scholarly journals Cybersecurity considerations for CBTC

Author(s):  
Simone Soderi ◽  
Matti Hämäläinen ◽  
Jari Iinatti Iinatti

<div> <div> <div> <p>Communication Based Train Control (CBTC) and the European Rail Traffic Management Systems (ERTMS) are prevailing radio controlled systems for railway. As a part of the ERTMS standard, the European Train Control System (ETCS) implements on-board control systems throughout multiple radios. CBTC makes use of RF-based data communication systems (DCSs) for train control and traffic management. Even if ERTMS and CBTC have different origins, both make use of wireless communications for safety related systems. This paper describes cybersecurity considerations for CBTC. First, authors studied the impact of security on intra-vehicular communications in a real tunnel scenario, e.g. for urban transit where the usage of security is mandatory in order to maintain the system safety. Secondly, the impact of a jamming attack against ETCS radio has been analyzed. Measurement campaigns confirmed Host Identity Protocol (HIP) as an effective security solution at layer 3 in terms of the protocol overhead introduced. On the other hand, the Balise Transmission Module (BTM), included in ETCS standard, is sensitive to jamming attack and the measurements presented here would offer the sights for further security considerations around the CBTC. </p> </div> </div> </div>

2021 ◽  
Author(s):  
Simone Soderi ◽  
Matti Hämäläinen ◽  
Jari Iinatti Iinatti

<div> <div> <div> <p>Communication Based Train Control (CBTC) and the European Rail Traffic Management Systems (ERTMS) are prevailing radio controlled systems for railway. As a part of the ERTMS standard, the European Train Control System (ETCS) implements on-board control systems throughout multiple radios. CBTC makes use of RF-based data communication systems (DCSs) for train control and traffic management. Even if ERTMS and CBTC have different origins, both make use of wireless communications for safety related systems. This paper describes cybersecurity considerations for CBTC. First, authors studied the impact of security on intra-vehicular communications in a real tunnel scenario, e.g. for urban transit where the usage of security is mandatory in order to maintain the system safety. Secondly, the impact of a jamming attack against ETCS radio has been analyzed. Measurement campaigns confirmed Host Identity Protocol (HIP) as an effective security solution at layer 3 in terms of the protocol overhead introduced. On the other hand, the Balise Transmission Module (BTM), included in ETCS standard, is sensitive to jamming attack and the measurements presented here would offer the sights for further security considerations around the CBTC. </p> </div> </div> </div>


2021 ◽  
Vol 1 (1) ◽  
pp. 29-34
Author(s):  
Nedžad Branković ◽  
Aida Kalem ◽  
Adisa Medić

Development of high-speed railways set up challenges for new communication technologies. With the increase in speed, new requirements for communication systems have emerged that HSR requires greater reliability, capacity and shorter response time for efficient and safe operations. Mobile communication systems are crucial for the competitiveness of the railway industry and therefore have become one of the priorities addressed by the participants in the railway system to take advantage of technological opportunities to improve operational processes and the quality of provided transport services. The European Rail Traffic Management System (ERTMS) uses the Global System for Mobile Communications for Railways (GSM-R) for voice and data communication to communicate between trains and control centers. The International Railway Union is exploring new ways of communicating for high-speed railways because as speed increases this system becomes unreliable in information transmission. This paperwork presents an analysis of the evolution of communications on European railways since the usage of GSM-R. In addition, an overview of the various alternative solutions proposed during the time (LTE-R, Future Railway Mobile Communication System) as possible successors to GSM-R technology is given.


Author(s):  
Patrick Sondi ◽  
Mohamed Kassab ◽  
Marina Aguado ◽  
Etienne Lemaire ◽  
Marion Berbineau

The deployment of the European Rail Traffic Management System (ERTMS) in Europe will be mandatory on the major corridors, but this process will be long and expensive. Industry needs faster roll-out and a reduction in cost in order to obtain the certification and authorization to put equipment into service. New lab-testing tools for European Train Control System (ETCS) validation based on automatic testing could accelerate the process. In this work, we propose a co-simulation platform relaying on two existing tools: the ERTMS simulator that implements only the functional sub-system (ETCS) of ERTMS; and the OPNET simulator that allows modeling the whole telecommunication subsystem (GSM-R) from the Physical layer to higher layers, including the Euroradio interface. We describe a co-simulation protocol that determines how the results obtained from each simulator are reused as input in the other in order to take into account the impact of the functioning of one subsystem on the other. In this way, the problems related to radio propagation impairments, network load and electromagnetic interferences can be taken into account in ERTMS evaluation. Furthermore, some actors of the railway industry think about moving towards emerging technologies like LTE (4G Long Term Evolution). This platform will also allow evaluation of prospective technologies in the framework of ERTMS scenarios before costly real-world implementation.


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Irene Arsuaga ◽  
Nerea Toledo ◽  
Igor Lopez ◽  
Marina Aguado

Railway systems have evolved considerably in the last years with the adoption of new communication technologies. Aiming to achieve a single European railway network, the European Rail Traffic Management System (ERTMS) emerged in Europe to substitute multiple and noninteroperable national railway communication systems. This system and its security strategies were designed in late 1990s. Recent works have identified vulnerabilities related to integrity, authenticity, availability, and confidentiality. In the context of defining effective countermeasures to mitigate potential vulnerabilities, these vulnerabilities have to be analysed. In this article we introduce a framework that attempts to challenge ERTMS security by evaluating the exploitability of these vulnerabilities.


2013 ◽  
Author(s):  
Angela Schmitt ◽  
Ruzica Vujasinovic ◽  
Christiane Edinger ◽  
Julia Zillies ◽  
Vilmar Mollwitz

2019 ◽  
Vol 7 (1) ◽  
pp. 62-72
Author(s):  
Shatha Abbas Hassan ◽  
Noor Ali Aljorani

The increasing importance of the information revolution and terms such as ‘speed’, ‘disorientation’, and ‘changing the concept of distance’, has provided us with tools that had not been previously available. Technological developments are moving toward Fluidity, which was previously unknown and cannot be understood through modern tools. With acceleration of the rhythm in the age we live in and the clarity of the role of information technology in our lives, as also the ease of access to information, has helped us to overcome many difficulties. Technology in all its forms has had a clear impact on all areas of daily life, and it has a clear impact on human thought in general, and the architectural space in particular, where the architecture moves from narrow spaces and is limited to new spaces known as the ‘breadth’, and forms of unlimited and stability to spaces characterized with fluidity. The research problem (the lack of clarity of knowledge about the impact of vast information flow associated with the technology of the age in the occurrence of liquidity in contemporary architectural space) is presented here. The research aims at defining fluidity and clarifying the effect of information technology on the changing characteristics of architectural space from solidity to fluidity. The research follows the analytical approach in tracking the concept of fluidity in physics and sociology to define this concept and then to explain the effect of Information Technology (IT) to achieve the fluidity of contemporary architectural space, leading to an analysis of the Skidmore, Owings and Merrill (SOM) architectural model. The research concludes that information technology achieves fluidity through various tools (communication systems, computers, automation, and artificial intelligence). It has changed the characteristics of contemporary architectural space and made it behave like an organism, through using smart material.


Electronics ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 777
Author(s):  
Jan Leuchter ◽  
Radim Bloudicek ◽  
Jan Boril ◽  
Josef Bajer ◽  
Erik Blasch

The paper describes the influence of power electronics, energy processing, and emergency radio systems (ERS) immunity testing on onboard aircraft equipment and ground stations providing air traffic services. The implementation of next-generation power electronics introduces potential hazards for the safety and reliability of aircraft systems, especially the interferences from power electronics with high-power processing. The paper focuses on clearly identifying, experimentally verifying, and quantifiably measuring the effects of power electronics processing using switching modes versus the electromagnetic compatibility (EMC) of emergency radio systems with electromagnetic interference (EMI). EMI can be very critical when switching power radios utilize backup receivers, which are used as aircraft backup systems or airport last-resort systems. The switching power electronics process produces interfering electromagnetic energy to create problems with onboard aircraft radios or instrument landing system (ILS) avionics services. Analyses demonstrate significant threats and risks resulting from interferences between radio and power electronics in airborne systems. Results demonstrate the impact of interferences on intermediate-frequency processing, namely, for very high frequency (VHF) radios. The paper also describes the methodology of testing radio immunity against both weak and strong signals in accordance with recent aviation standards and guidance for military radio communication systems in the VHF band.


Energies ◽  
2021 ◽  
Vol 14 (13) ◽  
pp. 3838
Author(s):  
Marta Borowska-Stefańska ◽  
Michał Kowalski ◽  
Paulina Kurzyk ◽  
Miroslava Mikušová ◽  
Szymon Wiśniewski

The main purpose of this article was to determine the impact on the equilibrium of the local transport system from privileging EVs by permitting them to use bus lanes. The study used two sets of data: information on infrastructure and traffic management; and information on the recorded road network loads and traffic volumes generated by a given shopping centre—the E. Leclerc shopping centre (an important traffic generator within the city of Łódź, Poland). These sets were then used to develop a microsimulation traffic model for the shopping centre and the associated effects on the localised transport system. The model was constructed by means of the PTV Vissim software tool. An initial simulation was conducted that formed a basis for subsequent scenarios (in total, 17 simulations were performed). On the basis of the conducted analyses, it was established that—for the researched part of the transport system—privileging the still rather uncommon battery electric vehicles (BEVs) engendered a marginal deterioration of traffic conditions. At the same time, allowing BEVs to use bus lanes within the chosen research area had no negative impact on bus journey times.


Sign in / Sign up

Export Citation Format

Share Document