Upload
shannon-garrison
View
213
Download
0
Tags:
Embed Size (px)
Citation preview
11
Improving Response Time in TraImproving Response Time in Traffic Police Infraction Registratioffic Police Infraction Registratio
n Systemn System
H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher Tehrani, M. A. TavallaeeTehrani, M. A. Tavallaee
Manuscript received March 28, 2009Manuscript received March 28, 2009
Adviser: Tz-Heng HsuAdviser: Tz-Heng HsuSpeak: Shao-Hsiang HungSpeak: Shao-Hsiang Hung
Date:2009/12/8Date:2009/12/8
22
OutlineOutline
IntroductionIntroduction The Mobile Traffic Police The Mobile Traffic Police
Communication FoundationCommunication Foundation Improving Database PerformanceImproving Database Performance ConclusionsConclusions
33
I. Introduction(1)I. Introduction(1)
The number of registered motor The number of registered motor vehicles in the world in recent yearsvehicles in the world in recent years
Problem in road traffic enforcementProblem in road traffic enforcement Limited resources of traffic policeLimited resources of traffic police
Now traffic infraction registrationNow traffic infraction registration Still done manually by a pen and a notebookStill done manually by a pen and a notebook
44
I. Introduction(2)I. Introduction(2)
Mobile telecommunication applicationMobile telecommunication application Using a mobile phone on networkUsing a mobile phone on network Anywhere, anytimeAnywhere, anytime Enhance the existing registration methodEnhance the existing registration method Central database can updated in real timeCentral database can updated in real time Be convenient and efficientBe convenient and efficient
55
I. Introduction(3.1)I. Introduction(3.1)
Some challenges in traffic police Some challenges in traffic police mobile telecommunication:mobile telecommunication:
A.A. Client DevicesClient Devices• Small screenSmall screen• Mobile phone batteryMobile phone battery• Limited processing resources and storage Limited processing resources and storage
spacespace
B.B. Cellular NetworkCellular Network• The bandwidth limitationThe bandwidth limitation• Vulnerable to theft and loss Vulnerable to theft and loss
66
I. Introduction(3.2)I. Introduction(3.2)
C.C. Traffic Police Data Center (TPDC)Traffic Police Data Center (TPDC) Update real time simplyUpdate real time simply Responsibility timeResponsibility time SecuritySecurity
Client authenticationClient authentication Data encryptionData encryption Integrity Integrity
77
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
88
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
A.A. Mobile ClientMobile Client SIM card acts asSIM card acts as
A tampered resistant deviceA tampered resistant device A cryptographic deviceA cryptographic device Menu-driven applicationMenu-driven application
A specific PIN number activate the applicationA specific PIN number activate the application The SIMToolkit applicationThe SIMToolkit application
Packages all information into an encrypted mePackages all information into an encrypted message and sends it to the SG between GMSssage and sends it to the SG between GMS
99
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
B.B. Police Keys SeverPolice Keys Sever Main functionalities:Main functionalities:
A.A. Generation new keysGeneration new keysB.B. Issues Keys to the SG Issues Keys to the SG C.C. Maintains a database containing the valid Keys Maintains a database containing the valid Keys
and Revocation Lists (CRLs).and Revocation Lists (CRLs). For encryption and officer validation For encryption and officer validation
Symmetric encryption algorithmsSymmetric encryption algorithms
1010
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
B.B. Police Keys SeverPolice Keys Sever To reduce the risk of key transmissionsTo reduce the risk of key transmissions
A novel methodsA novel methods Changing of exclusive key two parties Changing of exclusive key two parties
periodicallyperiodically For security improvement For security improvement
A novel protocolA novel protocol Regard to Regard to
Offender driving license data in TPDCOffender driving license data in TPDC The police officerThe police officer
1111
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
A novel protocolA novel protocol
1212
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
B.B. Police Keys SeverPolice Keys Sever
1313
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
B.B. Police Keys SeverPolice Keys Sever Encrypt the first messageEncrypt the first message
Using TPDC issues the first keyUsing TPDC issues the first key
}) (),{H(_LicenseReq_Verify LicenseDrivingfID AESofficer
1414
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
1515
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
B.B. Police Keys SeverPolice Keys Sever This confirmation message consists:This confirmation message consists:
License confirmationLicense confirmation Daily_session_IDDaily_session_ID Data and timeData and time
1616
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
B.B. Police Keys SeverPolice Keys Sever
1717
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
B.B. Police Keys SeverPolice Keys Sever After issue traffic ticketAfter issue traffic ticket
A new key generationA new key generation The first key from TPDCThe first key from TPDC Any predetermined date from PODAny predetermined date from POD
Encrypt traffic ticket and Daily_session_IDEncrypt traffic ticket and Daily_session_IDAESfPOD} Old_Key, {New_Key
1818
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
C.C. Security GatewaySecurity Gateway
1919
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
C.C. Security GatewaySecurity Gateway The User Authentication Agent(UAA) moduThe User Authentication Agent(UAA) modu
lele The Access Point module (AP)The Access Point module (AP) The Cryptographic module (CU)The Cryptographic module (CU)
2020
II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation
D.D. DatabaseDatabase
2121
III. Improving Database III. Improving Database PerformancePerformance
Optimizing the databaseOptimizing the database Proposed Method for Database Proposed Method for Database
Performance TuningPerformance Tuning Officer search request distributed across Officer search request distributed across
multiple servers multiple servers A dispatcher do load balancingA dispatcher do load balancing Request for insert send to whole serversRequest for insert send to whole servers Request for search send to only one serverRequest for search send to only one server
2323
V. Conclusions(1)V. Conclusions(1)
With growth of infraction manual With growth of infraction manual method goes to be unusable. method goes to be unusable.
Police communicationPolice communication Security and be quickSecurity and be quick Anywhere, anytimeAnywhere, anytime
2424
V. Conclusions(2)V. Conclusions(2)
we propose a secure traffic police we propose a secure traffic police data centerdata center protect and establish their protect and establish their
communication in authentication and communication in authentication and confidentialityconfidentiality
Introduce our method tuningIntroduce our method tuning minimize the response timeminimize the response time
It can be extended to the other It can be extended to the other mobile information systemsmobile information systems
2525
ReferencesReferences
H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher Tehrani, M. A. Tavallaee, “Improving Response Time in Traf fie Police Infraction Registration System”, 2009 Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009)Monash University, Sunway campus, Malaysia, 25th &26th July 2009.