Welcome to the National Transport Library Catalogue

Normal view MARC view

Modelling ITS Systems to Meet Security and Reliability Requirements Chan, Eric ; Robinson, Tom ; Preece, Andrew

By: Contributor(s): Publication details: Bryssel ITS in daily life: 16th world congress and exhibition on intelligent transport systems and services, Stockholm 21-25 September 2009. Paper, 2009Description: 8 sSubject(s): Bibl.nr: VTI P1835:16 [World]Location: Abstract: Intelligent Transport Systems (ITS) often utilize sensitive financial or private data. This can attract malicious users seeking to exploit vulnerabilities in the system. The facITS project analyzes and classifies ITS systems from the perspective of vulnerability to such threats. A number of ITS applications are then modeled in Simulink in order to investigate potential design choices for mitigation of the effects of the threats. The models also facilitate the analysis of multiple simultaneous threats to the system. This is made easier by placing a framework around the system model, which automatically introduces threats within the model, evaluates its system-wide effects and collates all of the analysis data into a comprehensive report.
Item type: Reports, conferences, monographs
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Statens väg- och transportforskningsinstitut Available

Intelligent Transport Systems (ITS) often utilize sensitive financial or private data. This can attract malicious users seeking to exploit vulnerabilities in the system. The facITS project analyzes and classifies ITS systems from the perspective of vulnerability to such threats. A number of ITS applications are then modeled in Simulink in order to investigate potential design choices for mitigation of the effects of the threats. The models also facilitate the analysis of multiple simultaneous threats to the system. This is made easier by placing a framework around the system model, which automatically introduces threats within the model, evaluates its system-wide effects and collates all of the analysis data into a comprehensive report.