2,700 research outputs found

    HETEROGENEOUS DATA AND PROBABILISTIC SYSTEM MODEL ANALYSES FOR ENHANCED SITUATIONAL AWARENESS AND RESILIENCE OF CRITICAL INFRASTRUCTURE SYSTEMS

    Get PDF
    The protection and resilience of critical infrastructure systems (CIS) are essential for public safety in daily operations and times of crisis and for community preparedness to hazard events. Increasing situational awareness and resilience of CIS includes both comprehensive monitoring of CIS and their surroundings, as well as evaluating CIS behaviors in changing conditions and with different system configurations. Two frameworks for increasing the monitoring capabilities of CIS are presented. The proposed frameworks are (1) a process for classifying social media big data for monitoring CIS and hazard events and (2) a framework for integrating heterogeneous data sources, including social media, using Bayesian inference to update prior probabilities of event occurrence. Applications of both frameworks are presented, including building and evaluating text-based machine learning classifiers for identifying CIS damages and integrating disparate data sources to estimate hazards and CIS damages. Probabilistic analyses of CIS vulnerabilities with varying system parameters and topologies are also presented. In a water network, the impact of varying parameters on component performance is evaluated. In multiple, small-size water networks, the impacts of system topology are assessed to identify characteristics of more resilient networks. This body of work contributes insights and methods for monitoring CIS and assessing their performance. Integrating heterogeneous data sources increases situational awareness of CIS, especially during or after failure events, and evaluating the sensitivity of CIS outcomes to changes in the network facilitates decisions for CIS investments and emergency response.Ph.D

    A safety assessment framework for Automatic Dependent Surveillance Broadcast (ADS-B) and its potential impact on aviation safety

    Get PDF
    The limitations of the current civil aviation surveillance systems include a lack of coverage in some areas and low performance in terms of accuracy, integrity, continuity and availability particularly in high density traffic areas including airports, with a negative impact on capacity and safety. Automatic Dependent Surveillance Broadcast (ADS-B) technology has been proposed to address these limitations by enabling improved situational awareness for all stakeholders and enhanced airborne and ground surveillance, resulting in increased safety and capacity. In particular, its scalability and adaptability should facilitate its use in general aviation and in ground vehicles. This should, in principle, provide affordable, effective surveillance of all air and ground traffic, even on airport taxiways and runways, and in airspace where radar is ineffective or unavailable. The success of the progressive implementation of ADS-B has led to numerous programmes for its introduction in other parts of the World where the operational environment is considerably different from that of Australia. However, a number of critical issues must be addressed in order to benefit from ADS-B, including the development and execution of a safety case that addresses both its introduction into legacy and new systems’ operational concepts, the latter including the Single European Sky (SES) / Single European Sky ATM Research (SESAR) and the US’ Next Generation Air Transportation System (NexGEN). This requires amongst others, a good understanding of the limitations of existing surveillance systems, ADS-B architecture and system failures and its interfaces to the existing and future ATM systems. Research on ADS-B to date has not addressed in detail the important questions of limitations of existing systems and ADS-B failure modes including their characterisation, modelling and assessment of impact. The latter is particularly important due to the sole dependency of ADS-B on GNSS for information on aircraft state and its reliance on communication technologies such as Mode-S Extended Squitter, VHF Data Link Mode-4 (VDLM4) or Universal Access Transceiver (UAT), to broadcast the surveillance information to ground-based air traffic control (ATC) and other ADS-B equipped aircraft within a specified range, all of which increase complexity and the potential for failures. This thesis proposes a novel framework for the assessment of the ADS-B system performance to meet the level of safety required for ground and airborne surveillance operations. The framework integrates various methods for ADS-B performance assessment in terms of accuracy, integrity, continuity, availability and latency, and reliability assessment using probabilistic safety assessment methods; customized failure mode identification approach and fault tree analysis. Based on the framework, the thesis develops a failure mode register for ADS-B, identifies and quantifies the impact of a number of potential hazards for the ADS-B. Furthermore, this thesis identifies various anomalies in the onboard GNSS system that feeds aircraft navigation information into the ADS-B system. Finally, the thesis maps the ADS-B data availability and the quantified system performance to the envisioned airborne surveillance application’s requirements. The mapping exercise indicates that, the quantified ADS-B accuracy is sufficient for all applications while ADS-B integrity is insufficient to support the most stringent application: Airborne Separation (ASEP). In addition, some of the required performance parameters are unavailable from aircraft certified to DO-260 standard. Therefore, all aircraft must be certified to DO-260B standard to support the applications and perform continuous monitoring, to ensure consistency in the system performance of each aircraft.Open Acces

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well

    Towards Deterministic Communications in 6G Networks: State of the Art, Open Challenges and the Way Forward

    Full text link
    Over the last decade, society and industries are undergoing rapid digitization that is expected to lead to the evolution of the cyber-physical continuum. End-to-end deterministic communications infrastructure is the essential glue that will bridge the digital and physical worlds of the continuum. We describe the state of the art and open challenges with respect to contemporary deterministic communications and compute technologies: 3GPP 5G, IEEE Time-Sensitive Networking, IETF DetNet, OPC UA as well as edge computing. While these technologies represent significant technological advancements towards networking Cyber-Physical Systems (CPS), we argue in this paper that they rather represent a first generation of systems which are still limited in different dimensions. In contrast, realizing future deterministic communication systems requires, firstly, seamless convergence between these technologies and, secondly, scalability to support heterogeneous (time-varying requirements) arising from diverse CPS applications. In addition, future deterministic communication networks will have to provide such characteristics end-to-end, which for CPS refers to the entire communication and computation loop, from sensors to actuators. In this paper, we discuss the state of the art regarding the main challenges towards these goals: predictability, end-to-end technology integration, end-to-end security, and scalable vertical application interfacing. We then present our vision regarding viable approaches and technological enablers to overcome these four central challenges. Key approaches to leverage in that regard are 6G system evolutions, wireless friendly integration of 6G into TSN and DetNet, novel end-to-end security approaches, efficient edge-cloud integrations, data-driven approaches for stochastic characterization and prediction, as well as leveraging digital twins towards system awareness.Comment: 22 pages, 8 figure

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well

    INTEROPERABILITY FOR MODELING AND SIMULATION IN MARITIME EXTENDED FRAMEWORK

    Get PDF
    This thesis reports on the most relevant researches performed during the years of the Ph.D. at the Genova University and within the Simulation Team. The researches have been performed according to M&S well known recognized standards. The studies performed on interoperable simulation cover all the environments of the Extended Maritime Framework, namely Sea Surface, Underwater, Air, Coast & Land, Space and Cyber Space. The applications cover both the civil and defence domain. The aim is to demonstrate the potential of M&S applications for the Extended Maritime Framework, applied to innovative unmanned vehicles as well as to traditional assets, human personnel included. A variety of techniques and methodology have been fruitfully applied in the researches, ranging from interoperable simulation, discrete event simulation, stochastic simulation, artificial intelligence, decision support system and even human behaviour modelling
    • 

    corecore