Dynamic encryption technique for the security and efficiency of ATMs data transmission
ITS aims at enhancing traffic safety, reducing congestion, increasing travel mobility, enlarging economic power and controlling efficient energy-use. Advanced Transportation Management System (ATMS) is one of the major sub-system of ITS, and it utilizes monitor apparatus, communications and other co...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/20955 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | ITS aims at enhancing traffic safety, reducing congestion, increasing travel mobility, enlarging economic power and controlling efficient energy-use. Advanced Transportation Management System (ATMS) is one of the major sub-system of ITS, and it utilizes monitor apparatus, communications and other control technologies to obtain or exchange traffic information between traffic devices. However, during data transmission, the situation of the data packets switching is exposed and not protected. Someone can use existing software to intercept the data packets from transmission process easily and these attacks will cause ATMS to become paralysed and disorder the signal timing or impaired traffic safety seriously. Therefore, the traffic data transmission security should be the principal issue for ATMS nowadays, but less people are concerned with the issue.
For these reasons, this study concentrates on the information security of ATMS data transmission through modern cryptography and sets up a suitable security mechanism which aims at the message packet exchange and transmission via Java programming language. In which, the cryptography techniques would be adopted to protect the contents of data packet from masquerading, replying and tampering; and the general encryption algorithm is used to transform the plaintext into the ciphertext via the secret keys. |
---|