Commercial Vehicle OBE --> Fleet and Freight Management Center:
route deviation alert
This triple is bi-directional. See also
Fleet and Freight Management Center --> Commercial Vehicle OBE: route deviation alert
Definitions
route deviation alert (Information Flow): An alert that indicates a deviation from a planned route has been detected. The alert will contain the current Commercial Vehicle location and identity.
Commercial Vehicle OBE (Source Physical Object): The Commercial Vehicle On-Board Equipment (OBE) resides in a commercial vehicle and provides the sensory, processing, storage, and communications functions necessary to support safe and efficient commercial vehicle operations. It provides two-way communications between the commercial vehicle drivers, their fleet managers, attached freight equipment, and roadside officials. A separate 'Vehicle OBE' physical object supports vehicle safety and driver information capabilities that apply to all vehicles, including commercial vehicles. The Commercial Vehicle OBE supplements these general ITS capabilities with capabilities that are specific to commercial vehicles.
Fleet and Freight Management Center (Destination Physical Object): The 'Fleet and Freight Management Center' provides the capability for commercial drivers and fleet-freight managers to receive real-time routing information and access databases containing vehicle and/or freight equipment locations as well as carrier, vehicle, freight equipment and driver information. The 'Fleet and Freight Management Center' also provides the capability for fleet managers to monitor the safety and security of their commercial vehicle drivers and fleet.
Included In
This Triple is in the following Service Packages:
This triple is associated with the following Functional Objects:
This Triple is described by the following Functional View Data Flows:
This Triple has the following triple relationships:
None |
Communication Solutions
- (None-Data) - Secure Wireless Internet (EU) (32)
- (None-Data) - Secure Wireless Internet (ITS) (32)
Selected Solution
Solution Description
ITS Application Entity
Development needed |
Click gap icons for more info.
|
||
Mgmt
|
Facilities
Development needed |
Security
|
|
TransNet
|
|||
Access
|
Note that some layers might have alternatives, in which case all of the gap icons associated with every alternative may be shown on the diagram, but the solution severity calculations (and resulting ordering of solutions) includes only the issues associated with the default (i.e., best, least severe) alternative.
Characteristics
Characteristic | Value |
---|---|
Time Context | Recent |
Spatial Context | Local |
Acknowledgement | True |
Cardinality | Unicast |
Initiator | Source |
Authenticable | True |
Encrypt | True |
Interoperability | Description |
---|---|
Local | In cases where an interface is normally encapsulated by a single stakeholder, interoperability is still desirable, but the motive is vendor independence and the efficiencies and choices that an open standards-based interface provides. |
Security
Information Flow Security | ||||
---|---|---|---|---|
Confidentiality | Integrity | Availability | ||
Rating | High | High | Moderate | |
Basis | Notification that a HAZMAT has left its route is potentially important data considering the negative consequences of a HAZMAT event, and as such must be correct and timely in delivery. Such information, if widely available, would provide a target for hostile actors and so should also be concealed, which is why confidentilaity is HIGH. | Notification that a HAZMAT has left its route is potentially important data considering the negative consequences of a HAZMAT event, and as such must be correct and timely in delivery. Such information, if widely available, would provide a target for hostile actors and so should also be concealed, which is why confidentilaity is HIGH. | Notification that a HAZMAT has left its route is potentially important data considering the negative consequences of a HAZMAT event, and as such must be correct and timely in delivery. Such information, if widely available, would provide a target for hostile actors and so should also be concealed, which is why confidentilaity is HIGH. Availability is MODERATE however because there could be other mechanisms for learning this information. If there is no other way to get this information, availability might be HIGH. |
Security Characteristics | Value |
---|---|
Authenticable | True |
Encrypt | True |