315,400 research outputs found

    Cyber-physical Threats and Vulnerabilities Analysis for Train Control and Monitoring Systems

    Get PDF
    IEEE ISNCC 2018, International Symposium on Networks, Computers and Communications, Rome, ITALIE, 19-/06/2018 - 21/06/2018Cyber-physical security is a major concern for the new generation of trains. In fact, trains are increasingly relying on automation, control and communication technologies in order to improve the efficiency and safety of their services as well as the comfort of passengers. This dependency introduces certainly new vulnerabilities and entry points to the system which exposes the system to new threat scenarios. This paper deals with cyber-physical security aspects of Train Control and Monitoring System

    Aquatic food security:insights into challenges and solutions from an analysis of interactions between fisheries, aquaculture, food safety, human health, fish and human welfare, economy and environment

    Get PDF
    Fisheries and aquaculture production, imports, exports and equitability of distribution determine the supply of aquatic food to people. Aquatic food security is achieved when a food supply is sufficient, safe, sustainable, shockproof and sound: sufficient, to meet needs and preferences of people; safe, to provide nutritional benefit while posing minimal health risks; sustainable, to provide food now and for future generations; shock-proof, to provide resilience to shocks in production systems and supply chains; and sound, to meet legal and ethical standards for welfare of animals, people and environment. Here, we present an integrated assessment of these elements of the aquatic food system in the United Kingdom, a system linked to dynamic global networks of producers, processors and markets. Our assessment addresses sufficiency of supply from aquaculture, fisheries and trade; safety of supply given biological, chemical and radiation hazards; social, economic and environmental sustainability of production systems and supply chains; system resilience to social, economic and environmental shocks; welfare of fish, people and environment; and the authenticity of food. Conventionally, these aspects of the food system are not assessed collectively, so information supporting our assessment is widely dispersed. Our assessment reveals trade-offs and challenges in the food system that are easily overlooked in sectoral analyses of fisheries, aquaculture, health, medicine, human and fish welfare, safety and environment. We highlight potential benefits of an integrated, systematic and ongoing process to assess security of the aquatic food system and to predict impacts of social, economic and environmental change on food supply and demand

    INFORMATIONAL WARFARE – INFLUENCE ON INFORMATIONAL STRUCTURES

    Get PDF
    The concept of information warfare encompasses the use of information and communication technologies to gain an advantage over a potential opponent. The information warfare is the manipulation with the information that trusts the goal, so that the goal should make decisions about its interests in the interests of opponents. Information structures are treated as systems that process different types of information, provide storage and access to users. Such structures may enclose neural networks, self-learning systems etc. They need to be ready to learn, respond to threats and ensure their safety, which is topical in today's information warfare. This paper will address aspects related to the security of information systems from a system theory point of view. The knowledge base of information structures can be elements of artificial intelligence, which security must be protected against various threats. The authors considers artificial neural networks to be one of the potential threats in the context of information warfare

    Informally connected: new institutionalist explanations for participation in informal networks

    Full text link
    "In recent years politicians and social scientists have become ever more concerned with citizens' participation in informal networks ('social participation'). From both fields, the state has theoretically been proposed as an important determinant of social participation. Differing state institutions would explain the large country level differences in the average level of social participation. This article studies the impact of a range of state institutions on participation in broad, informal networks. The editors distinguish two aspects of social participation: the quantity (the number of social meetings) and the quality (the character of the informal relationships in the form of help provision). Taking up a new institutionalist approach, they test three explanations that have been raised theoretically but have not - or not sufficiently - been tested empirically before. The crowding out thesis claims that a large welfare state undermines the role of informal networks as an economic safety net, and therefore has a detrimental effect on social participation. According to the economic safety thesis a large welfare state and economic prosperity at the national level will offer citizens the resources and financial security to look for self actualization through social participation. Finally, the safe refuge thesis claims that people who life in a hostile socio-political environment that gives them little civic autonomy in the public sphere will opt for participation outside of the public sphere - that is around secure ties in informal networks. They test these lines of reasoning in a multilevel research design on data of the European Social Survey 2002. They simultaneously test the impact of the social security, economic development, democracy, civil rights and state corruption on social participation. The crowding out thesis is refuted by the data: social security expenditure has no impact on social participation. Economic prosperity, on the other hand, stimulates social participation, which is in line with the economic safety thesis. The most important determinant of social participation, however, is the level of corruption in a society. In corrupt societies people have less social meetings and provide less help to others than in incorrupt societies." (author's abstract

    Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges

    Get PDF
    Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently. In order to show the feasibility of secure VC, certain implementations are required. In [1] we discuss the design of a VC security system that has emerged as a result of the European SeVeCom project. In this second paper, we discuss various issues related to the implementation and deployment aspects of secure VC systems. Moreover, we provide an outlook on open security research issues that will arise as VC systems develop from today's simple prototypes to full-fledged systems

    Safe and Secure Wireless Power Transfer Networks: Challenges and Opportunities in RF-Based Systems

    Full text link
    RF-based wireless power transfer networks (WPTNs) are deployed to transfer power to embedded devices over the air via RF waves. Up until now, a considerable amount of effort has been devoted by researchers to design WPTNs that maximize several objectives such as harvested power, energy outage and charging delay. However, inherent security and safety issues are generally overlooked and these need to be solved if WPTNs are to be become widespread. This article focuses on safety and security problems related WPTNs and highlight their cruciality in terms of efficient and dependable operation of RF-based WPTNs. We provide a overview of new research opportunities in this emerging domain.Comment: Removed some references, added new references, corrected typos, revised some sections (mostly I-B and III-C

    Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis

    Get PDF
    Systematic network monitoring can be the cornerstone for the dependable operation of safety-critical distributed systems. In this paper, we present our vision for informed anomaly detection through network monitoring and resilience measurements to increase the operators' visibility of ATM communication networks. We raise the question of how to determine the optimal level of automation in this safety-critical context, and we present a novel passive network monitoring system that can reveal network utilisation trends and traffic patterns in diverse timescales. Using network measurements, we derive resilience metrics and visualisations to enhance the operators' knowledge of the network and traffic behaviour, and allow for network planning and provisioning based on informed what-if analysis
    • 

    corecore