DepCoS-RELCOMEX 2015: Theory and Engineering of Complex Systems and Dependability pp 185-194 | Cite as
Increased Safety of Data Transmission for "Smart" Applications in the Intelligent Transport Systems
Abstract
The problem of measuring vehicle’s weight-in-motion (WIM) is one of the most important research topics in the field of transport telematics. It is important not only for development of intelligent systems used for planning and cargo fleet managing, but also for control of the legal use of transport infrastructure, for road surface protection from early destruction and for safety support on roads. Data protection plays one of the crucial role in such kind of systems as data transmitted over internet network can be not only intercepted and disclosed, but also rigged and be used as a tool for attack on your equipment or system. Traditional data protection methods are increasingly becoming an easier barrier for implementing a successful hacker attack, but time for breaking existing encryption algorithms, which recently have had a high cryptographic strength, is gradually decreasing thus opening the door for developers to create new or upgrading existing encryption algorithms, whose characteristics will be able to withstand modern hacker’s threats.
Keywords
WIM fibre-optic pressure sensors involutory matrix matrix ecryptionPreview
Unable to display preview. Download preview PDF.
References
- 1.SENSORLINE GmbH (© Sensor Line) (2010), SPT Short Feeder Spliceless Fiber Optic Traffic Sensor: product description, http://sensorline.de/home/pages/downloads.php
- 2.Teral, S.: Fiber optic weigh-in-motion: looking back and ahead. Optical Engineering 3326, 129–137 (1998)Google Scholar
- 3.Grakovski, A., Pilipovecs, A., Kabashkin, I., Petersons, E.: Tyre Footprint Geometric Form Reconstruction by Fibre-Optic Sensor’s Data in the Vehicle Weight-in-Motion Estimation Problem. In: Ferrier, J.-L., Gusikhin, O., Madani, K., Sasiadek, J. (eds.) Informatics in Control, Automation and Robotics. LNEE, vol. 325, pp. 123–137. Springer, Switzerland (2015)CrossRefGoogle Scholar
- 4.Grakovski, A., Pilipovecs, A., Kabashkin, I., Petersons, E.: Weight-in-motion estimation based on reconstruction of tyre footprint’s geometry by group of fibre optic sensors. Transport and Telecommunication 15(2), 97–110 (2014)Google Scholar
- 5.O’Brien, E.J., Jacob, B.: European Specification on Vehicle Weigh-in-Motion of Road Vehicles. In: Proceedings of the 2nd European Conference on Weigh-in-Motion of Road Vehicles, pp. 171–183. Office for Official Publications of the European Communities, Luxembourg (1998)Google Scholar
- 6.Ghena, B., Beyer, W., Hillaker, A., Pevarnek, J., Halderman, A.: Green Lights Forever: Analyzing the Security of Traffic Infrastructure. In: Proceedings of the 8th USENIX Workshop on Offensive Technologies (2014)Google Scholar
- 7.Wiener, J.: Efficient DES Key Search and Update. RSA Laboratories Cryptobytes 3(2), 6–8 (1996)Google Scholar
- 8.Gilbert, H., Minier, M.: A Collision Attack on 7 Rounds of Rijandel. In: AES Candidate Conference, pp. 213–230 (2000)Google Scholar
- 9.Zhang, W., Wu, W., Feng, D.: New results on impossible differential cryptanalysis of reduced AES. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 239–250. Springer, Heidelberg (2007)CrossRefGoogle Scholar
- 10.Dunkelman, O., Keller, N., Shamir, A.: Improved single-key attacks on 8-round AES-192 and AES-256. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 158–176. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 11.Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1–18. Springer, Heidelberg (2009)CrossRefGoogle Scholar
- 12.Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique cryptanalysis of the full AES. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 344–371. Springer, Heidelberg (2011)CrossRefGoogle Scholar
- 13.Kang, J., Jeong, K., Sung, J., Hong, S., Lee, K.: Collision Attacks on AES-192/256, Crypton – 192/256, mCrypton-96/128, and Anubis. Journal of Applied Mathematics 2013, 1–10 (2013), doi:10.1155/2013/713673Google Scholar
- 14.Li, L., Jia, K., Wang, X.: Improved Single-Key Attacks on 9-Round AES-192/256. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 127–146. Springer, Heidelberg (2015)CrossRefGoogle Scholar
- 15.Eisenberg, M.: Hill Ciphers and Modular Linear Algebra. Mimeographed notes, University of Massachusetts (1998)Google Scholar
- 16.Kamenchenko, S.: GPS/GLONASS tracking data security algorithm with increased cryptographic stability. In: Proceedings of the 14th International Conference “Reliability and Statistics in Transportation and Communication” (RelStat 2014), Riga, Latvia, pp. 154–164 (2014)Google Scholar