1 Improving Response Time in Traffic Police Infraction Registration System H. Arasteh Rad, K. B....

25
1 Improving Response Time Improving Response Time in Traffic Police Infrac in Traffic Police Infrac tion Registration System tion Registration System H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. M H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. M ohamad Bagher Tehrani, M. A. Tavallaee ohamad Bagher Tehrani, M. A. Tavallaee Manuscript received March 28, 2009 Manuscript received March 28, 2009 Adviser: Tz-Heng Hsu Adviser: Tz-Heng Hsu Speak: Shao-Hsiang Hung Speak: Shao-Hsiang Hung Date:2009/12/8 Date:2009/12/8

Transcript of 1 Improving Response Time in Traffic Police Infraction Registration System H. Arasteh Rad, K. B....

11

Improving Response Time in TraImproving Response Time in Traffic Police Infraction Registratioffic Police Infraction Registratio

n Systemn System

H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher Tehrani, M. A. TavallaeeTehrani, M. A. Tavallaee

Manuscript received March 28, 2009Manuscript received March 28, 2009

Adviser: Tz-Heng HsuAdviser: Tz-Heng HsuSpeak: Shao-Hsiang HungSpeak: Shao-Hsiang Hung

Date:2009/12/8Date:2009/12/8

22

OutlineOutline

IntroductionIntroduction The Mobile Traffic Police The Mobile Traffic Police

Communication FoundationCommunication Foundation Improving Database PerformanceImproving Database Performance ConclusionsConclusions

33

I. Introduction(1)I. Introduction(1)

The number of registered motor The number of registered motor vehicles in the world in recent yearsvehicles in the world in recent years

Problem in road traffic enforcementProblem in road traffic enforcement Limited resources of traffic policeLimited resources of traffic police

Now traffic infraction registrationNow traffic infraction registration Still done manually by a pen and a notebookStill done manually by a pen and a notebook

44

I. Introduction(2)I. Introduction(2)

Mobile telecommunication applicationMobile telecommunication application Using a mobile phone on networkUsing a mobile phone on network Anywhere, anytimeAnywhere, anytime Enhance the existing registration methodEnhance the existing registration method Central database can updated in real timeCentral database can updated in real time Be convenient and efficientBe convenient and efficient

55

I. Introduction(3.1)I. Introduction(3.1)

Some challenges in traffic police Some challenges in traffic police mobile telecommunication:mobile telecommunication:

A.A. Client DevicesClient Devices• Small screenSmall screen• Mobile phone batteryMobile phone battery• Limited processing resources and storage Limited processing resources and storage

spacespace

B.B. Cellular NetworkCellular Network• The bandwidth limitationThe bandwidth limitation• Vulnerable to theft and loss Vulnerable to theft and loss

66

I. Introduction(3.2)I. Introduction(3.2)

C.C. Traffic Police Data Center (TPDC)Traffic Police Data Center (TPDC) Update real time simplyUpdate real time simply Responsibility timeResponsibility time SecuritySecurity

Client authenticationClient authentication Data encryptionData encryption Integrity Integrity

77

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

88

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

A.A. Mobile ClientMobile Client SIM card acts asSIM card acts as

A tampered resistant deviceA tampered resistant device A cryptographic deviceA cryptographic device Menu-driven applicationMenu-driven application

A specific PIN number activate the applicationA specific PIN number activate the application The SIMToolkit applicationThe SIMToolkit application

Packages all information into an encrypted mePackages all information into an encrypted message and sends it to the SG between GMSssage and sends it to the SG between GMS

99

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

B.B. Police Keys SeverPolice Keys Sever Main functionalities:Main functionalities:

A.A. Generation new keysGeneration new keysB.B. Issues Keys to the SG Issues Keys to the SG C.C. Maintains a database containing the valid Keys Maintains a database containing the valid Keys

and Revocation Lists (CRLs).and Revocation Lists (CRLs). For encryption and officer validation For encryption and officer validation

Symmetric encryption algorithmsSymmetric encryption algorithms

1010

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

B.B. Police Keys SeverPolice Keys Sever To reduce the risk of key transmissionsTo reduce the risk of key transmissions

A novel methodsA novel methods Changing of exclusive key two parties Changing of exclusive key two parties

periodicallyperiodically For security improvement For security improvement

A novel protocolA novel protocol Regard to Regard to

Offender driving license data in TPDCOffender driving license data in TPDC The police officerThe police officer

1111

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

A novel protocolA novel protocol

1212

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

B.B. Police Keys SeverPolice Keys Sever

1313

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

B.B. Police Keys SeverPolice Keys Sever Encrypt the first messageEncrypt the first message

Using TPDC issues the first keyUsing TPDC issues the first key

}) (),{H(_LicenseReq_Verify LicenseDrivingfID AESofficer

1414

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

1515

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

B.B. Police Keys SeverPolice Keys Sever This confirmation message consists:This confirmation message consists:

License confirmationLicense confirmation Daily_session_IDDaily_session_ID Data and timeData and time

1616

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

B.B. Police Keys SeverPolice Keys Sever

1717

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

B.B. Police Keys SeverPolice Keys Sever After issue traffic ticketAfter issue traffic ticket

A new key generationA new key generation The first key from TPDCThe first key from TPDC Any predetermined date from PODAny predetermined date from POD

Encrypt traffic ticket and Daily_session_IDEncrypt traffic ticket and Daily_session_IDAESfPOD} Old_Key, {New_Key

1818

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

C.C. Security GatewaySecurity Gateway

1919

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

C.C. Security GatewaySecurity Gateway The User Authentication Agent(UAA) moduThe User Authentication Agent(UAA) modu

lele The Access Point module (AP)The Access Point module (AP) The Cryptographic module (CU)The Cryptographic module (CU)

2020

II. The Mobile Traffic Police II. The Mobile Traffic Police Communication FoundationCommunication Foundation

D.D. DatabaseDatabase

2121

III. Improving Database III. Improving Database PerformancePerformance

Optimizing the databaseOptimizing the database Proposed Method for Database Proposed Method for Database

Performance TuningPerformance Tuning Officer search request distributed across Officer search request distributed across

multiple servers multiple servers A dispatcher do load balancingA dispatcher do load balancing Request for insert send to whole serversRequest for insert send to whole servers Request for search send to only one serverRequest for search send to only one server

2222

IV. Experimental Result(1)IV. Experimental Result(1)

2323

V. Conclusions(1)V. Conclusions(1)

With growth of infraction manual With growth of infraction manual method goes to be unusable. method goes to be unusable.

Police communicationPolice communication Security and be quickSecurity and be quick Anywhere, anytimeAnywhere, anytime

2424

V. Conclusions(2)V. Conclusions(2)

we propose a secure traffic police we propose a secure traffic police data centerdata center protect and establish their protect and establish their

communication in authentication and communication in authentication and confidentialityconfidentiality

Introduce our method tuningIntroduce our method tuning minimize the response timeminimize the response time

It can be extended to the other It can be extended to the other mobile information systemsmobile information systems

2525

ReferencesReferences

H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher Tehrani, M. A. Tavallaee, “Improving Response Time in Traf fie Police Infraction Registration System”, 2009 Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009)Monash University, Sunway campus, Malaysia, 25th &26th July 2009.