4 research outputs found

    TRANSPORT AND ECONOMIC BALANCE AND ITS ROLE IN THE COORDINATION OF TRANSPORT PLANNING DURING THE DIGITALIZATION ERA

    Get PDF
    Econometrics tools in framework of Transport and Economic Balance (TEB) for transport planning and forecasting are aimed at improving transport links and transport connectivity via accounting the ratio between the volume of production and consumption of goods and the demand for transport services for their import and export. The TEB’s econometrics model includes the basic balance equations that define its structure and formation rules. The transport and economic balance of the Russian Federation aggregate the actual and forecast freight flows and their correspondence between the regions of the country (OD-matrix) by rail, road, inland water and maritime transport by type of commodities. The balance of actual freight traffic built for 2007-2016 based on statistics for industrial production, domestic and external trade, construction, agriculture and energy, as well as statistics for rail, maritime, inland water and road transport. The forecast of the cargo base and freight traffic is built for the period up to 2030 using the scenarios and forecast estimations by the Ministry of Economic Development of Russia, as well as the indices of regional economic development, considering the technological and transport connectivity of main cargo generating industries. The TEB will make it possible to calculate and substantiate the predicted impacts on the infrastructure considering various options for its reconstruction and development, changing routes, optimally distribute the forecasted flows over the network, considering the predicted characteristics of throughput, speeds and predictability of delivery time, workload of transport network and elimination of bottlenecks

    A secure mutual authentication procedure, generate the key fiscal basis, and fiscal data protection

    Full text link
    The paper describes cryptographic transformation for mutual authentication and creation of the fiscal sign key. This transformation based on using block encryption cipher named «Kuznetchik», described in the national standard of the Russian Federation GOST R 34.12-2015 and realized in gamma generation mode as it is described in the another national standard of the Russian Federation GOST R 34.13-2015. The function of the integrity protection (authentication code) is defined by the recommendation for standardization R 50.1.113–2016. The solution proposed in this paper is aimed for an authentication and integrity control of fiscal data transmitted through communication channels between fiscal storage devices and fiscal data operators, as well as between the fiscal data operators and the authorized agency. Formats of transmitted fiscal data, methods of transmission and mechanisms to ensure the confidentiality of transmitted fiscal data determined by the authorized agency of the Federal Executive power. The article gives a short description of the protocol model, a formal analysis of passive attacks in the assumption that the cryptographic properties of the protocol depends on the feature of cryptographic transformations used, which are standardized solutions regulated by national standards, or national recommendations for standardization. Since the cryptographic transformations could not be compromised by the intruder we can conclude that the intruder also can not compromise the fiscal signs protection protocol

    Authentication and common key generation cryptographic protocol for vehicle tachographs

    Full text link
    We present a public key generation protocol. The key is used for subscriber authentication in tachographs installed on vehicles in order to provide traffic safety. The protocol is based on the well-known Russian cryptographic algorithms. It ensures integrity and authenticity of data transmitted through communication channel between the on-board devices and vehicle tachograph cards. The protocol was developed in accordance with the Rosstandart recommendations and complies with the development and modernization principles for data protection encryption (cryptographic) means. The protocol was suggested as a national standard draft and is open for public discussion in accordance with the established procedure. The main results of our study is the formulation of certain security tasks identical to those used by potential infringers to compromise the protocol. This allows one to account for structural features that will ensure further protocol compliance to the target security characteristics, as well as to guarantee subsequent justification of feature set sufficiency

    A NEW OS ARCHITECTURE FOR IOT

    Full text link
    Current computer operating systems architectures are not well suited for the coming world of connected objects, known as the Internet of Things (IoT) for multiple reasons: poor communication performances in both point-to-point and broadcast cases, poor operational reliability and network security, excessive requirements both in terms of processor power and memory size leading to excessive electrical power consumption. We introduce a new computer operating system architecture well adapted to IoT, from the most modest to the most complex, and more generally able to significantly raise the input/output capacities of any communicating computer. This architecture rests on the principles of the Von Neumann hardware model, and is composed of two types of asymmetric distributed containers, which communicate by message passing. We describe the sub-systems of both of these types of containers, where each sub-system has its own scheduler, and a dedicated execution level
    corecore