6,337 research outputs found

    Analysing the design criteria of charging cordons

    Get PDF
    The idea of the efficient use of roads, which requires users to pay for the traffic congestion cost that they impose on an urban road network, is long established (Pigou, 1920; Walters, 1961). However, the gap between the constructive theory of road pricing and its real world application is significant due to the issue of public acceptance, technical feasibility, and the cost of implementation (Sharp, 1966; Verhoef et al, 1995; Stenman and Sterner, 1998; and Sumalee, 2000). Different charging regimes have been developed and studied including time or delay based charging, distance based charging, cordon or boundary based charging, and area based charging (Holland and Watson, 1978; May, 1992; Oldridge, 1990; Smith et al, 1994; and Ison, 1998). The cordon charging system is the core of the study in this paper where we are looking for criteria for the judgmental design of cordons. We use the term “judgmental cordon design” to describe the process to identify the best locations to levy the charges and specify the optimal charge levels based on professional judgment. This paper reviews the literature to identify design criteria in section 2, and then it describes a survey with six UK local authorities in section 3. Section 4 presents the results of the survey and finally section 5 discuss the results and draw the conclusions

    A Survey on Privacy-preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems

    Get PDF
    As part of Intelligent Transportation Systems (ITS), Electronic toll collection (ETC) is a type of toll collection system (TCS) which is getting more and more popular as it can not only help to finance the government's road infrastructure but also it can play a crucial role in pollution reduction and congestion management. As most of the traditional ETC schemes (ETCS) require identifying their users, they enable location tracking. This violates user privacy and poses challenges regarding the compliance of such systems with privacy regulations such as the EU General Data Protection Regulation (GDPR). So far, several privacy-preserving ETC schemes have been proposed. To the best of our knowledge, this is the first survey that systematically reviews and compares various characteristics of these schemes, including components, technologies, security properties, privacy properties, and attacks on ETCS. This survey first categorizes the ETCS based on two technologies, GNSS and DSRC. Then under these categories, the schemes are classified based on whether they provide formal proof of security and support security analysis. We also demonstrate which schemes specifically are/are not resistant to collusion and physical attacks. Then, based on these classifications, several limitations and shortcomings in privacy-preserving ETCS are revealed. Finally, we identify several directions for future research

    P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection

    Get PDF
    Electronic toll collection (ETC) is widely used all over the world not only to finance our road infrastructures, but also to realize advanced features like congestion management and pollution reduction by means of dynamic pricing. Unfortunately, existing systems rely on user identification and allow tracing a user’s movements. Several abuses of this personalized location data have already become public. In view of the planned Europeanwide interoperable tolling system EETS and the new EU General Data Protection Regulation, location privacy becomes of particular importance. In this paper, we propose a flexible security model and crypto protocol framework designed for privacy-preserving toll collection in the most dominant setting, i.e., Dedicated Short Range Communication (DSRC) ETC. A major challenge in designing the framework at hand was to combine provable security and practicality, where the latter includes practical performance figures and a suitable treatment of real-world issues, like broken onboard units etc. To the best of our knowledge, our work is the first in the DSRC setting with a rigorous security model and proof and arguably the most comprehensive formal treatment of ETC security and privacy overall. Additionally, we provide a prototypical implementation on realistic hardware which already features fairly practical performance figures. An interaction between an onboard unit and a road-side unit is estimated to take less than a second allowing for toll collection at full speed assuming one road-side unit per lane

    Project Management Process Improvement for MassDOT

    Get PDF
    Although MassDOT has made improvements to its on-time and on-budget performances, there is still significant area for improvement as 49% of projects in 2010 went over budget and 38% of the projects in 2010 were not completed on time . The purpose of this project was to analyze the entire project management process of MassDOT and provide a feasible recommendation. The overall process can be improved with the successful implementation of an online enterprise project management software (EPMS). The recommended EPMS is Project Insight Enterprise SaaS with a total initial annual cost of $81,960 dollars for 1000 users with different levels of clearance, which includes account set up and implementation on the same day, as well as one week of training for MassDOT staff

    Anonymous Point Collection - Improved Models and Security Definitions

    Get PDF
    This work is a comprehensive, formal treatment of anonymous point collection. The proposed definition does not only provide a strong notion of security and privacy, but also covers features which are important for practical use. An efficient realization is presented and proven to fulfill the proposed definition. The resulting building block is the first one that allows for anonymous two-way transactions, has semi-offline capabilities, yields constant storage size, and is provably secure

    Anonymous Point Collection - Improved Models and Security Definitions

    Get PDF
    This work is a comprehensive, formal treatment of anonymous point collection. The proposed definition does not only provide a strong notion of security and privacy, but also covers features which are important for practical use. An efficient realization is presented and proven to fulfill the proposed definition. The resulting building block is the first one that allows for anonymous two-way transactions, has semi-offline capabilities, yields constant storage size, and is provably secure
    • …
    corecore