Spelling suggestions: "subject:"access category"" "subject:"access gategory""
1 |
Using LiDAR Data to Analyze Access Management Criteria in UtahSeat, Marlee Lyn 01 April 2017 (has links)
The Utah Department of Transportation (UDOT) has completed a Light Detection and Ranging (LiDAR) data inventory that includes access locations across the UDOT network. The new data are anticipated to be extremely useful in better defining safety and in completing a systemwide analysis of locations where safety could be improved, or where safety has been improved across the state. The Department of Civil and Environmental Engineering at Brigham Young University (BYU) has worked with the new data to perform a safety analysis of the state related to access management, particularly related to driveway spacing and raised medians. The primary objective of this research was to increase understanding of the safety impacts across the state related to access management. These objectives were accomplished by using the LiDAR database to evaluate driveway spacing and locations to aid in hot spot identification and to develop relationships between access design and location as a function of safety and access category (AC). Utah Administrative Rule R930-6 contains access management guidelines to balance the access found on a roadway with traffic and safety operations. These guidelines were used to find the maximum number of driveways recommended for a roadway. ArcMap 10.3 and Microsoft Excel were used to visualize the data and identify hot spot locations. An analysis conducted in this study compared current roadway characteristics to the R930-6 guidelines to find locations where differences occurred. This analysis does not indicate the current AC is incorrect; it simply means that the assigned AC does not meet current roadway characteristic based on the LiDAR data analysis. UDOT can decide what this roadway will become in the future and help shape each segment using the AC outlined in the R930-6. A hierarchal Bayesian statistical before-after model, created in previous BYU safety research, was used to analyze locations where raised medians have been installed. Twenty locations where raised medians were installed in Utah between 2002 to 2014 were used in this model. The model analyzed the raised medians by AC. Only three AC were represented in the data. Regression plots depicting a decrease in crashes before and after installation, posterior distribution plots showing the probability of a decrease in crashes after installation, and crash modification factor (CMF) plots presenting the CMF values estimated for different vehicle miles traveled (VMT) values were all created as output from the before-after model. Overall, installing a raised median gives an approximate reduction of 53 percent for all crashes. Individual AC analysis yielded results ranging from 32 to 44 percent for all severity groups except severity 4 and 5. When the model was only run for crash severity 4 and 5, a larger reduction of 57 to 58 percent was found.
|
2 |
Establishing security and privacy in WAVE-enabled vehicular ad hoc networksBiswas, Subir 11 January 2013 (has links)
Security and privacy are among the growing concerns of a Vehicular Ad hoc Network (VANET) which requires a high degree of liability from its participants. In this dissertation, We address security, anonymity and privacy challenges of VANETs in the light of the IEEE standards for vehicular communications.
VANET provides a variety of road-safety and other applications through wireless devices installed in vehicles and roadside infrastructure. A roadside infrastructure in VANET is generally public, and is prone to several different malicious attacks including node compromise, impersonation, and false message delivery attacks. Therefore, a user of a VANET must verify the integrity of a message that is delivered from a roadside infrastructure. On the other hand, a vehicle-originated message should be anonymous in order to ensure user-privacy in a VANET. However, a vehicle must not be able to take advantage of its anonymity for any misbehavior like sending false messages or malicious updates to other vehicles or a roadside infrastructure. We use proxy signature, identity-based signature, and elliptic curve cryptosystems to provide authentication for infrastructure generated messages, and anonymous authentication for vehicle originated messages.
Authentication in a dense traffic condition is a challenge for a receiving entity as it incurs a processing delay at the receiving end. We address this issue with a dynamic approach that selectively verifies received messages based on a message's MAC-layer priority and a sender's information relevance. This approach makes a trade-off between priority and fairness in vehicular message authentication.
We develop a network simulator to measure the impact of our authentication schemes over a WAVE protocol stack. Also, we investigate how some of the MAC-layer weaknesses may impair the security of a VANET. Our solutions are lightweight, bandwidth friendly and compatible to the current standards of vehicular communications.
|
3 |
Establishing security and privacy in WAVE-enabled vehicular ad hoc networksBiswas, Subir 11 January 2013 (has links)
Security and privacy are among the growing concerns of a Vehicular Ad hoc Network (VANET) which requires a high degree of liability from its participants. In this dissertation, We address security, anonymity and privacy challenges of VANETs in the light of the IEEE standards for vehicular communications.
VANET provides a variety of road-safety and other applications through wireless devices installed in vehicles and roadside infrastructure. A roadside infrastructure in VANET is generally public, and is prone to several different malicious attacks including node compromise, impersonation, and false message delivery attacks. Therefore, a user of a VANET must verify the integrity of a message that is delivered from a roadside infrastructure. On the other hand, a vehicle-originated message should be anonymous in order to ensure user-privacy in a VANET. However, a vehicle must not be able to take advantage of its anonymity for any misbehavior like sending false messages or malicious updates to other vehicles or a roadside infrastructure. We use proxy signature, identity-based signature, and elliptic curve cryptosystems to provide authentication for infrastructure generated messages, and anonymous authentication for vehicle originated messages.
Authentication in a dense traffic condition is a challenge for a receiving entity as it incurs a processing delay at the receiving end. We address this issue with a dynamic approach that selectively verifies received messages based on a message's MAC-layer priority and a sender's information relevance. This approach makes a trade-off between priority and fairness in vehicular message authentication.
We develop a network simulator to measure the impact of our authentication schemes over a WAVE protocol stack. Also, we investigate how some of the MAC-layer weaknesses may impair the security of a VANET. Our solutions are lightweight, bandwidth friendly and compatible to the current standards of vehicular communications.
|
Page generated in 0.0547 seconds