Modelling ITS Systems to Meet Security and Reliability Requirements Chan, Eric ; Robinson, Tom ; Preece, Andrew
Publication details: Bryssel ITS in daily life: 16th world congress and exhibition on intelligent transport systems and services, Stockholm 21-25 September 2009. Paper, 2009Description: 8 sSubject(s): Bibl.nr: VTI P1835:16 [World]Location: Abstract: Intelligent Transport Systems (ITS) often utilize sensitive financial or private data. This can attract malicious users seeking to exploit vulnerabilities in the system. The facITS project analyzes and classifies ITS systems from the perspective of vulnerability to such threats. A number of ITS applications are then modeled in Simulink in order to investigate potential design choices for mitigation of the effects of the threats. The models also facilitate the analysis of multiple simultaneous threats to the system. This is made easier by placing a framework around the system model, which automatically introduces threats within the model, evaluates its system-wide effects and collates all of the analysis data into a comprehensive report.| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Statens väg- och transportforskningsinstitut | Available |
Intelligent Transport Systems (ITS) often utilize sensitive financial or private data. This can attract malicious users seeking to exploit vulnerabilities in the system. The facITS project analyzes and classifies ITS systems from the perspective of vulnerability to such threats. A number of ITS applications are then modeled in Simulink in order to investigate potential design choices for mitigation of the effects of the threats. The models also facilitate the analysis of multiple simultaneous threats to the system. This is made easier by placing a framework around the system model, which automatically introduces threats within the model, evaluates its system-wide effects and collates all of the analysis data into a comprehensive report.