Transportation infrastructure security utilizing intelligent transportation systems

Transportation infrastructure security utilizing intelligent transportation systems

Fries, Ryan

130,60 €(IVA inc.)

When integrated into the transportation system infrastructure, and in vehicles themselves, Intelligent Transportation Systems, or ITS, help monitor and manage traffic flow, reduce congestion, provide alternate routes to travelers, enhance productivity, and save lives, time, and money. Here is the first comprehensive treatment of techniques to leverage ITS in support of security and safety for surface transportation infrastructure. Case studies of current ITS approaches to security issues such as freight security, disaster and evacuation response, HAZMAT incidents, rail security, and ITS Wide Area Alerts show the reader how to design, model, and implement a variety of projects. INDICE: Preface. Chapter 1: Introduction. 1.1 The Concept of Security. 1.2Transportation and Security. 1.3 Security in the ITS Context. 1.4 Scope and Audience of the Book. 1.5 Content and Organization the Book. 1.6 References:. 1.7 Questions:. Chapter 2: The Need for Surface Transportation Infrastructure Security. 2.1 Vulnerabilities. 2.2 Common characteristics of surface transportation systems. 2.3 Common threats to surface transportation systems. 2.3.1 Earthquakes. 2.3.2 Fires. 2.3.3 Terrorist Attacks. 2.3.4 HAZMAT. 2.3.5 Blackouts. 2.3.6 Hurricanes. 2.3.7 Floods. 2.3.8 Biological and Chemical Attacks. 2.3.9 Derailment. 2.3.10 Cyber Attacks. 2.4 Defending against threats both external and internal. 2.5 Why Transportation Infrastructure Security is Important. 2.6 Focus Areas. 2.7 Summary. 2.8 References. 2.9 Review Questions. Chapter 3: Leveraging ITS to Reduce Risk and Exposure Using ITS Security Areas. 3.1 Introduction. 3.2 Disaster Response and Evacuation. 3.3 Freight and Commercial VehicleSecurity. 3.4 HAZMAT Security. 3.5 ITS Wide Area Alert. 3.6 Rail Security. 3.7 Transit Security. 3.8 Transportation Infrastructure Security. 3.9 Traveler Security. 3.10 Conclusions. 3.11 References. 3.12 Questions:. Chapter 4: Risk Assessment Framework. 4.1 Risk Assessment Framework. 4.1.1 Critical Assets. 4.1.2 Risks Assessment Methods. 4.1.2.1 Blue Ribbon Panel Method. 4.1.2.2 Fault-Tree Analysis. 4.1.2.3 Simulation Analysis. 4.1.2.3 Monte Carlo Analysis. 4.1.2.4 Weibull Hazard Models. 4.1.3 Mitigation and Countermeasures. 4.1.4 Selection of Options. 4.2 Opportunities and Challenges. 4.3 Application of the Framework. 4.4 References:. 4.5 Review Questions:. Chapter 5: Application of Risk Assessment and Management Tools. 5.1 Application of Risk Assessment Methods. 5.1.1 Blue Ribbon Panel Method. 5.1.2 Fault-Tree Analysis. 5.1.2.1 Quantitative Evaluation of Fault-tree. 5.1.2.2 Minimal Cut Sets. 5.1.3 Weibull Hazards Model Example. 5.2 Application of Evacuation Models and Traffic Models for Response Planning. 5.3 Application of Other Methods. 5.4 Reference:. 5.5 Review Questions:. Chapter 6: Fundamentals of Computer Network Security for ITS. Introduction. Elements of Computer Network Security. Importance of Computer Network Security. Approach to Computer Network Security. 6.1.1 Policy. 6.1.2 Current State.6.1.3 Security Requirements. 6.1.4 Recommended Controls. 6.1.5 Accountability. 6.1.6 Timetable. 6.1.7 Continuing Attention. Computer Network Security in ITS. Network Security Objectives. 6.1.8 Confidentiality. 6.1.9 Authentication. 6.1.10 Message Integrity and Nonrepudiation. 6.1.11 Availability. 6.1.12 AccessControl. Future of Network Security and Its Impacts on Securing ITS Network. References. 6.2 Review Questions. Chapter 7: Securing ITS. 7.1 Introduction. 7.2 Security Objectives. 7.2.1 Confidentiality. 7.2.2 Integrity. 7.2.3 Availability. 7.3 Security Threats. 7.3.1 Deception. 7.3.2 Disruption. 7.3.3 Usurpation. 7.3.4 (Unauthorized) Disclosure. 7.4 Security Services. 7.4.1 Information Security. 7.4.2 ITS Personnel Security. 7.4.3 Operational Security. 7.4.4 Security Management. 7.5 Securing ITS Subsystems. 7.6 Securing Communications Between Subsystems. 7.7 Security and ITS Standards. 7.7.1 National Transportation Communications for ITS Protocol (NTCIP). 7.7.1.1 NTCIP Center-to-Center. 7.7.1.1.1 WSDL/SOAP/XML. 7.7.1.1.2 DATEX-ASN. 7.7.1.1.3 Summary. 7.7.1.2 NTCIP Center-to-Field. 7.7.1.2.1 SNMP and SFMP Security. 7.7.1.2.2 STMP Security. 7.7.2 Traffic Management Data Dictionary (TMDD) and Message Sets. 7.7.3 Commercial Vehicle Information Systems and Networks (CVISN). 7.7.4 Archived Data. 7.7.5 Dedicated Short Range Communications (DSRC). 7.7.6 Incident Management (IM). 7.7.7 Transit Communications Interface Profiles (TCIP). 7.7.7.1 Security and Incident Management Process. 7.7.7.2 Manage Incidents and Security Business Process. 7.7.7.3 Fare Collection and Revenue Management Security. 7.7.8 Advanced Traveler Information Systems (ATIS). 7.8 Conclusions. 7.9 References. 7.10 Questions. Chapter 8: ITS Security Areas and Multimodal Transportation Security. 8.1 Protecting People. 8.1.1 Airports. 8.1.1.1 Demand Management and Evacuation. 8.1.1.2 Information Dissemination. 8.1.1.3 Passenger Screening Procedures. 8.1.1.3.1 X-ray. 8.1.1.3.2 Canine Inspection. 8.1.2 Public Transit. 8.1.2.1 Chemical Sensors Systems. 8.1.2.2 Radiation Detection Systems. 8.1.2.3 Biological Agent Sensors. 8.1.2.4 Disaster Recovery. 8.1.2.5 Design for Security. 8.1.3 Perception of Security. 8.2 Protecting Vehicles and Infrastructure. 8.2.1 Airports. 8.2.1.1 Private vehicle parking. 8.2.1.2 Shuttles and Ground Fleet Vehicles. 8.2.1.3 Future Resources. 8.2.2 Public Transit. 8.2.2.1 Personnel Authentication. 8.2.2.2 Access Management. 8.2.2.3 Surveillance Systems. 8.2.2.4 Personnel Training. 8.2.3 Rail Vehicles and Infrastructure. 8.2.3.1 Highway Rail Intersections. 8.2.3.2 Monitoring track infrastructure. 8.2.3.3 Tradeoff between Safety and Security. 8.2.4 Ships and Ports. 8.3 Protecting Freight. 8.3.1 Containers. 8.3.1.1 Visual Inspections. 8.3.1.2 Gamma Ray. 8.3.1.3 Pulsed Fast Neutron Analysis and Thermal Neutron Activation. 8.3.1.4 Future Directions in Detection Systems. 8.3.2 HAZMAT. 8.3.3 Liquids. 8.3.4 Military Freight. 8.4 The future. 8.5 References. 8.6 Review Questions. Chapter 9: Process for Developing A Regional Transportation Security Plan. 9.1 Introduction. 9.2 Developing a Regional Transportation Security Architecture. 9.2.1 Security in a Regional ITS Architecture Development Process. 9.2.1.1 Identify Security Objectives. 9.2.1.2 Identify Threats. 9.2.1.3 Identify Critical Assets. 9.2.1.4 Define Roles andResponsibilities. 9.2.1.5 Define Security Requirements. 9.2.1.6 Identify Security Boundaries. 9.2.1.7 Isolate Critical Assets. 9.2.1.8 Identify Sensitive Information. 9.2.1.9 Threat Analysis. 9.2.1.10 Identify Security Services. 9.2.1.11 Select Security Standards. 9.2.1.12 Risk Analysis. 9.2.1.13 Define Security Mechanisms. 9.2.1.14 Implement Security Mechanisms. 9.2.1.15 Monitor and Revise. 9.2.2 Developing a Regional Transportation Security Architecture. 9.2.2.1 Identify Security Risks. 9.2.2.2 Select Security Services to Mitigate Risks.9.2.2.3 Develop a Concept of Operations. 9.2.2.4 Develop Implementation Plan.9.2.2.5 Evaluation. 9.3 Developing a Project Security Plan. 9.4 Conclusion. 9.5 References. 9.6 Questions. Chapter 10: Issues and Opportunities for Transportation Infrastructure Security. 10.1 ITS Security versus Privacy. 10.2 Publicand Private Roles. 10.3 Stakeholder Cooperation and Coordination Requirements. 10.3.1 Information sharing. 10.3.2 Resource Sharing Agreements. 10.4 FundingSources and Constraints. 10.5 Human Resources. 10.6 Future Directions and Opportunities. 10.7 References:. 10.8 Review Questions. Appendix A: National ITS Architecture Subsystem Security Descriptions. Appendix B: Securing Architecture Flows. Appendix C: USDOT FHWA Final Rule. Appendix D: USDOT FTA Policy on Transit Projects. Appendix E: Weibull Distribution Support. Index.

  • ISBN: 978-0-470-28629-6
  • Editorial: John Wiley & Sons
  • Encuadernacion: Cartoné
  • Páginas: 304
  • Fecha Publicación: 19/11/2008
  • Nº Volúmenes: 1
  • Idioma: Inglés