Blog

  • 02.18.16
  • No Comments

Delcan Technologies operates at the intersection of transportation and technology. We combine a diverse mix of hardware and software that works seamlessly together to solve complex transportation problems, reduce costs, provide greater efficiency and keep projects running smoothly.

We are focused on multiple technology fronts, including ITS solutions based on NTCIP (National Transportation Communication for ITS Protocol), Mobile Data Collection and Tracking (MDC) and our Advanced Traffic Management System (ATMS), Intelligent NETworks.

NTCIP

NTCIP is a standard protocol for allowing traffic management systems to talk to intelligent transportations systems field devices such as: dynamic message signs, CCTV cameras, vehicle detection sensors, traffic signals, road weather information stations (RWIS), along with many other types of roadway devices. We provide solutions for the testing, upgrading and communicating with NTCIP compliant devices and central systems. We offer our comprehensive NTCIP expertise to manufacturers, agencies and transportation departments (DOTs) through:

  • NTCIP Testing services
  • Advising on software and NTCIP conformance issues
  • Designing NTCIP translators for existing field devices
  • Providing NTCIP specification compliance advice
  • Consulting for our hardware and software components
  • Training in NTCIP fundamentals
  • Evaluating legacy systems to ascertain their suitability for NTCIP conversion

Delcan Technologies has a talented, multi-disciplined team that is skilled in understanding ITS systems and software. We are a voting member of the Joint Committee for NTCIP standards and have been a leading member of the standards development process, playing an active role in the management and revision of the standards. Today DTI is generally acknowledged as the leading NTCIP expert in North America.

Mobile Data Collection and Tracking

Another arm of Delcan Technologies focuses on mobile data collection (MDC). One of the most expensive and labor-intensive operations performed by many states during the winter months is snow removal and roadway treatment. The mobile data tracking system by Delcan Technologies allows for the collection of real-time information on vehicle speed and spread rates, blade positions, roadway conditions and additional information on snow plow activity.

The MDC system increases safety and saves money by managing vehicle wear and tear and reducing overtime hours. It also lowers the number of road re-treatments and, in doing so, limits the amount of salt usage and reduces harmful emissions that are damaging to the environment.

A Mobile Data Collector (MDC) is placed on the vehicle you want to monitor, such as a snowplow. The MDC is configured to collect data from various sensors on the vehicle including plow blade position, road and air temperature, spreader rate, engine diagnostic information, and more. The data is then transmitted to the central system which processes the raw data and converts it into easy to understand information. Reports help provide a clear understanding of your fleet and the weather conditions in specific areas.

Delcan Technologies has the staff and expertise to manage the integration of MDC devices into your fleet. Our software team can customize the data collectors to work within your existing ATMS, and the entire installation can be modified to fit your unique environment.

Delcan is a world leader in design and implementation and is involved in all stages of deployment as a consultant, system developer, and contractor. For more information contact us here.



  • 02.04.16
  • No Comments

NTCIP is a widely deployed and accepted protocol for transportation communications within the United States and abroad. As the range of NTCIP continues to expand, protecting and securing transportation networks powered by NTCIP is becoming more important.

Why secure NTCIP?

There are multiple threats that every computer network faces. Automated programs and viruses frequently seek any system that is open to attack, regardless of whether it is a DOT system or not. These are not necessarily targeted attacks; they are simply individuals seeking to wreak havoc. Attacks on NTCIP based networks can also be premeditated. When a DOT system is compromised, and someone else gains control, the system can be shut down, sign messages can be manipulated, and driver safety is put at risk.

Four categories of security

The National Electrical Manufacturer Association (NEMA) Cyber Security Group has been tasked with exploring security concerns as they relate to ITS products. The group, headed by Delcan Technologies team member Russ Brookshire, is addressing standards for devices and the enclosures in which they are housed. Their goal is to establish prevention and mitigation techniques as well as to develop a method to rate security performance.

As NEMA works to identify all possible ways in which a system can be compromised, they are also looking at what steps can be taken to prevent those breaches in security. The standard is being created around four levels of security:

Physical Security

Physical security looks at the actual device to determine how well it is secured. Is the cabinet locked? Who has possession of the keys and is there a formal process when someone with key access is terminated? We assume that these safeguards are in place, but in order to create a secure system, these formal processes must be followed in every instance.

Local Access Security

Local access security addresses the field procedure once a person opens the sign cabinet. Is there immediate access or is there local password control? Is that level of security able to be bypassed?

Communication Security

Communication security deals with the method of information transfer. NTCIP offers basic security features, so it’s important to look for additional ways to secure the system. Are you passing data across a cellular network? Is it part of a public network or is it a private network? Is there a way to limit access?

Central System Security

Central system security includes the security of the actual application, which, among other things, controls the signs, monitors the cameras and reports traffic speed. This level deals with controlling access to the server and client computers, and ensuring that any security information kept on these computers is encrypted. In addition, this level of security addresses the system that controls the network of computers, and is normally handled by the IT department.

Is security a concern?

ITS security concerns are valid, but incidents are not a frequent occurrence. Occasionally there are instances of a breach, but security across any system is paramount. It’s important to have full control when you need to communicate or gather valuable information, whether that’s on an ordinary day or in a state of emergency.