Other METR Discrepancy Handling Systems --> METR Discrepancy Handling System:
discrepancy suppression information

This triple is bi-directional. See also METR Discrepancy Handling System --> Other METR Discrepancy Handling Systems: discrepancy suppression information

Definitions

discrepancy suppression information (Information Flow): Once a METR Regulation Center has been alerted to a discrepancy, it may wish to suppress further notices in one of two ways. If it still wants vehicles to gather data but for that data not to be submitted except on request, it can use discrepancy suppression info flow to prevent METR Discrepancy Handling Centers from issuing consolidated discrepancy reports (but the newly gathered information is still available through the detailed flow). Alternatively, the METR Regulation Center can revise the associated rule meta-data to inform vehicles that a discrepancy with the rule is already known and that discrepancy reports should not be provided for the rule. This mechanism uses the centralized and localized rule distribution services. Furthermore, the METR Regulation Center may wish to inform other METR Discrepancy Handling Centers to correspondingly suppress further notices of those suppressed discrepancies.

Other METR Discrepancy Handling Systems (Source Physical Object): Depending on deployments scenarios, a discrepancy report might be passed among multiple levels of Discrepancy Handling Systems. For example, a vehicle might be configured to report all its detected discrepancies to an OEM-operated Discrepancy Handling Center. This allows the OEM to become aware of potential problems with its discrepancy detection logic.
Once established thresholds are met, the OEM-operated Discrepancy Handling System might notify a Discrepancy Handling Center operated by a jurisdictional entity. The jurisdictional Discrepancy Handling System can then determine when the METR Regulation System is notified of the reported discrepancies.

METR Discrepancy Handling System (Destination Physical Object): The 'METR Discrepancy Handling System' receives reports of discrepancies in rules from METR User Systems. It will perform a numerical analysis of discrepancy count vs. time for any given rule, and when warranted, report to the METR Regulation Center those rules with sufficient discrepancy reports to justify further investigation. It is identified as a separate center to provide a level of anonymity for the user that reports the issue. The METR Discrepancy Handling Center may register its availability as a service, and its associated cyber location information, with the Object Registration and Discovery System (ORDS).

Included In

This Triple is in the following Service Packages:

This triple is associated with the following Functional Objects:

This Triple is described by the following Functional View Data Flows:

This Triple has the following triple relationships:

Communication Solutions

Solutions are sorted in ascending Gap Severity order. The Gap Severity is the parenthetical number at the end of the solution.

Selected Solution

METR: Discrepancy Reporting Requirements - Secure Internet (ITS)

Solution Description

This solution is used within Canada, the E.U. and the U.S.. It combines standards associated with METR: Discrepancy Reporting Requirements with those for I-I: Secure Internet (ITS). The METR: Discrepancy Reporting Requirements standards include upper-layer standards required to exchange traffic regulation discrepancies with a discrepancy handling center. The I-I: Secure Internet (ITS) standards include lower-layer standards that support secure communications between ITS equipment using X.509 or IEEE 1609.2 security certificates.

ITS Application Entity
Mind the gapMind the gap

ISO 24315-7
ISO 24315-8
Click gap icons for more info.

Mgmt
Facilities
Mind the gap

(None)
Security
Mind the gapMind the gap
TransNet
Access

Internet Subnet Alternatives
TransNet TransNet

TempBCL2 TempSTDL2

TempBCL3 TempSTDL3

TempBCL4 TempSTDL4

TempBCL5 TempSTDL5

Access Access

TempBCL2 TempSTDL2

TempBCL3 TempSTDL3

TempBCL4 TempSTDL4

TempBCL5 TempSTDL5

ITS Application ITS Application

TempBCL2 TempSTDL2

TempBCL3 TempSTDL3

TempBCL4 TempSTDL4

TempBCL5 TempSTDL5

Mgmt Mgmt

TempBCL2 TempSTDL2

TempBCL3 TempSTDL3

TempBCL4 TempSTDL4

TempBCL5 TempSTDL5

Facility Facility

TempBCL2 TempSTDL2

TempBCL3 TempSTDL3

TempBCL4 TempSTDL4

TempBCL5 TempSTDL5

Security Security

TempBCL2 TempSTDL2

TempBCL3 TempSTDL3

TempBCL4 TempSTDL4

TempBCL5 TempSTDL5

Note that some layers might have alternatives, in which case all of the gap icons associated with every alternative may be shown on the diagram, but the solution severity calculations (and resulting ordering of solutions) includes only the issues associated with the default (i.e., best, least severe) alternative.

Characteristics

Characteristic Value
Time Context Recent
Spatial Context Regional
Acknowledgement True
Cardinality Unicast
Initiator Source
Authenticable True
Encrypt True


Interoperability Description
Regional Interoperability throughout the geopolitical region is highly desirable, but if implemented differently in different transportation management jurisdictions, significant benefits will still accrue in each jurisdiction. Regardless, this Information Flow Triple should be implemented consistently within a transportation jurisdiction (i.e., the scope of a regional architecture).

Security

Information Flow Security
  Confidentiality Integrity Availability
Rating Moderate Moderate Moderate
Basis Discrepancy-handling flows may contain a significant amount of discrepancy reporting information, which could imply behavior in the field, actions of rules-agents and other activities that could be leveraged by bad actors. Information contained in this flow will be used to assess the accuracy of existing rules; this will require some process that strips out incorrect reports, but the number of incorrect reports should be minimized to reduce undue processing. Backoffice discrepancy handling flows should be basically reliable, else the discrepancy handling system will have difficulty functioning, which in turn could lead to negative safety or other impacts in the field.


Security Characteristics Value
Authenticable True
Encrypt True