Link Type: Wide Area Wireless
Personal Information Device --> Transportation Information Center:
shared use confirmation
Definitions
shared use confirmation (Information Flow): Confirmation that traveler is going to use the shared use asset now or at a future time.
Personal Information Device (Source Physical Object): The 'Personal Information Device' provides the capability for travelers to receive formatted traveler information wherever they are. Capabilities include traveler information, trip planning, and route guidance. Frequently a smart phone, the Personal Information Device provides travelers with the capability to receive route planning and other personally focused transportation services from the infrastructure in the field, at home, at work, or while en-route. Personal Information Devices may operate independently or may be linked with vehicle on-board equipment. This subsystem also supports safety related services with the capability to broadcast safety messages and initiate a distress signal or request for help.
Transportation Information Center (Destination Physical Object): The 'Transportation Information Center' collects, processes, stores, and disseminates transportation information to system operators and the traveling public. The physical object can play several different roles in an integrated ITS. In one role, the TIC provides a data collection, fusing, and repackaging function, collecting information from transportation system operators and redistributing this information to other system operators in the region and other TICs. In this information redistribution role, the TIC provides a bridge between the various transportation systems that produce the information and the other TICs and their subscribers that use the information. The second role of a TIC is focused on delivery of traveler information to subscribers and the public at large. Information provided includes basic advisories, traffic and road conditions, transit schedule information, yellow pages information, ride matching information, and parking information. The TIC is commonly implemented as a website or a web-based application service, but it represents any traveler information distribution service.
Included In
This Triple is in the following Service Packages:
- None
This Triple is in the following Functional Objects:
- None
This Triple is described by the following Functional View Data Flows:
This Triple has the following triple relationships:
None |
Communication Solutions
-
(None-Data) - Secure Wireless Internet (EU) (32)
-
(None-Data) - Secure Wireless Internet (ITS) (32)
-
(None-Data) - Apache Kafka over Wireless (36)
-
(None-Data) - OMG DDS over Wireless (36)
-
(None-Data) - OASIS MQTT over Wireless (42)
-
(None-Data) - OASIS AMQP over Wireless (45)
Selected Solution

Solution Description
ITS Application Entity
![]() Development needed ![]() |
Click gap icons for more info.
|
||
Mgmt
Apache Zookeeper ![]() |
Facilities
![]() ![]() Development needed ![]() Apache Kafka ![]() Apache Zookeeper ![]() |
Security
IETF RFC 8446 ![]() |
|
TransNet
|
|||
Access
![]() ![]() ![]() |
Note that some layers might have alternatives, in which case all of the gap icons associated with every alternative may be shown on the diagram, but the solution severity calculations (and resulting ordering of solutions) includes only the issues associated with the default (i.e., best, least severe) alternative.
Characteristics
Characteristic | Value |
---|---|
Time Context | Recent |
Spatial Context | Regional |
Acknowledgement | True |
Cardinality | Unicast |
Initiator | Source |
Authenticable | True |
Encrypt | True |
Interoperability | Description |
---|---|
National | This triple should be implemented consistently within the geopolitical region through which movement is essentially free (e.g., the United States, the European Union). |
Security
Information Flow Security | ||||
---|---|---|---|---|
Confidentiality | Integrity | Availability | ||
Rating | Moderate | Moderate | Moderate | |
Basis | Will include some kind of identifier to manage the reservation, which is linked ot an individual and thus related to PII. | If this is corrupted or modified the initiator may not receive his shared use booking. | If this service is not available then the shared use item won't be reserved, lessening its utility and failing to provide the service the PID user needs. |
Security Characteristics | Value |
---|---|
Authenticable | True |
Encrypt | True |