{"title":"Key management requirements for Positive Train Control communications security","authors":"M. Hartong, R. Goel, D. Wijesekera","doi":"10.1109/RRCON.2006.215316","DOIUrl":null,"url":null,"abstract":"Positive Train Control (PTC) is an electronic system that enforces train separation, speed enforcement, roadway worker protection and a host of other activities essential to operate railroads safety and efficiently that requires wireless communication to exchange control and sensory information between mobile locomotive and static control centers and wayside devices. This requires communication security ensuring the freshness, confidentiality, integrity, and authenticity of the information. For that purpose, we propose a cryptography based key management system (KMS). This paper outlines the requirements for a KMS, provides a proposed key distribution method, and highlights several significant implementation tradeoffs","PeriodicalId":292357,"journal":{"name":"Proceedings of the 2006 IEEE/ASME Joint Rail Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2006 IEEE/ASME Joint Rail Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RRCON.2006.215316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Positive Train Control (PTC) is an electronic system that enforces train separation, speed enforcement, roadway worker protection and a host of other activities essential to operate railroads safety and efficiently that requires wireless communication to exchange control and sensory information between mobile locomotive and static control centers and wayside devices. This requires communication security ensuring the freshness, confidentiality, integrity, and authenticity of the information. For that purpose, we propose a cryptography based key management system (KMS). This paper outlines the requirements for a KMS, provides a proposed key distribution method, and highlights several significant implementation tradeoffs