Toledo-Lucas County Port Authority

Status: Planned

Description

This element represents the management centers of the airports, ports and other intermodal facilities operated by Toledo–Lucas County Port Authority. Those management centers monitor and manage traffic and freight movements in and around their facilities and provide traveler information to the travelers and users of the facilities.

Stakeholders

StakeholderRoleRole Status
Toledo–Lucas County Port AuthorityOwnsPlanned

Physical Objects

Traffic Management Center
Transportation Information Center

Functional Objects

Functional ObjectDescriptionUser Defined
Center Data Subscription Management'Center Data Subscription Management' manages data subscriptions for an end user. It provides access to a catalog of available data, manages the necessary user information and rules that govern the data subscriptions, supports communications with data providers to collect data per the subscription rules, and makes the data available to the end user. It provides the local user interface through which a user can specify and manage subscriptions. It supports different mechanisms for collecting subscribed data for the end–user including one–time query–response as well as publish–subscribe services.False
Center Permission Management'Center Permission Management' enables Connected Vehicle system users to request permission to access connected vehicle services. A center may request permission for the center or the infrastructure devices and vehicles associated with the center.False
TIC Connected Vehicle Traveler Info DistributionIn support of connected vehicle applications, 'TIC Connected Vehicle Traveler Info Distribution' disseminates traveler information including traffic and road conditions, incident information, maintenance and construction information, event information, transit information, parking information, and weather information. Location–specific or situation–relevant traveler information is sent to short range communications transceivers at the roadside.False
TMC Barrier System Management'TMC Barrier System Management' remotely monitors and controls barrier systems for transportation facilities and infrastructure under control of center personnel. Barrier systems include automatic or remotely controlled gates, barriers and other access control systems. It also provides an interface to other centers to allow monitoring and control of the barriers from other centers (e.g., public safety or emergency operations centers).False
TMC Safeguard System Management'TMC Safeguard System Management' remotely monitors and controls safeguard systems for transportation facilities and infrastructure. Safeguard systems include blast shielding, exhaust systems and other automatic or remotely controlled systems intended to mitigate the impact of an incident. When access to a transportation facility is impacted by the activation of a safeguard system, impacted systems and travelers are notified.False

Physical Standards

Document NumberTitleDescription
ISO 21217Intelligent transport systems –– Communications access for land mobiles (CALM) –– ArchitectureISO 21217 describes the communications reference architecture of nodes called "ITS station units" designed for deployment in ITS communication networks. While it describes a number of ITS station elements, whether or not a particular element is implemented in an ITS station unit depends on the specific communication requirements of the implementation. It also describes the various communication modes for peer–to–peer communications over various networks between ITS communication nodes. These nodes may be ITS station units as described in the document or any other reachable nodes. ISO 21217 specifies the minimum set of normative requirements for a physical instantiation of the ITS station based on the principles of a bounded secured managed domain.
NEMA TS 8Cyber and Physical Security for Intelligent Transportation SystemsThis specification describes how agencies and other transportation infrastructure owner/operators should implement cyber– and physical–security for ITS.
NIST FIPS PUB 140–2Security Requirements for Cryptographic ModulesThis Federal Information Processing Standard (140–2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self–tests; design assurance; and mitigation of other attacks.

Interfaces To

(View Context Diagram)

City of Bowling Green EOC
Commercial Vehicles
Lucas County Emergency Operations Center
ODOT ATMS
Ohio Certification System
Ohio Cooperative ITS Credentials Management System
Ohio Event Streaming Platform
Ohio Object Registration and Discovery System
Private Weather Service Systems
Toledo–Lucas County Port Authority Connected Vehicle Roadside Equipment
Toledo–Lucas County Port Authority CV Authorizing Center
Toledo–Lucas County Port Authority CV Service Monitoring System
Toledo–Lucas County Port Authority Parking Management System
Traveler Information Devices
Wood County EOC