Abstract:Managing the frequent traffic congestion (traffic jams) of the road networks of large cities is a major challenge for municipal traffic management organizations. In order to manage these situations, it is crucial to understand the processes that lead to congestion and propagation, because the occurrence of a traffic jam does not merely paralyze one street or road, but could spill over onto the whole vicinity (even an entire neighborhood). Solutions can be found in professional literature, but they either overs… Show more
“…Other areas of applications include any kinds of IoT [19] and/or LoRaWAN systems [20], where IPv6 may be needed in the access network due to the high number of devices, but some legacy devices still need IPv4 support. Further important application segment is the intelligent transportation systems in smart cities [21] The double translation mechanism of 464XLAT proved its effectiveness in terms of IPv4 literals communications over IPv6 infrastructure. However, it has some security issues and vulnerabilities such as DoS attack possibility.…”
Section: B Significance Of Our Resultsmentioning
confidence: 99%
“…Other areas of applications include any kinds of IoT [19] and/or LoRaWAN systems [20], where IPv6 may be needed in the access network due to the high number of devices, but some legacy devices still need IPv4 support. Further important application segment is the intelligent transportation systems in smart cities [21] for the same reason.…”
This paper focuses on one of the most prominent IPv6 transition technologies named 464XLAT. The aim is to analyze the security threats that this technology might face. After carrying out the threat analysis using STRIDE method that stands for Spoofing, Tampering, Repudiation, Information Disclosure and Elevation of Privilege, and using DFD (Data-Flow Diagram) as a core for the analysis, we summarized the security vulnerabilities and attack points possibilities within this infrastructure. We have also built a testbed for 464XLAT topology using several virtual machines, which were created using Debian image. We used our testbed to perform DoS (Denial of Service) attack against the PLAT (provider-side translator) and monitor PLAT’s performance and the number of packets being translated under attack by different number of clients using the hping3 command.
“…Other areas of applications include any kinds of IoT [19] and/or LoRaWAN systems [20], where IPv6 may be needed in the access network due to the high number of devices, but some legacy devices still need IPv4 support. Further important application segment is the intelligent transportation systems in smart cities [21] The double translation mechanism of 464XLAT proved its effectiveness in terms of IPv4 literals communications over IPv6 infrastructure. However, it has some security issues and vulnerabilities such as DoS attack possibility.…”
Section: B Significance Of Our Resultsmentioning
confidence: 99%
“…Other areas of applications include any kinds of IoT [19] and/or LoRaWAN systems [20], where IPv6 may be needed in the access network due to the high number of devices, but some legacy devices still need IPv4 support. Further important application segment is the intelligent transportation systems in smart cities [21] for the same reason.…”
This paper focuses on one of the most prominent IPv6 transition technologies named 464XLAT. The aim is to analyze the security threats that this technology might face. After carrying out the threat analysis using STRIDE method that stands for Spoofing, Tampering, Repudiation, Information Disclosure and Elevation of Privilege, and using DFD (Data-Flow Diagram) as a core for the analysis, we summarized the security vulnerabilities and attack points possibilities within this infrastructure. We have also built a testbed for 464XLAT topology using several virtual machines, which were created using Debian image. We used our testbed to perform DoS (Denial of Service) attack against the PLAT (provider-side translator) and monitor PLAT’s performance and the number of packets being translated under attack by different number of clients using the hping3 command.
“…When a road meets the above two conditions, it is a congested road. The failed edges are e (8,13), e (8,4), e (9, 14), e (9, 10), e (9, 8), e (14,15), e (14,18), e (14,13), e (15,19), e (15,16), e (15,10), and e (18,19). The values of these failed roads are represented in red in Figure 4.…”
Section: Congestion Analysismentioning
confidence: 99%
“…Task sequence e (9,14) , e (9,10) , e (8,9) , e (8,4) , e (8,13) , e (13,14) 1 e (9,14) , e (9,10) , e (8,4) , e (13,14) , e (8,13) 2 e (8,9) , e (9,10) 3 e (9,14) , e (9,10) , e (8,4) , e (13,14) , e (8,13) , e (8,9) 150 times…”
Section: Timesunclassified
“…Much research work has been conducted on different aspects to avoid road congestion, such as traffic flow propagation [3][4][5], traffic congestion prediction [6][7][8][9], and the correlation of traffic congestion [10,11]. But it is inevitable that road congestion can propagate to adjacent nodes in an urban road network [12].…”
Urban road networks have promoted high-quality travel for residents by increasing connectivity and intelligence. But road congestion has not been effectively alleviated, causing a loss of time and energy. At present, the recovery of urban road networks mainly considers removing the failed edges. Considering the recovery cost and time, it is important to take active maintenance behavior to restore these networks. One of the key problems is dispatching traffic workers reasonably to achieve timely maintenance. In this paper, a flow-distribution-based process and execution (FD-PE) model is established for solving congestion. The maintenance centers (MC) study the reasons for and spread of congestion by edge flow. Based on the genetic algorithm (GA), two models of maintenance for urban road networks are developed, which include a single MC-centered dispatching plan and the co-scheduling of MCs. Both models aim at minimizing recovery time and allocating maintenance resources. The road network in Zhengzhou is borrowed as a case to explain the feasibility of the proposed models. The results show that on the premise of dividing network regions, it is reasonable to take a single MC to recover congestion. Compared with a single MC, the co-scheduling of MCs may save more time.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.