City and County Maintenance Vehicles
Status: Planned
Description
Represents the ITS equipment, such as mobile data terminals, in the maintenance vehicles that are dispatched by the maintenance departments for local municipalities and counties.
Stakeholders
Physical Objects
Functional Objects
Functional Object | Description | User Defined |
---|
ITS Management Support | 'ITS Management Support' provides management of the ITS Object. This includes management of regulatory information and policies, management of application processes, management of communication system configuration and update management, communications in | False |
---|
ITS Security Support | 'ITS Security Support' provides communications and system security functions to the ITS Object, including privacy protection functions. It may include firewall, intrusion management, authentication, authorization, profile management, identity management, | False |
---|
MCV Environmental Monitoring | 'MCV Environmental Monitoring' collects current road and surface weather conditions from sensors on–board the maintenance and construction vehicle or by querying fixed sensors on or near the roadway. Environmental information including road surface tempe | False |
---|
MCV Roadway Maintenance and Construction | 'MCV Roadway Maintenance and Construction' includes the on–board systems that support routine non–winter maintenance on a roadway system or right–of–way. Routine maintenance includes landscape maintenance, hazard removal (roadway debris, dead animals), r | False |
---|
MCV Vehicle Location Tracking | 'MCV Vehicle Location Tracking' monitors vehicle location and reports the position and timestamp information to the dispatch center. | False |
---|
MCV Vehicle Safety Monitoring | 'MCV Vehicle Safety Monitoring' detects vehicle intrusions in the vicinity of the vehicle and warns crew workers and drivers of imminent encroachment. Crew movements are also monitored so that the crew can be warned of movement beyond the designated safe | False |
---|
MCV Vehicle System Monitoring and Diagnostics | 'MCV Vehicle System Monitoring and Diagnostics' includes on–board sensors capable of monitoring the condition of each of the vehicle systems and diagnostics that can be used to support vehicle maintenance. The status of the vehicle and ancillary equipmen | False |
---|
MCV Winter Maintenance | 'MCV Winter Maintenance' supports snow plow operations and other roadway treatments (e.g., salt spraying and other material applications). It supports communications with the center to receive information and instructions that are provided to the vehicle | False |
---|
MCV Work Zone Support | 'MCV Work Zone Support' provides communications and support for local management of a work zone. It supports communications between field personnel and the managing center to keep the center appraised of current work zone status. It controls vehicle–mou | False |
---|
Physical Standards
Document Number | Title | Description |
---|
ISO 21217 | Intelligent transport systems –– Communications access for land mobiles (CALM) –– Architecture | ISO 21217 describes the communications reference architecture of nodes called "ITS station units" designed for deployment in ITS communication networks. While it describes a number of ITS station elements, whether or not a particular element is implemented in an ITS station unit depends on the specific communication requirements of the implementation. It also describes the various communication modes for peer–to–peer communications over various networks between ITS communication nodes. These nodes may be ITS station units as described in the document or any other reachable nodes. ISO 21217 specifies the minimum set of normative requirements for a physical instantiation of the ITS station based on the principles of a bounded secured managed domain. |
---|
NIST FIPS PUB 140–2 | Security Requirements for Cryptographic Modules | This Federal Information Processing Standard (140–2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self–tests; design assurance; and mitigation of other attacks. |
---|
Interfaces To
(View Context Diagram)