Safety Pilot Security System
|
|
|
- Iris Casey
- 10 years ago
- Views:
Transcription
1 Safety Pilot Security System Crash Avoidance II: Connected Vehicles (Session Code: G201) W L Fehr 1
2 Safety Pilot/Model Deployment Safety Pilot/Model Deployment is a U.S. DOT research program conducted by the RITA and NHTSA with CAMP to develop technology that will help cars, trucks, buses, and other vehicles avoid crashes. The Program has two parts: Six Safety Pilot Driver Acceptance Clinics to help the Department learn more about how drivers respond to crash-avoidance applications that use connected vehicle communication. The clinics have been held in locations around the country. The Safety Pilot Model Deployment that includes the installation of wireless devices in up to 3,000 vehicles in one location to evaluate the effectiveness of connected vehicle technology to prevent crashes. The deployment will take place of Ann Arbor, MI from August, 2012 to August, 2013 and will operate in an everyday environment. Both the Driver Acceptance Clinics and the Model Deployment results will contribute to the NHTSA 2013 Agency Decision. 2
3 Complete Security Plan To be complete, the Safety Pilot/Model Deployment security plan must include all devices, communications, and policies determined by all of the organizations that make up the installation. Devices: in-vehicle equipment, roadside equipment, Internet-based equipment, support equipment. Communications: 5.9GHz DSRC communication among vehicles, between vehicles and roadside, IP communication between vehicles, roadside, and the Internet. Policies: USDOT, CAMP. The plan will be embodied in device requirement specifications, experiment operational specifications. 3
4 System Design Principles The parts of the system are controlled by a federation of equals Private industry; government at all levels. An appropriate level of trust is essential: All communications will be signed using a common cryptographic process. Rights of ownership (privacy) are protected. The receiving party of a communication will be responsible for determining the authenticity of any message. An entity trusted by all will establish the root secret that all cryptographic security credentials will be based on. Security solution fits the communication needs Small data exchanges; rapid exchanges; short, intermittent connections. Devices share situation information (BSM s, SPaT, etc.) in broadcasts with no expectation of a response. Any response to broadcast information, or point-to-point interactions that cause a result to occur in a device (such as a driver alert or file update) will be initiated by the most vulnerable party to the interaction: Onboard equipment will initiate interactions with roadside equipment. Roadside equipment will initiate interactions with Internetbased equipment. (NO push from the Internet) 4
5 Connected Vehicle Environment 5
6 Devices Security processes either cryptographic or physical will be applied to all device interfaces used for operational and maintenance purposes. Mobile (Onboard) Integrated Vehicle Devices Aftermarket Safety Devices Vehicle Awareness Devices Heavy (Truck, Transit) Devices Field (Roadside) Roadside Equipment Center (Internet) Security Credential Management System Log File Management System 6
7 Safety Pilot/Model Deployment Environment 5.9GHz DSRC Roadside Equipment Cellular Security management policies Root secret Log file management policies Traffic Signal Controllers Provisioning and maintenance tools Data Acquisition Systems Integrated Vehicle Equipment Vehicle Awareness Devices ASD devices Heavy Vehicle Devices Security Credential Management System Log file management Roadside Equipment monitoring 7
8 Communications Operational Communication WSMP over 5.9GHz DSRC for V-V between mobile devices. WSMP over 5.9GHz DSRC for V-I between mobile devices and roadside devices. IP over 5.9GHz DSRC for point-to-point between mobile devices and roadside devices. IP over Internet for point-to-point between roadside devices and Internet-based devices. Provisioning and Maintenance Communication IP over Serial medium (Ethernet, USB) between all devices and temporarily-attached tools. File content in removable medium (SD, USB) in certain mobile devices. NO mobile device or field device provisioning from Internet-based devices 8
9 Safety Pilot/Model Deployment Communications IP data Provisioning and maintenance tool data Policies Traffic Signal Controllers interface data 5.9GHz DSRC SPaT, MAP TIM IP data 5.9GHz DSRC BSM System provisioning and maintenance tool data HIA batch provisioning tool data Intrasystem communication 9
10 Security Plan Roadmap v5 CY 2011 CY 2012 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Design Completed (SW 1 & 2) Build Prototype V-V System CAMP System Test Integration w/ Scalability TB CAMP Prototype Completed Oak Ridge Nat'l Lab Agreement Executed SOW for SCMS IV&V of Security Plan, Devices, Installation Assessment of Complete Plan USDOT Security Profiles Completed Security Credential Processes Defined Security Plan Device Specifications Test Bed Contractor SCMS Site Investigation Completed Develop and Hosting of Security Credential Management System Test Conductor Security Credential Batch Tool Site Security Plan Pre-Model Deployment SCMS Integration Test Model Deployment Final SCMS Deployed 10
Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.
Connected Vehicles: New Directions and Opportunities AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA N A T I O N A L S E C U R I T Y E N G I N E E R I N G H E A L T H S O L U T I O N S
USDOT Connected Vehicle Overview
USDOT Connected Vehicle Overview RWM Stakeholder Meeting August 8, 2012 Dale Thompson, Intelligent Transportation Systems Joint Program Office, RITA, U.S. DOT 1 Overview NHTSA Decision Safety Pilot Policy-Architecture
Connected Vehicle Security
Connected Vehicle Security ITS Advisory Committee May 24, 2012 Valerie Briggs ITS Joint Program Office, RITA, USDOT Need for Security Trust Message Validity Defense Against Attacks 2 Goals for Security
The relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
22 nd ITS World Congress Towards Intelligent Mobility Better Use of Space. GPS 2: Big Data The Real Value of Your Social Media Accounts
22 nd ITS World Congress Towards Intelligent Mobility Better Use of Space GPS 2: Big Data The Real Value of Your Social Media Accounts October 7, 2015 Kenneth Leonard Director, Intelligent Transportation
Space-Based Position Navigation and Timing National Advisory Board
Space-Based Position Navigation and Timing National Advisory Board Intelligent Transportation System (ITS) Evolution GPS/GNSS Role in Emerging Vehicle Fleets and Highway Infrastructure Brian P. Cronin,
Securing Wireless Access for Vehicular Environments (WAVE)
Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the
INTELLIGENT TRANSPORTATION SYSTEMS. Vehicle-to- Infrastructure Technologies Expected to Offer Benefits, but Deployment Challenges Exist
United States Government Accountability Office Report to Congressional Requesters September 2015 INTELLIGENT TRANSPORTATION SYSTEMS Vehicle-to- Infrastructure Technologies Expected to Offer Benefits, but
The Vision of Vehicle Infrastructure Integration (VII)
The Vision of Vehicle Infrastructure Integration (VII) Ralph L. Robinson ITS Integration Office September, 2007 Cooperative Highways SAFETY MOBILITY Collision Avoidance Signal Control Emergency Alerts
Development of V2I Safety Applications
Development of V2I Safety Applications Carl Andersen Federal Highway Administration, USDOT SIS13: C-ITS for Traffic Accident Avoidance Application Development The CAMP V2I Consortium is developing three
Kapsch V2X. Cooperative Systems.
Kapsch TrafficCom EN Kapsch V2X. Cooperative Systems. Fluidtime always one step ahead V2X Cooperative Systems. What is it all about? Car coectivity is the keyword to enable a wide variety of information
INTELLIGENT TRANSPORTATION SYSTEMS. Vehicle-to-Vehicle Technologies Expected to Offer Safety Benefits, but a Variety of Deployment Challenges Exist
United States Government Accountability Office Report to Congressional Requesters November 2013 INTELLIGENT TRANSPORTATION SYSTEMS Vehicle-to-Vehicle Technologies Expected to Offer Safety Benefits, but
Policy Development for Big Data at the ITS JPO
Policy Development for Big Data at the ITS JPO June 17, 2015 Dale Thompson Office of the Secretary of Transportation Research and Technology Intelligent Transportation Systems Joint Program Office Agenda
Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture
IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton
Car Connections. Johan Lukkien. System Architecture and Networking
Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:
The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014
The Future of the Automobile Vehicle Safety Communications Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 About your lecturer Luca Delgrossi, Ph. D. Born in Italy, I live in the US since
GATEWAY CITIES TECHNOLOGY PROGRAM FOR GOODS MOVEMENT OVERVIEW OF EMERGING CONNECTED COMMERCIAL VEHICLES PROGRAM
GATEWAY CITIES TECHNOLOGY PROGRAM FOR GOODS MOVEMENT OVERVIEW OF EMERGING CONNECTED COMMERCIAL VEHICLES PROGRAM Presented May 8, 2014 GATEWAY CITIES LOGISTICS CORRIDOR Anchored by Ports of Long Beach and
Connected Vehicles as things on the Internet. big data, the cloud, and advanced automotive research
Connected Vehicles as things on the Internet big data, the cloud, and advanced automotive research Clark Gaylord Chief Information Officer Virginia Tech Transportation Institute [email protected] Bingo card
Evolution of Connected Vehicle Ecosystem
SAE Symposium: Intelligent Vehicle Systems Advancing the Connected Mobility Experience November 8-9, 2011 Troy Marriott, Troy MI Evolution of Connected Vehicle Ecosystem Partha Goswami Technology Manager
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
Vehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
Acquisition of Novero. Investor presentation 18th December 2015
Acquisition of Novero Investor presentation 18th December 2015 What Novero brings to Laird The acquisition of Novero and LSR rebalances our business, Wireless Systems will now be of a similar scale to
Improving Driving Safety Through Automation
Improving Driving Safety Through Automation Congressional Robotics Caucus John Maddox National Highway Traffic Safety Administration July 25, 2012 NHTSA s Missions Safety Save lives, prevent injuries and
Innovative antenna designs
Innovative antenna designs Responsive manufacturing Trusted partner Keeping Your World Connected Mobile Mark is a leading supplier of innovative, high performance antennas to wireless companies across
Electronic Registration Identification (ERI)
Electronic Registration Identification (ERI) Concept, architecture and current status Murcia, 18th June 2009 Overview The ERI standard User requirements Architecture Current status 2 Electronic Registration
Traffic Management Centers
Traffic Management Centers IN A CONNECTED VEHICLE ENVIRONMENT Task 2. Investigation of Expected Changes in TMCs Final Report Prepared for: CTS Pooled Fund Study, University of Virginia Prepared By: November
Cybersecurity And The Automotive Industry
Cybersecurity And The Automotive Industry Dr Andrew Brown, Jr PE, FESD, FSAE, NAE Vice President & Chief Technologist Delphi 2014 Global Symposium on Connected Vehicles & Infrastructure April 21-23, 2014
IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement
IIS Smart Roadside Takes the Lead in Roadside Safety and Enforcement Smart Roadside is the leading law enforcement platform in commercial vehicle safety. Our success is defined by delivering real world
Ahead of the Curve with Intelligent. Transportation
Ahead of the Curve with Intelligent Transportation Advanced technologies to ensure the safe, efficient, and secure movement of passengers and freight. Intelligent transportation is changing the way America
VEHICLE SAFETY COMMUNICATIONS IN THE UNITED STATES
VEHICLE SAFETY COMMUNICATIONS IN THE UNITED STATES Michael Shulman Ford Motor Company United States Richard Deering General Motors Corporation United States Paper Number 07-0010 ABSTRACT In the United
VEHICLE INFRASTRUCTURE INTEGRATION (VII) U.S. DOT DAY-1 APPLICATION DEVELOPMENT PLANS
VEHICLE INFRASTRUCTURE INTEGRATION (VII) U.S. DOT DAY-1 APPLICATION DEVELOPMENT PLANS McLean, VA November 2006 VERSION 1.2 Revision History REVISION HISTORY Date Version Description July 2006 1.0 Initial
David Tuttle Research Fellow The University of Texas at Austin
David Tuttle Research Fellow The University of Texas at Austin The Home Energy Management Systems (HEMS), Home Area Network (HAN), and Plug-In Electric Vehicles (PEV) Security Risks Increase with Greater
International Working Group on Data Protection in Telecommunications
International Working Group on Data Protection in Telecommunications 675.42.10 4 April 2011 Working Paper Event Data Recorders (EDR) on Vehicles Privacy and data protection issues for governments and manufacturers
CONNECTED VEHICLE PILOT DEPLOYMENT PROGRAM PHASE 1
FEDERAL HIGHWAY ADMINISTRATION CONNECTED VEHICLE PILOT DEPLOYMENT PROGRAM PHASE 1 CV Pilots Joint Technical Kickoff Session 1: Site Concepts, Tampa September 30, 2015 FLORIDA! A Bold Vision JOE WAGGONER
Linking Planning and Operations Initiative A Data Driven Approach. Chris Francis Transportation Statistics
Linking Planning and Operations Initiative A Data Driven Approach Chris Francis Transportation Statistics Data Symposium - Traffic Data, Orlando, FL, Oct 23-24, 2014 Outline 2 Emerging Transportation Scene
Research Projects in the Mobile Computing and Networking (MCN) Lab
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing
Cooperative Intersection Collision Avoidance System Limited to Stop Sign and Traffic Signal Violations (CICAS-V) Phase I Final Report
Cooperative Intersection Collision Avoidance System Limited to Stop Sign and Traffic Signal Violations (CICAS-V) Phase I Final Report September 30, 2008 Crash Avoidance Metrics Partnership (CAMP) Produced
Request for Proposals
Request for Proposals Connected Responder: Public Safety and Emergency Response Community Connected Vehicle Interest, Context and Business Case Development RFP Schedule RFP Release Date: April 30, 2015
Maintain Fleet Management Solutions Using Wide Area Wireless Technology
Maintain Fleet Management Solutions Using Wide Area Wireless Technology Andreas Kohn Sierra Wireless, Inc. August, 2010 1 Introduction Wireless technology can provide a competitive advantage in today s
OIT User Conference Security Team November 2014
OIT User Conference Security Team November 2014 Welcome and Introductions What will we be covering today? Introductions Office of Information Security and Privacy (OISP) and the Transformation effort Staffing
DOT HS 811 492A September 2011. Vehicle Safety Communications Applications (VSC-A) Final Report
DOT HS 811 492A September 2011 Vehicle Safety Communications Applications (VSC-A) 1. Report No. DOT HS 811 492A Technical Report Documentation Page 2. Government Accession No. 3. Recipient's Catalog No.
September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS
September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS September 8th 10:30 AM 12:00 PM AM01: Sustainable Transportation Performance Measures: Best Practices September 8th 10:30 AM
Vehicle IOT Gateway Family Datasheet
Vehicle IOT Gateway Family Datasheet VG-Series Overview The Samsara Vehicle IoT Gateway is a powerful telematics platform that provides continuous, real-time location visibility, streamlining dispatch
Current and Future Trends in Hybrid Cellular and Sensor Networks
2010-10-19 Current and Future Trends in Hybrid Cellular and Sensor Networks Yongjun Liu, Bin Zhen, Yong Xu, Hui Yang, Betty Zhao [email protected] www.huawei.com ETSI TC M2M Workshop 19-20 October
USING DEDICATED SHORT RANGE COMMUNICATIONS FOR VEHICLE SAFETY APPLICATIONS THE NEXT GENERATION OF COLLISION AVOIDANCE
USING DEDICATED SHORT RANGE COMMUNICATIONS FOR VEHICLE SAFETY APPLICATIONS THE NEXT GENERATION OF COLLISION AVOIDANCE Arthur A. Carter National Highway Traffic Safety Administration United States of America
TomTom HAD story How TomTom enables Highly Automated Driving
TomTom HAD story How TomTom enables Highly Automated Driving Automotive World Webinar 12 March 2015 Jan-Maarten de Vries VP Product Marketing TomTom Automotive Automated driving is real and it is big Image:
INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-
ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between
Garmin dēzl Trucking Navigator Compatibility to. Automatic on-board Recording Device (AOBRD) Requirements, Part 395.15
Date: 5/10/2013 Rev. B Garmin dēzl Trucking Navigator Compatibility to Automatic on-board Recording Device (AOBRD) Requirements, Part 395.15 1 Introduction The Garmin dēzl trucking navigators, when integrated
Simplifying the remote acquisition, cloud management, and multiscreen distribution of professional live video over IP
Simplifying the remote acquisition, cloud management, and multiscreen distribution of professional live video over IP Dejero simplifies the remote acquisition, cloud management, and multiscreen distribution
Securing your Juniper SSL VPN with two-factor authentication.
Securing your Juniper SSL VPN with two-factor authentication. Protecting Your VPNs With Two-Factor Authentication Two-factor authentication provides a second layer of security to VPN credentials by requiring
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
CELL PHONE TRACKING. Index. Purpose. Description. Relevance for Large Scale Events. Options. Technologies. Impacts. Integration potential
CELL PHONE TRACKING Index Purpose Description Relevance for Large Scale Events Options Technologies Impacts Integration potential Implementation Best Cases and Examples 1 of 10 Purpose Cell phone tracking
Security risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
PUBLIC OPINION ABOUT SELF-DRIVING VEHICLES IN CHINA, INDIA, JAPAN,
UMTRI-2014-30 OCTOBER 2014 PUBLIC OPINION ABOUT SELF-DRIVING VEHICLES IN CHINA, INDIA, JAPAN, THE U.S., THE U.K., AND AUSTRALIA BRANDON SCHOETTLE MICHAEL SIVAK PUBLIC OPINION ABOUT SELF-DRIVING VEHICLES
Modern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
This document is intended to make you familiar with the ServersCheck Monitoring Appliance
ServersCheck Monitoring Appliance Quick Overview This document is intended to make you familiar with the ServersCheck Monitoring Appliance Although it is possible, we highly recommend not to install other
About Redtail Telematics
Company Overview About Redtail Telematics Redtail was established to explore the potential of GPS technology; turning location and accelerometer data into meaningful insight for consumers, fleet managers,
Technologies and Techniques for Collecting Floating Car Data. Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems
Technologies and Techniques for Collecting Floating Car Data Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems Presentation What is Floating Car Data? Why is FCD of interest for Network
Advanced Transportation Management Systems
Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements
Wireless Roadside Inspection Phase II Final Report
Wireless Roadside Inspection Phase II Final Report March 2014 FOREWORD The Federal Motor Carrier Safety Administration (FMCSA) Wireless Roadside Inspection (WRI) Program is demonstrating the feasibility
CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense
CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
www.vdoroadlog.com VDO RoadLog EOBR Electronic On Board Recorder The simple solution for daily log book and compliance reporting.
www.vdoroadlog.com VDO RoadLog EOBR Electronic On Board Recorder The simple solution for daily log book and compliance reporting. EOBR is happening now. Be ready with the simple, affordable, all-in-one
Deliverable 5: Conclusions and Recommendations for Deployment of Cooperative Systems by Road
COBRA Cooperative Benefits for Road Authorities ERA-NET ROAD Mobility: Getting the most out of Intelligent Infrastructure Cross-border funded Joint Research Programme Deliverable 5: Conclusions and Recommendations
Utilization of the 4.9 GHz Band in Transportation and Emergency Response Applications
Utilization of the 4.9 GHz Band in Transportation and Emergency Response Applications February 25, 2011 Bill Brown Radio and Wireless Manager, VDOT Chair, AASHTO Special Committee on Wireless Communications
Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture
Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture Md Ali Al Mamun, Khairul Anam, Md Fakhrul Alam Onik, A M Esfar- E- Alam Abstract- Vehicular Ad Hoc Network (VANET) has
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
The Wireless World - 5G and Beyond. Björn Ekelund Ericsson Research
The Wireless World - 5G and Beyond Björn Ekelund Ericsson Research 9X Mobile data Traffic by 2020 Monthly consumption per device type 2014 2020 4.2 GB 17.3 GB 1.9 GB 8.4 GB 1.0 GB 4.9 GB Ericsson Internal
EROAD THE FUTURE OF TRANSPORT TECHNOLOGY
EROAD THE FUTURE OF TRANSPORT TECHNOLOGY INNOVATION AND INTEGRITY ABOUT EROAD is a fully integrated technology, tolling and services provider. We were the first company to implement a GNSS/cellular-based
Vehicular Cloud. Fan Zhang
Vehicular Cloud Fan Zhang Outline VANET Cloud computing Vehicular cloud: motivation and concept Application scenarios Challenges: architecture/security Data forwarding Questions VANET Deliver timely information
5 TH C-ITS PLUGTEST 2016 USE CASES V01. Contact [email protected]
5 TH C-ITS PLUGTEST 2016 USE CASES V01 Contact [email protected] Date, Location, Host and Scope Date: 7 18 November 2016 Location: Port of Livorno, Italy Host: CNIT, Livorno Port Authority Organized
Ohio Smart Mobility Initiative. Carla Bailo October 8, 2015
Ohio Smart Mobility Initiative Carla Bailo October 8, 2015 Agenda 1. Self-Introduction 2. OSU Mobility Agenda Centers of Excellence 3. Ohio Smart Mobility Initiative 4. Q&A 1. Self-Introduction 2. OSU
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Bringing research to deployment: Concrete implementation of Cooperative Systems. Kees den Hollander Copenhagen, March 6, 2012
Bringing research to deployment: Concrete implementation of Cooperative Systems Kees den Hollander Copenhagen, March 6, 2012 Intelligente Transport Systemer (ITS) for Godstransporten Teknologisk Institut
An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón
June 10-11, 2008 Berlin, Germany An OSGi based HMI for networked vehicles Telefónica I+D Miguel García Longarón Networked Vehicle 2 Networked Vehicle! Tomorrow, the vehicles will be networked! Using Always
Channels of Delivery of Travel Information (Static and Dynamic On-Trip Information)
Channels of Delivery of Travel Information (Static and Dynamic On-Trip Information) Index Purpose Description Relevance for Large Scale Events Options Technologies Impacts Integration potential Implementation
INTERNATIONAL SURVEY OF BEST PRACTICES IN CONNECTED AND AUTOMATED VEHICLE TECHNOLOGIES 2014 UPDATE
INTERNATIONAL SURVEY OF BEST PRACTICES IN CONNECTED AND AUTOMATED VEHICLE TECHNOLOGIES 2014 UPDATE September 26, 2014 MICHIGAN DEPARTMENT OF TRANSPORTATION AND THE CENTER FOR AUTOMOTIVE RESEARCH ii Sponsoring
INTELLIGENT TRANSPORTATION SYSTEMS IN WHATCOM COUNTY A REGIONAL GUIDE TO ITS TECHNOLOGY
INTELLIGENT TRANSPORTATION SYSTEMS IN WHATCOM COUNTY A REGIONAL GUIDE TO ITS TECHNOLOGY AN INTRODUCTION PREPARED BY THE WHATCOM COUNCIL OF GOVERNMENTS JULY, 2004 Whatcom Council of Governments 314 E. Champion
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
