245 research outputs found

    Possible Application of Short Range Communication Technologies in the Digital Tachograph System to Support Vehicles Filtering during Road Controls

    Get PDF
    The existing Digital Tachograph is a regulatory instrument (mandatory by Council Regulation since 1st May 2006) to enforce the application of social regulations in road transport especially with the view to increase traffic safety. It records the work and the rest times of drivers as well as the vehicle speed over time with the aim to ensure that appropriate rest periods are taken by drivers and that a maximum of permissible speed is not exceeded. The original and prime functionality of the Digital Tachograph is to document, i.e. to record, the driving history of a driver and his vehicle. Nevertheless controls by the road safety authorities are rather inefficient while time-consuming. The proposed update to the existing regulation would rather guarantee the Digital Tachograph as a compliance device rather than as an accurate recorder of driving history. Basic innovation is the application of short range communication technologies (like RFID) allowing the road authorities to scan by-passing vehicles and thus increasing the throughput by the order of ten.JRC.DG.G.7-Traceability and vulnerability assessmen

    Security Protocols and Evidence: Where Many Payment Systems Fail

    Get PDF
    As security protocols are used to authenticate more transactions, they end up being relied on in legal proceedings. Designers often fail to anticipate this. Here we show how the EMV protocol – the dominant card payment system worldwide – does not produce adequate evidence for resolving disputes. We propose five principles for designing systems to produce robust evidence. We apply these principles to other systems such as Bitcoin, electronic banking and phone payment apps. We finally propose specific modifications to EMV that could allow disputes to be resolved more efficiently and fairly

    Intelligent Sensors Security

    Get PDF
    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process

    Assessment of Threats to the Security of the Cryptographic Authentication Mechanisms of the Monitor Devices of Vehicles

    Get PDF
    In accordance with the legislation on transport security, a number of vehicles must be equipped with on-Board control devices containing a cryptographic means of authentication, registration and storage of control data, including key information of the electronic signature. This paper presents a solution to the problem of justification of the adequacy of measures to counter known attacks and methods of discrediting the suggested cryptographic mechanisms and the corresponding protocol, drawn up in the form of a draft national standard and presented in the previous work of the authors devoted to study of its security properties. The solution presented is limited to the consideration of attacks divided into two large classes: passive and active attacks, including temporary attacks based on the study of the response time of one or more participants of the protocol. The analysis of the security threat model of the Protocol generating a common key with the authentication of subscribers intended for use in tachographs installed on vehicles shows that the protocol provides sufficient measures to counter known attacks. The found possible attacks are of a formal nature, not allowing the offender to obtain any additional information in order to discredit the protocol

    MOBILITY PACKAGE IN LITHUANIAN LOGISTICS

    Get PDF
    Over the past few years, there have been significant changes in the logistics sector. New regulations of commercial road transport at the European Union level have been released. Hundreds of cargo transports are carried out by road transport every day. The study shows that these rules aim to ensure a balance between the social security of drivers and the freedom of operators to provide cross-border transport services. Although, the changes also caused a lot of conflicting thoughts. Therefore, this article attempts to reveal the benefits/harms and impact on businesses of introducing a Mobility package

    DSRC CAN INTERFACE SPECIFICATION for the Smart Tachograph application

    Get PDF
    This technical report is based on the technical specification details an implementation of the DSRC-CAN interface and communication protocol based on the SAE J1939 standard between the Vehicle Unit and a CAN based DSRC module in a Smart Tachograph System. The technical specification has been defined by the tachograph manufacturers Stoneridge, Continental and Intellic with the technical support of the Joint Research Centre of the European Commission and the vehicle manufactures via the HDEI (Heavy Truck Electronic Interface) working group.JRC.E.3-Cyber and Digital Citizens' Securit

    Some problems of data security of digital tachograph system

    Get PDF
    The paper refers to some introduction problems of Digital Tachograph System (DTS) in EEA. It affects 25 states of the European Union and EFTA (Island, Liechtenstein, Norway) and Switzerland. The legislation principles and structure of DTS in the EU are characterized, especially Polish elements. The current state of DTS introduction in the EU Member States was also noted. Some problems of data security concern TACHONET system that ensures reliable and secure exchange of data between Member States issuing tachograph cards. The digital tachograph security principles (ITSEC) of the motion sensor, the vehicle unit and the smart cards were taken into consideration. First published online: 27 Oct 201

    Changing data in tachograph’s recording: a case study

    Get PDF
    The purpose of this article is to show how important it is to respect the rules of road safety related to the work of drivers and what are the consequences of breaking them. The problem of the manipulation of working time is widely discussed as it contributes to creating dangerous situations for not only operators but also other road users. On the basis of the questionnaire investigation the most popular methods of changing data in analogue and digital recording equipment are described. On the basis of them, technological and organizational changes are proposed in the existing transport system

    The Government’s Forward Regulatory Programme

    Get PDF
    Gives an overview of the Forward Programme, which identifies 308 regulatory changes that may be implemented between April 2010 up to and including April 2011 (comprising 265 new measures and 43 simplifications of existing measures). The Forward Programme is intended to provide greater transparency to the Government’s regulatory intentions as they impact on business
    • 

    corecore