Font Size: a A A

Research On Data Security Solution In The Networking ETC System

Posted on:2008-03-19Degree:MasterType:Thesis
Country:ChinaCandidate:T Z WuFull Text:PDF
GTID:2132360212994263Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
As an important aspect in the field of ITS, ETC is an effective means to alleviate the traffic bottleneck in toll stations and plays an important role in reducing environmental pollution. Thus many countries exploit ETC as the first applicable system in ITS. China's transportation departments have given first priority to the exploiture and application of ETC in the field of ITS. In addition, during the 10th five-year plan period, they managed to carry out a series of technological innovation in communications and territorial experiments in ETC. And for the 11th five-year plan period, trans-regional ETC becomes the orientation of technological innovation task of ITS. In one of the major programs of the National Key Technologies R&D Program for the 11th five-year plan period, the research topic "the application and demonstration of the national comprehensive ITS", it is proposed that "the national expressways networking ETC system" has advanced the key technology for highway tolls based on satellite location, trans-provincial and intercity networking ETC, and the security and authenticity of the national expressways toll.Because it is related to the corresponding issues of charging, the trueness and reliability of data is crucial, and data collection along with the related security for network transmission lay solid foundations for the security and authenticity of the national expressways' toll.Based on the analysis of the current domestic applicable technology in ETC, data security technology, and network security technology, the study discusses the issue of the data security in national ETC system. To deal with the potential security problems in data transmission, it puts forward a security model including RDIF data collection and transmission in front end system and data transmission between the workstation and the server in rear end system. The paper provides reference for establishing a set of ETC system, secure and authentic.
Keywords/Search Tags:ITS, ETC, RDIF, SSL, PKI, CA
PDF Full Text Request
Related items