345 resultados para countermeasures
Resumo:
The fatality and injury rate of motorcyclists per registered vehicle are higher than those of other motor vehicles by 13 and 7 times respectively. The crash involvement rate of motorcyclists as a victim party is 58% at intersections and as an offending party is 67% at expressways. Previous research efforts showed that the motorcycle safety programs are not very effective in improving motorcycle safety. This is perhaps due to inefficient design of safety program as specific causal factors may not be well explored. The objective of this study is to propose more sophisticated countermeasures and awareness programs for improving motorcycle safety after analyzing specific causal factors for motorcycle crashes at intersections and expressways. Methodologically this study applies the binary logistic model to explore the at-fault or not-at-fault crash involvement of motorcyclists at those locations. A number of explanatory variables representing roadway characteristics, environmental factors, motorcycle descriptions, and rider demographics have been evaluated. Results shows that the night time crash occurrence, presence of red light camera, lane position, rider age, licence class, and multivehicle collision significantly affect the fault of motorcyclists involved in crashes at intersections. On the other hand, the night time crash occurrence, lane position, speed limit, rider age, licence class, engine capacity, riding with pillion passenger, foreign registered motorcycles, and multivehicle collision has been found to be significant at expressways. Legislate to wear reflective clothes and using reflective markings on the motorcycles and helmets are suggested as an effective countermeasure for reducing their vulnerability. The red light cameras at intersections reduce the vulnerability of motorcycles and hence motorcycle flow and motorcycle crashes should be considered during installation of red light cameras. At signalized intersections, motorcyclists may be taught to follow correct movement and queuing rather than weaving through the traffic as it leads them to become victims of other motorists. The riding simulators in the training centers can be useful to demonstrate the proper movement and queuing at junctions. Riding with pillion passenger and excess speed at expressways are found to significantly influence the at at-fault crash involvement of the motorcyclists. Hence the motorcyclists should be advised to concentrate more on riding while riding with pillion passenger and encouraged to avoid excess speed at expressways. Very young and very older group of riders are found to be at-fault than middle aged groups. Hence this group of riders should be targeted for safety improvement. This can be done by arranging safety talks and programs in motorcycling clubs in colleges and universities as well as community riding clubs with high proportion of elderly riders. It is recommended that the driving centers may use the findings of this study to include in licensure program to make motorcyclists more aware of the different factors which expose the motorcyclists to crash risks so that more defensive riding may be needed.
Resumo:
Sleep-related and fatigue-related driving is an important contributory factor in fatal and serious injury crashes - Accounts for approx 19% - Similar in magnitude to drink driving
Resumo:
The prevalence of impaired driving in Australia Regulatory approaches used to manage: – Alcohol impaired driving – Other drug impaired driving Key countermeasures – Lower blood alcohol limits – Random breath testing (RBT) – Random drug testing (RDT) Ongoing challenges and future directions
Resumo:
The state of the practice in safety has advanced rapidly in recent years with the emergence of new tools and processes for improving selection of the most cost-effective safety countermeasures. However, many challenges prevent fair and objective comparisons of countermeasures applied across safety disciplines (e.g. engineering, emergency services, and behavioral measures). These countermeasures operate at different spatial scales, are funded often by different financial sources and agencies, and have associated costs and benefits that are difficult to estimate. This research proposes a methodology by which both behavioral and engineering safety investments are considered and compared in a specific local context. The methodology involves a multi-stage process that enables the analyst to select countermeasures that yield high benefits to costs, are targeted for a particular project, and that may involve costs and benefits that accrue over varying spatial and temporal scales. The methodology is illustrated using a case study from the Geary Boulevard Corridor in San Francisco, California. The case study illustrates that: 1) The methodology enables the identification and assessment of a wide range of safety investment types at the project level; 2) The nature of crash histories lend themselves to the selection of both behavioral and engineering investments, requiring cooperation across agencies; and 3) The results of the cost-benefit analysis are highly sensitive to cost and benefit assumptions, and thus listing and justification of all assumptions is required. It is recommended that a sensitivity analyses be conducted when there is large uncertainty surrounding cost and benefit assumptions.
Resumo:
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.
Resumo:
Computer worms represent a serious threat for modern communication infrastructures. These epidemics can cause great damage such as financial losses or interruption of critical services which support lives of citizens. These worms can spread with a speed which prevents instant human intervention. Therefore automatic detection and mitigation techniques need to be developed. However, if these techniques are not designed and intensively tested in realistic environments, they may cause even more harm as they heavily interfere with high volume communication flows. We present a simulation model which allows studies of worm spread and counter measures in large scale multi-AS topologies with millions of IP addresses.
Resumo:
Motorcyclists and scooter riders are among the most vulnerable road users, across APEC. This report assesses the potential road safety measures that can be used to address these issues and selects measures that could feasibly and effectively be implemented across the Asia Pacific Economic Communities (APEC). The scope of the report is confined to on-road motorcycle riding. While the numbers of injuries resulting from off-road riding (including as part of farm work) are likely to be substantial based on data from other states, many of the issues and measures to reduce trauma in off-road riding would be quite different. A previous report described important motorcycle and scooter safety issues across APEC economies and any current barriers that might exist in implementing potentially effective countermeasures.
Resumo:
The most effective countermeasures to driver sleepiness (caffeine and a nap, ideally in combination) are not the most popular choice for UK drivers. Groups susceptible to driver sleepiness (OSA patients and truck drivers) do not favour effective countermeasures to driver sleepiness. Prior experience of driver sleepiness does not promote an effective choice of countermeasure.
Resumo:
Driver sleepiness is a major contributor to road crashes. The current study sought to examine the association between perceptions of effectiveness of six sleepiness countermeasures and their relationship with self-reports of continuing to drive while sleepy among 309 drivers after controlling for the influence of age, sex, motivation for driving sleepy, and risk perception of sleepy driving. The results demonstrate that the variables of age, sex, motivation, and risk perception were significantly associated with self-reports of continuing to drive while sleepy and only one countermeasure was associated with self-reports of continuing to drive while sleepy. Further, it was found that age differences in self-reports of continuing to drive while sleepy was mediated by participants’ motivation and risk perception. These findings highlight modifiable factors that could be focused on with interventions that seek to modify drivers’ attitudes and behaviours of driving while sleepy.
Resumo:
The impairing effect from sleepiness is a major contributor to road crashes. The ability of a sleepy driver to perceive their level of sleepiness is an important consideration for road safety as well as the type of sleepiness countermeasure used by drivers as some sleepiness countermeasures are more effective than others. The aims of the current study were to determine the extent that the signs of driver sleepiness were associated with sleepy driving behaviours, as well as determining which individual factors (demographic, work, driving, and sleep-related factors) were associated with using a roadside or in-vehicle sleepiness countermeasure. A sample of 1518 Australian drivers from the Australian State of New South Wales and the neighbouring Australian Capital Territory took part in the study. The participants’ experiences with the signs of sleepiness were reasonably extensive. A number of the early signs of sleepiness (e.g., yawning, frequent eye blinks) were related with continuing to drive while sleepy, with the more advanced signs of sleepiness (e.g., difficulty keeping eyes open, dreamlike state of consciousness) associated with having a sleep-related close call. The individual factors associated with using a roadside sleepiness countermeasure included age (being older), education (tertiary level), difficulties getting to sleep, not continuing to drive while sleepy, and having experienced many signs of sleepiness. The results suggest that these participants have a reasonable awareness and experience with the signs of driver sleepiness. Factors related to previous experiences with sleepiness were associated with implementing a roadside countermeasure. Nonetheless, the high proportions of drivers performing sleepy driving behaviours, suggest that concerted efforts are needed with road safety campaigns regarding the dangers of driving while sleepy.
Resumo:
Detection and prevention of global network satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.
Resumo:
The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.
Resumo:
In this paper.. the status and limits in the development of the silicon microelectronics industry are presented briefly. The key countermeasures given are use of the new structure materials and the new device structures.
Resumo:
We describe a pre-processing correlation attack on an FPGA implementation of AES, protected with a random clocking countermeasure that exhibits complex variations in both the location and amplitude of the power consumption patterns of the AES rounds. It is demonstrated that the merged round patterns can be pre-processed to identify and extract the individual round amplitudes, enabling a successful power analysis attack. We show that the requirement of the random clocking countermeasure to provide a varying execution time between processing rounds can be exploited to select a sub-set of data where sufficient current decay has occurred, further improving the attack. In comparison with the countermeasure's estimated security of 3 million traces from an integration attack, we show that through application of our proposed techniques that the countermeasure can now be broken with as few as 13k traces.