Intelligent Transport Systems - Telenor
Intelligent Transport Systems - Telenor
Intelligent Transport Systems - Telenor
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Security is implemented differently at different<br />
ports: on some of them security may be absent<br />
altogether. One popular pastime for hackers is<br />
to scan the ports in different local networks or<br />
equipment in order to detect weak security that<br />
can be penetrated.<br />
A new security threat is concerned with the use<br />
of PDAs and beaming where information, e.g.<br />
files, is passed between computers using the<br />
Bluetooth technology and infrared communication.<br />
PDAs and beaming are effective means for<br />
circumventing firewalls, access control and other<br />
protection systems: you can use your PDA to<br />
pick up information from someone in the street<br />
and load it onto your computer when you reach<br />
your office. The data file may have been loaded<br />
onto your PDA without you knowing it. These<br />
technologies are so new that effective protective<br />
systems against misuse have not been developed.<br />
Another development that influences the reliability<br />
of society is that telecommunications is<br />
used increasingly as a production factor in other<br />
products. Some examples are:<br />
• transaction services for banks and other financial<br />
institutions where telecommunications is<br />
used for managing transactions and transferring<br />
money;<br />
• e-commerce where telecommunication is used<br />
for browsing, ordering, payment, and sometimes<br />
delivery of goods;<br />
• intelligent buildings where telecommunications<br />
supports operations for remote sensing of room<br />
temperature and break-in, control of ovens and<br />
heaters, and payment of energy usage;<br />
• intelligent traffic systems where telecommunications<br />
is used for payment of road usage,<br />
parking and public transport.<br />
All these applications are either in common use<br />
or will be so soon. The common denominator for<br />
these services is transfer of money. These services<br />
are therefore open for attack in order to<br />
learn account numbers and security codes, use<br />
fake accounts or divert payment transactions.<br />
Examples posing other problems are:<br />
• intelligent traffic systems used for road traffic<br />
management where an outage may lead to<br />
traffic congestion;<br />
• intelligent buildings where interruption of<br />
telecommunications services may affect heat-<br />
Telektronikk 1.2003<br />
ing control and security of homes and factory<br />
premises;<br />
• alarm services where disruption of service<br />
may cause important warnings not to be disseminated<br />
and burglar alarm systems to be<br />
disabled 1) ;<br />
• logistics using telecommunications for coordination<br />
of operations and fleet management<br />
where failures may cause inefficiency and loss<br />
of business;<br />
• booking systems where malfunction of the<br />
telecommunications systems may cause irregularities<br />
of air transport;<br />
• telemedicine where interruption of services<br />
may reduce the capabilities of hospitals and,<br />
in the worst case, interrupt remote medical<br />
treatment causing danger of life;<br />
• cooperative work in and between companies<br />
where failure of telecommunications services<br />
may cause economic losses;<br />
• business-to-business e-commerce where the<br />
network is used for managing purchase and<br />
delivery of raw material, semi-products and<br />
parts, managing logistics and product delivery,<br />
and managing cooperation between companies<br />
sharing the production of the same goods<br />
and services. This is estimated to become a<br />
business in the multi-trillion dollar class [1].<br />
These are just some examples. The point is that<br />
the infrastructures knitting together the increasingly<br />
more complex public and private enterprises<br />
require telecommunications and computers.<br />
The performance of the infrastructure relies<br />
then on third parties: manufacturers of telecommunications<br />
equipment, computer manufacturers,<br />
software manufacturers and telecommunications<br />
service providers. Also in the case where<br />
an enterprise operates its own private network,<br />
the transport links interconnecting geographically<br />
separate parts of the network are usually<br />
leased from a telecommunications operator. The<br />
reliability of the infrastructure of the company<br />
then depends on the reliability of service offered<br />
by telecommunications operators and the<br />
dependability of equipment and software<br />
installed in the local area network.<br />
The general evolution of sensor technology will<br />
increase this vulnerability for several other reasons:<br />
1) Burglar alarm systems test that the alarm gauge is operational at regular intervals (order of minute) in order to detect tampering with the device and<br />
the connection. However, a failure of the telecommunication system may disrupt so many individual alarms that the security firm is overloaded.<br />
127