Communication Networks to Connect Moving Vehicles to Transportation Systems to Infrastructure

Author(s):  
Kira Kastell

Communication in transportation systems not only involves the communication inside a vehicle, train, or airplane but it also includes the transfer of data to and from the transportation system or between devices belonging to that system. This will be done using different types of wireless communication. Therefore in this chapter, first, the fundamentals of mobile communication networks are shortly described. Thereafter, possible candidate networks are discussed. Their suitability for a certain transportation system can be evaluated taking into consideration the system's requirements. Among the most prominent are the influence of speed and mobility, data rate and bit error rate constraints, reliability of the system and on-going connections. As in most of the cases, there will be no single best wireless communication network to fulfil all requirements, and in this chapter also hybrid networks are discussed. These are networks consisting of different (wireless) access networks. The devices may use the best suited network for a given situation but also change to another network while continuing the on-going connection or data transfer. Here the design of the handover or relocation plays a critical role as well as localization.

Author(s):  
Kira Kastell

Communication in transportation systems not only involves the communication inside a vehicle, train, or airplane but it also includes the transfer of data to and from the transportation system or between devices belonging to that system. This will be done using different types of wireless communication. Therefore in this chapter, first, the fundamentals of mobile communication networks are shortly described. Thereafter, possible candidate networks are discussed. Their suitability for a certain transportation system can be evaluated taking into consideration the system’s requirements. Among the most prominent are the influence of speed and mobility, data rate and bit error rate constraints, reliability of the system and on-going connections. As in most of the cases, there will be no single best wireless communication network to fulfil all requirements, and in this chapter also hybrid networks are discussed. These are networks consisting of different (wireless) access networks. The devices may use the best suited network for a given situation but also change to another network while continuing the on-going connection or data transfer. Here the design of the handover or relocation plays a critical role as well as localization.


Author(s):  
M. Khaleel Ullah Khan ◽  

This paper propose a method to design an “Intelligent Transportation System” for forecasting wireless communication network issues with cyber attacks. Wireless communication networks(WCN) is a broadly classified and critical gateway for any communication devices because the wireless communication networks is operated at various frequency ranges in different locations. In order to maintain its performance and also to prevent any attacks due to its high data handling, we need an Intelligent transportation system (ITS) to analyse and detect the cyber-attacks before going to implement it in real time transportation. In general wireless communication networks is an IEEE 802.11 standard which can be operated at physical Transfer control protocol/Internet protocol(TCP/IP) layer as well OSI model. In this paper a novel approach to design, analyse and detect cyber-attacks is proposed for wireless communication networks transport system, called Intelligent transportation system (ITS) based cyber-attack detection. Stacked firewall system is used for reducing fake attacks and detecting real time attacks in transportation system. Hence any fake attacks or real time attacks captured by the ITS will be informed to the system controller to make decision to whether it is a false-positive or real attack. ITS is the main process of the stacked firewall system which in turn take responsible to control, maintain, and prevent any cyber-attack.


Author(s):  
Pouwan Lei ◽  
Jia Jia Wang

The mobile phone industry has experienced an explosive growth in recent years. The emerging markets such as China, India, and Brazil contribute this growth. In China, the number of mobile subscribers has already surpassed the number of fixed landline phone subscribers. In Korea and Japan, there is an explosion of mobile and wireless services. The United States are joining too and there were 207.9 million subscribers in 2005 (CTIA, 2006). Mobile e-commerce (m-commerce) makes business mobility a reality; mobile users could access the Internet at any time, from anywhere with handheld devices or laptop. A 3G enabled smart phone enables you to access a wide range of services anywhere and anytime. For example, you can send and receive e-mail, make cinema and restaurant reservations and pay for them, check real train time, look at digital maps, download music and games, and also browse the Internet. Mobile and wireless services are ranging from mobile communication networks to wireless local area networks. The service provided by mobile communication systems has achieved huge success as mobile and wireless communication technologies are converging at fast speed. We will study mobile and wireless communication in relation to mobile phones. Hence, m-commerce is defined as electronic commerce carried out in handheld devices such as smart phone through mobile and wireless communication network.


2020 ◽  
Vol 5 (3) ◽  
pp. 30 ◽  
Author(s):  
Sylvester Inkoom ◽  
John Sobanjo ◽  
Eric Chicken

Intelligent transportation system (ITS) has become a crucial section of transportation and traffic management systems in the past decades. As a result, transportation agencies keep improving the quality of transportation infrastructure management information for accessibility and security of transportation networks. The goal of this paper is to evaluate the impact of two competing risks: “natural deterioration” of ITS devices and hurricane-induced failure of the same components. The major devices employed in the architecture of this paper include closed circuit television (CCTV) cameras, automatic vehicle identification (AVI) systems, dynamic message signals (DMS), wireless communication systems and DMS towers. From the findings, it was evident that as ITS infrastructure devices age, the contribution of Hurricane Category 3 as a competing failure risk is higher and significant compared to the natural deterioration of devices. Hurricane Category 3 failure vs. natural deterioration indicated an average hazard ratio of 1.5 for CCTV, AVI and wireless communications systems and an average hazard ratio of 2.3 for DMS, DMS towers and portable DMS. The proportional hazard ratios of the Hurricane Category 1 compared to the devices was estimated as <0.001 and that of Hurricane Category 2 < 0.5, demonstrating the lesser impact of the Hurricane Categories 1 and 2. It is expedient to envisage and forecast the impact of hurricanes on the failure of wireless communication networks, vehicle detection systems and other message signals, in order to prevent vehicle to infrastructure connection disruption, especially for autonomous and connected vehicle systems.


Author(s):  
Sattar B. Sadkhan ◽  
Nidaa A. Abbas

Wireless networks are inherently more vulnerable than their wired counterparts. In addition, complications arise in the presence of node mobility and dynamic network topology. Moreover, intermittent connectivity, whether caused by mobility or periodic node sleep, brings about additional challenges. At the same time, node resource constraints make direct adoption of existing security solutions difficult, if not impossible. Wireless Communication Network Security and Privacy analyze important problems in the realms of wireless networks and mobile computing. The Security aspects relate to authentication, access control and authorization, nonrepudation, privacy and confidentiality, integrity, and auditing. Privacy is an essential feature of any product or service.


2014 ◽  
Vol 577 ◽  
pp. 835-840
Author(s):  
Yan Liu ◽  
En Guo Zhu ◽  
Xuan Liu ◽  
Li Jun Dong

To improve the performance of power consumption information collection system and to solve the problem of system capacity small and the problem of low data rate, combined with the characteristics of WiMAX technology, the 230MHz wireless communication network of Power consumption information collection system was proposed based on WiMAX; The function and working methods of the communications network was designed. Implementations applicable to power consumption information collection system's key technologies was proposed such as Time division duplex, carrier aggregation, Software-Defined Radio through experimental verification. The results show that the use of this kind of communication networks can improve the data transfer rate, meet the bandwidth requirement, improve the reliability of data transmission and system Capacity and meet the business requirements of power consumption information collection system.


2013 ◽  
Vol 416-417 ◽  
pp. 1595-1599
Author(s):  
Wei Hua Ma

Because of the large span of the distance between wireless communication networks, many kinds of interference are encountered in the network signal transmission process, so that the accuracy of receiving the information is affected by the weakened signals and also the communication service quality for the users is reduced. Under this background, the advantages such as remoteness and convenience of wireless communication are first introduced. In the meantime, the factors influencing the signals of the wireless communication network are affected. Finally, the measures for enhancing the signals of the wireless communication network sites are proposed. It is expected that this paper is helpful for the future studies.


Author(s):  
Sattar B. Sadkhan ◽  
Nidaa A. Abbas

Wireless networks are inherently more vulnerable than their wired counterparts. In addition, complications arise in the presence of node mobility and dynamic network topology. Moreover, intermittent connectivity, whether caused by mobility or periodic node sleep, brings about additional challenges. At the same time, node resource constraints make direct adoption of existing security solutions difficult, if not impossible. Wireless Communication Network Security and Privacy analyze important problems in the realms of wireless networks and mobile computing. The Security aspects relate to authentication, access control and authorization, nonrepudation, privacy and confidentiality, integrity, and auditing. Privacy is an essential feature of any product or service.


Sign in / Sign up

Export Citation Format

Share Document