2,700 research outputs found
HETEROGENEOUS DATA AND PROBABILISTIC SYSTEM MODEL ANALYSES FOR ENHANCED SITUATIONAL AWARENESS AND RESILIENCE OF CRITICAL INFRASTRUCTURE SYSTEMS
The protection and resilience of critical infrastructure systems (CIS) are essential for public safety in daily operations and times of crisis and for community preparedness to hazard events. Increasing situational awareness and resilience of CIS includes both comprehensive monitoring of CIS and their surroundings, as well as evaluating CIS behaviors in changing conditions and with different system configurations. Two frameworks for increasing the monitoring capabilities of CIS are presented. The proposed frameworks are (1) a process for classifying social media big data for monitoring CIS and hazard events and (2) a framework for integrating heterogeneous data sources, including social media, using Bayesian inference to update prior probabilities of event occurrence. Applications of both frameworks are presented, including building and evaluating text-based machine learning classifiers for identifying CIS damages and integrating disparate data sources to estimate hazards and CIS damages. Probabilistic analyses of CIS vulnerabilities with varying system parameters and topologies are also presented. In a water network, the impact of varying parameters on component performance is evaluated. In multiple, small-size water networks, the impacts of system topology are assessed to identify characteristics of more resilient networks. This body of work contributes insights and methods for monitoring CIS and assessing their performance. Integrating heterogeneous data sources increases situational awareness of CIS, especially during or after failure events, and evaluating the sensitivity of CIS outcomes to changes in the network facilitates decisions for CIS investments and emergency response.Ph.D
A safety assessment framework for Automatic Dependent Surveillance Broadcast (ADS-B) and its potential impact on aviation safety
The limitations of the current civil aviation surveillance systems include a lack of coverage in some areas and low performance in terms of accuracy, integrity, continuity and availability particularly in high density traffic areas including airports, with a negative impact on capacity and safety. Automatic Dependent Surveillance Broadcast (ADS-B) technology has been proposed to address these limitations by enabling improved situational awareness for all stakeholders and enhanced airborne and ground surveillance, resulting in increased safety and capacity. In particular, its scalability and adaptability should facilitate its use in general aviation and in ground vehicles. This should, in principle, provide affordable, effective surveillance of all air and ground traffic, even on airport taxiways and runways, and in airspace where radar is ineffective or unavailable.
The success of the progressive implementation of ADS-B has led to numerous programmes for its introduction in other parts of the World where the operational environment is considerably different from that of Australia. However, a number of critical issues must be addressed in order to benefit from ADS-B, including the development and execution of a safety case that addresses both its introduction into legacy and new systemsâ operational concepts, the latter including the Single European Sky (SES) / Single European Sky ATM Research (SESAR) and the USâ Next Generation Air Transportation System (NexGEN). This requires amongst others, a good understanding of the limitations of existing surveillance systems, ADS-B architecture and system failures and its interfaces to the existing and future ATM systems. Research on ADS-B to date has not addressed in detail the important questions of limitations of existing systems and ADS-B failure modes including their characterisation, modelling and assessment of impact. The latter is particularly important due to the sole dependency of ADS-B on GNSS for information on aircraft state and its reliance on communication technologies such as Mode-S Extended Squitter, VHF Data Link Mode-4 (VDLM4) or Universal Access Transceiver (UAT), to broadcast the surveillance information to ground-based air traffic control (ATC) and other ADS-B equipped aircraft within a specified range, all of which increase complexity and the potential for failures.
This thesis proposes a novel framework for the assessment of the ADS-B system performance to meet the level of safety required for ground and airborne surveillance operations. The framework integrates various methods for ADS-B performance assessment in terms of accuracy, integrity, continuity, availability and latency, and reliability assessment using probabilistic safety assessment methods; customized failure mode identification approach and fault tree analysis. Based on the framework, the thesis develops a failure mode register for ADS-B, identifies and quantifies the impact of a number of potential hazards for the ADS-B. Furthermore, this thesis identifies various anomalies in the onboard GNSS system that feeds aircraft navigation information into the ADS-B system. Finally, the thesis maps the ADS-B data availability and the quantified system performance to the envisioned airborne surveillance applicationâs requirements. The mapping exercise indicates that, the quantified ADS-B accuracy is sufficient for all applications while ADS-B integrity is insufficient to support the most stringent application: Airborne Separation (ASEP). In addition, some of the required performance parameters are unavailable from aircraft certified to DO-260 standard. Therefore, all aircraft must be certified to DO-260B standard to support the applications and perform continuous monitoring, to ensure consistency in the system performance of each aircraft.Open Acces
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well
Towards Deterministic Communications in 6G Networks: State of the Art, Open Challenges and the Way Forward
Over the last decade, society and industries are undergoing rapid
digitization that is expected to lead to the evolution of the cyber-physical
continuum. End-to-end deterministic communications infrastructure is the
essential glue that will bridge the digital and physical worlds of the
continuum. We describe the state of the art and open challenges with respect to
contemporary deterministic communications and compute technologies: 3GPP 5G,
IEEE Time-Sensitive Networking, IETF DetNet, OPC UA as well as edge computing.
While these technologies represent significant technological advancements
towards networking Cyber-Physical Systems (CPS), we argue in this paper that
they rather represent a first generation of systems which are still limited in
different dimensions. In contrast, realizing future deterministic communication
systems requires, firstly, seamless convergence between these technologies and,
secondly, scalability to support heterogeneous (time-varying requirements)
arising from diverse CPS applications. In addition, future deterministic
communication networks will have to provide such characteristics end-to-end,
which for CPS refers to the entire communication and computation loop, from
sensors to actuators. In this paper, we discuss the state of the art regarding
the main challenges towards these goals: predictability, end-to-end technology
integration, end-to-end security, and scalable vertical application
interfacing. We then present our vision regarding viable approaches and
technological enablers to overcome these four central challenges. Key
approaches to leverage in that regard are 6G system evolutions, wireless
friendly integration of 6G into TSN and DetNet, novel end-to-end security
approaches, efficient edge-cloud integrations, data-driven approaches for
stochastic characterization and prediction, as well as leveraging digital twins
towards system awareness.Comment: 22 pages, 8 figure
Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)
This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well
INTEROPERABILITY FOR MODELING AND SIMULATION IN MARITIME EXTENDED FRAMEWORK
This thesis reports on the most relevant researches performed during the years of the Ph.D. at the Genova University and within the Simulation Team. The researches have been performed according to M&S well known recognized standards. The studies performed on interoperable simulation cover all the environments of the Extended Maritime Framework, namely Sea Surface, Underwater, Air, Coast & Land, Space and Cyber Space. The applications cover both the civil and defence domain. The aim is to demonstrate the potential of M&S applications for the Extended Maritime Framework, applied to innovative unmanned vehicles as well as to traditional assets, human personnel included. A variety of techniques and methodology have been fruitfully applied in the researches, ranging from interoperable simulation, discrete event simulation, stochastic simulation, artificial intelligence, decision support system and even human behaviour modelling
- âŠ