230
Views
13
CrossRef citations to date
0
Altmetric
Original Articles

Survey of Technologies for the Implementation of National‐scale Road User Charging

, &
Pages 499-523 | Received 21 Nov 2006, Accepted 11 Jan 2007, Published online: 02 Jul 2007
 

Abstract

This paper surveys the technologies available for constructing a pervasive, national‐scale road pricing system. It defines the different types of road pricing, the methods by which a vehicle’s position can be determined, and then examines possible pricing regimes in the context of their technological requirements and implications. The issue of enforcement and the distribution of pricing policies are considered, and further complexities are outlined. An examination of the security aspects of such systems is made, focusing particularly on the need to ensure privacy using technological, rather than solely procedural, methods. The survey concludes that a pervasive, national‐scale deployment is unlikely to be technically achievable in the short‐term.

Acknowledgements

The authors would like to thank Jonathan Davies and the anonymous reviewers for their helpful comments on the manuscript, Ramsey Farragher for his expertise in mobile handset location techniques, and Andy Hopper for his support of the work.

Notes

1. This paper uses the terms interchangeably, though some authors distinguish between them (Walker, Citation2005).

7. Multilateration is the calculation of the position of an object by measuring the time difference of arrival of a signal that the object emits at three or more separate receivers.

8. Note that it might not be economically viable to charge for countryside roads, depending on the technology used. However, this might push traffic onto them. Any scheme should take this issue into account.

11. A situation in which an attacker floods a server with a large number of requests, causing there to be very limited resources for serving requests from legitimate users.

12. In the case of mobile telephony and debit cards, alternative technologies do exist, e.g. phone systems have been designed with anonymizing proxies (Kesdogan et al., Citation1996). However, they have not been made widely available as an alternative.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.