01.09.2013 Views

Intelligent Transport Systems - Telenor

Intelligent Transport Systems - Telenor

Intelligent Transport Systems - Telenor

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Security is implemented differently at different<br />

ports: on some of them security may be absent<br />

altogether. One popular pastime for hackers is<br />

to scan the ports in different local networks or<br />

equipment in order to detect weak security that<br />

can be penetrated.<br />

A new security threat is concerned with the use<br />

of PDAs and beaming where information, e.g.<br />

files, is passed between computers using the<br />

Bluetooth technology and infrared communication.<br />

PDAs and beaming are effective means for<br />

circumventing firewalls, access control and other<br />

protection systems: you can use your PDA to<br />

pick up information from someone in the street<br />

and load it onto your computer when you reach<br />

your office. The data file may have been loaded<br />

onto your PDA without you knowing it. These<br />

technologies are so new that effective protective<br />

systems against misuse have not been developed.<br />

Another development that influences the reliability<br />

of society is that telecommunications is<br />

used increasingly as a production factor in other<br />

products. Some examples are:<br />

• transaction services for banks and other financial<br />

institutions where telecommunications is<br />

used for managing transactions and transferring<br />

money;<br />

• e-commerce where telecommunication is used<br />

for browsing, ordering, payment, and sometimes<br />

delivery of goods;<br />

• intelligent buildings where telecommunications<br />

supports operations for remote sensing of room<br />

temperature and break-in, control of ovens and<br />

heaters, and payment of energy usage;<br />

• intelligent traffic systems where telecommunications<br />

is used for payment of road usage,<br />

parking and public transport.<br />

All these applications are either in common use<br />

or will be so soon. The common denominator for<br />

these services is transfer of money. These services<br />

are therefore open for attack in order to<br />

learn account numbers and security codes, use<br />

fake accounts or divert payment transactions.<br />

Examples posing other problems are:<br />

• intelligent traffic systems used for road traffic<br />

management where an outage may lead to<br />

traffic congestion;<br />

• intelligent buildings where interruption of<br />

telecommunications services may affect heat-<br />

Telektronikk 1.2003<br />

ing control and security of homes and factory<br />

premises;<br />

• alarm services where disruption of service<br />

may cause important warnings not to be disseminated<br />

and burglar alarm systems to be<br />

disabled 1) ;<br />

• logistics using telecommunications for coordination<br />

of operations and fleet management<br />

where failures may cause inefficiency and loss<br />

of business;<br />

• booking systems where malfunction of the<br />

telecommunications systems may cause irregularities<br />

of air transport;<br />

• telemedicine where interruption of services<br />

may reduce the capabilities of hospitals and,<br />

in the worst case, interrupt remote medical<br />

treatment causing danger of life;<br />

• cooperative work in and between companies<br />

where failure of telecommunications services<br />

may cause economic losses;<br />

• business-to-business e-commerce where the<br />

network is used for managing purchase and<br />

delivery of raw material, semi-products and<br />

parts, managing logistics and product delivery,<br />

and managing cooperation between companies<br />

sharing the production of the same goods<br />

and services. This is estimated to become a<br />

business in the multi-trillion dollar class [1].<br />

These are just some examples. The point is that<br />

the infrastructures knitting together the increasingly<br />

more complex public and private enterprises<br />

require telecommunications and computers.<br />

The performance of the infrastructure relies<br />

then on third parties: manufacturers of telecommunications<br />

equipment, computer manufacturers,<br />

software manufacturers and telecommunications<br />

service providers. Also in the case where<br />

an enterprise operates its own private network,<br />

the transport links interconnecting geographically<br />

separate parts of the network are usually<br />

leased from a telecommunications operator. The<br />

reliability of the infrastructure of the company<br />

then depends on the reliability of service offered<br />

by telecommunications operators and the<br />

dependability of equipment and software<br />

installed in the local area network.<br />

The general evolution of sensor technology will<br />

increase this vulnerability for several other reasons:<br />

1) Burglar alarm systems test that the alarm gauge is operational at regular intervals (order of minute) in order to detect tampering with the device and<br />

the connection. However, a failure of the telecommunication system may disrupt so many individual alarms that the security firm is overloaded.<br />

127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!