8 ◾ Advances in Communications-Based Train Control Systems
for an extensive training and periodical refresh of system operators on the recovery
procedures must also be considered.
With the emerging services over open industrial, scientic, and medical radio bands
(i.e., 2.4 and 5.8GHz) and the potential disruption over critical CBTC services, there
is an increasing pressure in the international community to reserve a frequency band
specically for radio-based urban rail systems. Such decision would help standardize
CBTC systems across the market and ensure availability for those critical systems.
Another challenge lies in systems with poor line-of-sight or spectrum/bandwidth
limitations. A larger than anticipated number of transponders may be required to
enhance the service. is is usually more of an issue with applying CBTC to existing
transit systems in tunnels that were not designed from the outset to support it. An
alternate method to improve system availability in tunnels is the use of leaky feeder
cable that, while having higher initial costs, achieves a more reliable radio link.
As a CBTC system is required to have high availability and, particularly, allows
for a graceful degradation, a secondary method of signaling might be provided to
ensure some level of nondegraded service upon partial or complete CBTC unavail-
ability. is is particularly relevant for browneld implementations (lines with an
already existing signaling system) where the infrastructure design cannot be con-
trolled and the coexistence with legacy systems is required, at least, temporarily.
Security is another big concern in CBTC systems. ere are many risks in CBTC
systems needed to be considered seriously due to the distinctive features of CBTC,
including open wireless transmission medium, nomadic trains, and lack of dedicated
infrastructure of security protection. erefore, in addition to the vulnerabilities and
threats of traditional wireless-based systems, the involvement of intelligence in CBTC
presents new security challenges. For many security issues, authentication is an impor-
tant requirement, which is crucial for integrity, condentiality, and nonrepudiation. In
addition, the experience in security of traditional wired and wireless networks indicates
the importance of multilevel protections because there are always some weak points
in the system, no matter what is used for prevention-based approaches (e.g., authen-
tication). is is especially true for CBTC systems, given the low physical security
autonomous functions of trains. To solve this problem, detection-based approaches
[e.g., intrusion detection systems (IDSs)], serving as the second wall of protection,
can eectively help identify malicious activities. Both prevention-based and detection-
based approaches need to be carefully studied for CBTC systems.
In addition, there is the probability of human error and improper application of
recovery procedures if the system becomes unavailable. erefore, it is important to
enhance the operator’s safety education and training, ensuring safe operation of trains.
1.5 Projects of CBTC Systems
CBTC technology has been (and is being) successfully implemented for a variety of
applications. Table 1.1 summarizes the main radio-based CBTC systems deployed
around the world as well as those ongoing projects being developed [4]. ey range