Functional Object | Description | User Defined |
---|
ITS Security Support | 'ITS Security Support' provides communications and system security functions to the ITS Object, including privacy protection functions. It may include firewall, intrusion management, authentication, authorization, profile management, identity management, cryptographic key management. It may include a hardware security module and security management information base. | False |
---|
MCM Automated Treatment System Control | 'MCM Automated Treatment System Control' remotely monitors and controls automated road treatment systems that disperse anti–icing chemicals or otherwise treat a road segment. The automated treatment system may be remotely activated by this object or it may include environmental sensors that activate the system automatically based on sensed environmental conditions. This object monitors treatment system operation, sets operating parameters, and directly controls system activation if necessary. | False |
---|
MCM Vehicle Tracking | 'MCM Vehicle Tracking' tracks the location of maintenance and construction vehicles and other equipment. Vehicle/equipment location and associated information is presented to the operator. | False |
---|
MCM Winter Maintenance Management | 'MCM Winter Maintenance Management' manages winter road maintenance, tracking and controlling snow plow operations, roadway treatment (e.g., salt spraying and other material applications), and other snow and ice control operations. It monitors environmental conditions and weather forecasts and uses the information to schedule winter maintenance activities, determine the appropriate snow and ice control response, and track and manage response operations. | False |
---|
TMC Signal Control | 'TMC Signal Control' provides the capability for traffic managers to monitor and manage the traffic flow at signalized intersections. This capability includes analyzing and reducing the collected data from traffic surveillance equipment and developing and implementing control plans for signalized intersections. Control plans may be developed and implemented that coordinate signals at many intersections under the domain of a single Traffic Management Center and are responsive to traffic conditions and adapt to support incidents, preemption and priority requests, pedestrian crossing calls, etc. | False |
---|
TMC Variable Speed Limits | 'TMC Variable Speed Limits' provides center monitoring and control of variable speed limits systems. It monitors data on traffic and environmental conditions collected from sensors along the roadway. Based on the measured data, it calculates and sets suitable speed limits usually by lane. It controls equipment that posts the current speed limits and displays additional information such as basic safety rules and current traffic information to drivers. | False |
---|
Document Number | Title | Description |
---|
ISO 21217 | Intelligent transport systems –– Communications access for land mobiles (CALM) –– Architecture | ISO 21217 describes the communications reference architecture of nodes called "ITS station units" designed for deployment in ITS communication networks. While it describes a number of ITS station elements, whether or not a particular element is implemented in an ITS station unit depends on the specific communication requirements of the implementation. It also describes the various communication modes for peer–to–peer communications over various networks between ITS communication nodes. These nodes may be ITS station units as described in the document or any other reachable nodes. ISO 21217 specifies the minimum set of normative requirements for a physical instantiation of the ITS station based on the principles of a bounded secured managed domain. |
---|
NEMA TS 8 | Cyber and Physical Security for Intelligent Transportation Systems | This specification describes how agencies and other transportation infrastructure owner/operators should implement cyber– and physical–security for ITS. |
---|
NIST FIPS PUB 140–2 | Security Requirements for Cryptographic Modules | This Federal Information Processing Standard (140–2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self–tests; design assurance; and mitigation of other attacks. |
---|