1 Improving Response Time in Traffic Police Infraction Registration System H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher Tehrani, M. A.

Slides:



Advertisements
Similar presentations
Mobile phone based real time solution to track completed / in progress work The programme officer initiates the work by capturing the site image, GPS.
Advertisements

Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 “draft-urien-eap-smartcard-type-00.txt” EAP Smart Card Protocol (EAP-SC)
Securing Vehicular Communications Author : Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux From : IEEE Wireless Communications Magazine, Special.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Module 3 Windows Server 2008 Branch Office Scenario.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Citrix Partner Update The Citrix Delivery Centre.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Uniqueness of user names is enforced Customer information logged to database Require contact information as well as address address will.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Wireless Sensor Network Security Anuj Nagar CS 590.
Web Service Security CSCI5931 Web Security Instructor: Dr. T. Andrew Yang Student: Jue Wang.
Key Management in Cryptography
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
Clinic Security and Policy Enforcement in Windows Server 2008.
Information Security for Managers (Master MIS)
Mobile Databases: a Selection of Open Issues and Research Directions Authors: Rachid Guerraoui et al. Sources: SIGMOD Record, 33(2), pp.78-83, 2004 Adviser:
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
Wireless and Security CSCI 5857: Encoding and Encryption.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Virtualizing and Centralizing Network Infrastructure at a Decentralized Federal Statistical Agency Elvera Gleaton Joseph.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
© Synergetics Portfolio Security Aspecten.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
By Jonathan….and Darion……….. Reliability Windows File Protection protects core system files from being overwritten by application installs. Driver certification.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
WEP Protocol Weaknesses and Vulnerabilities
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Enterprise-Class Telephony on Wireless LANs Tom Alexander CTO VeriWave, Inc.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Wireless Network Security CSIS 5857: Encoding and Encryption.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
WIRELESS FRAUD Detection & Prevention. Method of Fraud CLONING of SIM Card.
Combating Uninsured Driving 2011 Annual Region I Conference.
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Presented by Edith Ngai MPhil Term 3 Presentation
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Presentation transcript:

1 Improving Response Time in Traffic Police Infraction Registration System H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher Tehrani, M. A. Tavallaee Manuscript received March 28, 2009 Adviser: Tz-Heng Hsu Speak: Shao-Hsiang Hung Date:2009/12/8

2 Outline Introduction Introduction The Mobile Traffic Police Communication Foundation The Mobile Traffic Police Communication Foundation Improving Database Performance Improving Database Performance Conclusions Conclusions

3 I. Introduction(1) The number of registered motor vehicles in the world in recent years The number of registered motor vehicles in the world in recent years Problem in road traffic enforcement Problem in road traffic enforcement Limited resources of traffic police Limited resources of traffic police Now traffic infraction registration Now traffic infraction registration Still done manually by a pen and a notebook Still done manually by a pen and a notebook

4 I. Introduction(2) Mobile telecommunication application Mobile telecommunication application Using a mobile phone on network Using a mobile phone on network Anywhere, anytime Anywhere, anytime Enhance the existing registration method Enhance the existing registration method Central database can updated in real time Central database can updated in real time Be convenient and efficient Be convenient and efficient

5 I. Introduction(3.1) Some challenges in traffic police mobile telecommunication: Some challenges in traffic police mobile telecommunication: A. Client Devices Small screen Small screen Mobile phone battery Mobile phone battery Limited processing resources and storage space Limited processing resources and storage space B. Cellular Network The bandwidth limitation The bandwidth limitation Vulnerable to theft and loss Vulnerable to theft and loss

6 I. Introduction(3.2) C. Traffic Police Data Center (TPDC) Update real time simply Update real time simply Responsibility time Responsibility time Security Security Client authentication Client authentication Data encryption Data encryption Integrity Integrity

7 II. The Mobile Traffic Police Communication Foundation

8 A. Mobile Client SIM card acts as SIM card acts as A tampered resistant device A tampered resistant device A cryptographic device A cryptographic device Menu-driven application Menu-driven application A specific PIN number activate the application A specific PIN number activate the application The SIMToolkit application The SIMToolkit application Packages all information into an encrypted message and sends it to the SG between GMS Packages all information into an encrypted message and sends it to the SG between GMS

9 II. The Mobile Traffic Police Communication Foundation B. Police Keys Sever Main functionalities: Main functionalities: A. Generation new keys B. Issues Keys to the SG C. Maintains a database containing the valid Keys and Revocation Lists (CRLs). For encryption and officer validation For encryption and officer validation Symmetric encryption algorithms Symmetric encryption algorithms

10 II. The Mobile Traffic Police Communication Foundation B. Police Keys Sever To reduce the risk of key transmissions To reduce the risk of key transmissions A novel methods A novel methods Changing of exclusive key two parties periodically Changing of exclusive key two parties periodically For security improvement For security improvement A novel protocol A novel protocol Regard to Regard to Offender driving license data in TPDC Offender driving license data in TPDC The police officer The police officer

11 II. The Mobile Traffic Police Communication Foundation A novel protocol A novel protocol

12 II. The Mobile Traffic Police Communication Foundation B. Police Keys Sever

13 II. The Mobile Traffic Police Communication Foundation B. Police Keys Sever Encrypt the first message Encrypt the first message Using TPDC issues the first key Using TPDC issues the first key

14 II. The Mobile Traffic Police Communication Foundation

15 II. The Mobile Traffic Police Communication Foundation B. Police Keys Sever This confirmation message consists: This confirmation message consists: License confirmation License confirmation Daily_session_ID Daily_session_ID Data and time Data and time

16 II. The Mobile Traffic Police Communication Foundation B. Police Keys Sever

17 II. The Mobile Traffic Police Communication Foundation B. Police Keys Sever After issue traffic ticket After issue traffic ticket A new key generation A new key generation The first key from TPDC The first key from TPDC Any predetermined date from POD Any predetermined date from POD Encrypt traffic ticket and Daily_session_ID Encrypt traffic ticket and Daily_session_ID

18 II. The Mobile Traffic Police Communication Foundation C. Security Gateway

19 II. The Mobile Traffic Police Communication Foundation C. Security Gateway The User Authentication Agent(UAA) module The User Authentication Agent(UAA) module The Access Point module (AP) The Access Point module (AP) The Cryptographic module (CU) The Cryptographic module (CU)

20 II. The Mobile Traffic Police Communication Foundation D. Database

21 III. Improving Database Performance Optimizing the database Optimizing the database Proposed Method for Database Performance Tuning Proposed Method for Database Performance Tuning Officer search request distributed across multiple servers Officer search request distributed across multiple servers A dispatcher do load balancing A dispatcher do load balancing Request for insert send to whole servers Request for insert send to whole servers Request for search send to only one server Request for search send to only one server

22 IV. Experimental Result(1)

23 V. Conclusions(1) With growth of infraction manual method goes to be unusable. With growth of infraction manual method goes to be unusable. Police communication Police communication Security and be quick Security and be quick Anywhere, anytime Anywhere, anytime

24 V. Conclusions(2) we propose a secure traffic police data center we propose a secure traffic police data center protect and establish their communication in authentication and confidentiality protect and establish their communication in authentication and confidentiality Introduce our method tuning Introduce our method tuning minimize the response time minimize the response time It can be extended to the other mobile information systems It can be extended to the other mobile information systems

25 References H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher Tehrani, M. A. Tavallaee, “ Improving Response Time in Traf fie Police Infraction Registration System ”, 2009 Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009)Monash University, Sunway campus, Malaysia, 25th &26th July 2009.