 2015. Heraklion, Greece (2016)

    Google Scholar 

  40. Casey, T.: A Field Guide to Insider Threat (2015). http://www.intel.com/content/www/us/en/it-management/intel-it-best-practices/a-field-guide-to-insider-threat-paper.html. Accessed 11 Oct 2016

  41. Ophoff, J., et al.: A descriptive literature review and classification of insider threat research. In: Proceedings of Informing Science and IT Education Conference (InSITE) 2014, pp. 211–223 (2014)

    Google Scholar 

  42. Australia Government: Physical security of ICT equipment systems and facilities. https://www.protectivesecurity.gov.au/physicalsecurity/Pages/PhysicalSecurityOfICTEquipmentSystemsAndFacilitiesGuidelines.aspx. Accessed 07 Jan 2017

  43. Montanari, L., Querzoni, L.: Critical Infrastructure Protection: Threats, Attacks and Countermeasures (2014). http://www.dis.uniroma1.it/~tenace/download/deliverable/WP4-Deliverable4b-TENACE.pdf. Accessed 21 Jan 2017

  44. ENISA: Threat Landscape and Good Practices for the Internet Infrastructure. Heraklion, Greece (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ivan Cvitić .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Cvitić, I., Peraković, D., Kuljanić, T.M. (2017). Availability Factors in Delivery of Information and Communication Resources to Traffic System Users. In: Mikulski, J. (eds) Smart Solutions in Today’s Transport. TST 2017. Communications in Computer and Information Science, vol 715. Springer, Cham. https://doi.org/10.1007/978-3-319-66251-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66251-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66250-3

  • Online ISBN: 978-3-319-66251-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics