Download presentation
Presentation is loading. Please wait.
Published byKenya Chill Modified over 9 years ago
1
15-02-2013 INGV-CNIT-NOA-EO Plenary meeting – First year activities Short Wave critical Infrastructure Network based on new Generation of high survival radio communication system With the support of the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme European Commission - Directorate-General Home Affairs
2
SWING SWING The proposed project deals with the study and design of a system of HF radio connection among European Critical Infrastructure (ECIs) and/or Controlling Governmental Agencies (CGAs) that replace broad band transmission able to survive in any adverse conditions and terrorist attack. Starting date - 01-01-2012 Duration- 24 Months Methodology- Share the activities in four Working Groups (WGs) where each WG is involved in the tasks of the project as better specified below. Partnership- INGV, CNIT, NOA, OE
3
ACTIVITIES-- BY WHOM AND--DELIVERABLES 1- Interface with EU authorities and coordination.INGV M1 - M24 Jan 2012- Dec 2013 Communications and Internal Report
4
ACTIVITIES-- BY WHOM AND--DELIVERABLES 2-Technical analysis of the communication problems related to the identification and designation of CIs in the interested area. INGV - CNIT M1 – M9 Sep 2012 Technical Report 3- Determination of the topology of high survival radio communication network. INGV - CNIT M1 – M9 Sep 2012 Technical Report 4- Characterization of the minimal amount of information necessary for the survival of the CIs communication. INGV - CNIT M10 – M13 Jan 2013 Technical Report 5- Operative supervision of the network architecture.INGV - CNIT M13 – M16 Apr 2013 Technical Report
5
ACTIVITIES-- BY WHOM AND--DELIVERABLES ACTIVITIES-- BY WHOM AND--DELIVERABLES 6-Analysis of the existing architecture of HF communication based on internet protocol access with reference to the above considered infrastructures. CNIT M1 – M6 Jun 2012 Technical Report 7-Analysis of existing HF connection system in terms of software and hardware for internet connection. CNIT M1 – M6 Jun 2012 Technical Report 8- Definition of the High survival HF radio network technical requirements. CNIT M1 – M6 Jun 2012 Technical Report 9 - Radio network system design.CNIT M9 – M12 Dec 2012 Technical Report 10-Criteria of early warning alert and procedures to activate the back up network. CNITM10 – M12 Dec 2012 Technical Report
6
ACTIVITIES-- BY WHOM AND--DELIVERABLES 11-Monthly prediction of the hourly HF set of frequencies over the n radio links given by the network, based on the available ionospheric model and methods. INGV, EO M13 – M16 Apr 2013 Technical Report 12-Daily forecasting of the hourly HF set of frequencies based on the Mediterranean ionospheric measurements. INGV, EO M13 – M16 Apr 2013 Technical Report 13-Ground wave propagation analysis when required.INGV M20 – M24 December 2013 Technical Report 14-Frequency management system for HF communication link optimization. INGV, EOM20 – M24 December 2013 Technical Report
7
ACTIVITIES-- BY WHOM AND--DELIVERABLES 15-Identification of the professional profile able to maintain and operate network. INGV,CNI T, NOA, EO M22 - M24 December 2013 Technical Report 16-Dissemination of deliverables within communities informing about initiatives organised in the context of the project. INGV,CNI T, NOA, EO M22 - M24 December 2013 Technical Report 17-Professional training activities through courses, workshops and conferences. INGV,CNI T, NOA, EO M22 - M24 December 2013 Technical Report 18-Assessment of the potential impact and feasibility of the project for ECIs and CGAs and final recommendations for the EC. INGV,CNI T, NOA, EO M22 - M24 December 2013 Technical Report
8
ACTIVITIES-- BY WHOM AND--DELIVERABLES 19-Realization of a demonstrator constituted by 4- terminals HF network. INGV,CNITM1 - M24 December 2013 (Realization of the demonstrator)
9
Gantt’s diagram Gantt’s diagram Act. M1M2M3M4M5M6M7M8M9M10M11M12M13M14M15M16M17M18M19M20M21M22M23M24 1- xxxxxxxxxxxxxxxxxxxxxxxx 2- xxxxxxxxx 3- xxxxxxxxx 4- xxxx 5- xxxx 6- xxxxxx 7- xxxxxx 8- xxxxxx 9- xxxxxxxxxxxx 10- xxxx 11- xxxx 12- xxxx 13- xxxxx 14- xxxxx 15- xxx 16- xxx xxx 17- xxx xxx 18- xxx 19- xxxxxxxxxxxxxxxxxxxxxxxx
10
Activity 2 Technical analysis of the communication problems related to the identification and designation of CIs in the interested area The Justice and Home Affairs Council was invited by the Commission to make a program for European critical infrastructure protection (EPCIP) mainly taking into account threats of terrorism. Subsequently the Council adopted conclusions on which of the Member States have the ultimate responsibility for EPCIP program giving also elements to manage arrangements to establish procedures for the identification and the designation of European critical infrastructures (ECIs) within their national borders.
11
The Directive 2008/114/EC of 8 December 2008 One of the point of the Directive is the interest to focused only on the energy and transport sectors. Hence, on this basis, the energy and transport sectors have to be considered strategically important and identified and designed as ECIs which protection responsibility falls on the Member States and the owners/operators of such infrastructures. Energy Electricity Oil Gas Transport Road transport Rail transport Air transport Inland waterways transport Ocean and short-sea shipping and ports
12
ECIs (Ports - Coast Guards) At this stage for our purpose we individuate three ports located in Barcelona (Spain), Palermo (Italy) and Pireo (Athens-Greece). Selected site Latitude (degrees) Longitude (degrees) Azimuth (degrees) Distance from CGA (km) CGA – Rome41.8812.480 0 ECI – Cefalù38.0314.05163 452 ECI – Pireo37.9523.63111 1059 ECI – Barcelona41.382.17270 867
13
Reference scenario and radio links among ECIs and CGAs.
14
Internet criticality of ECIS and CGAS Security threats began more and more sophisticated. The numerous kind of threats and intrusions to the web services include a huge variety of Malware which infect users computers, leakage of personal information, fishing by means of subtle messages and other kind of attacks like Denial-of-services (DoS) and Distributed Denial of Services (DDoS). The most common malware codes include viruses, worms, Trojan horses, spyware, trap doors and logic bombs. Rootkits Phishing Adware (often pop-up banners) KEYLOGGERs BOTNET The hacker typically uses one compromised machine as the ‘master’ and co- ordinates the attack across other, so-called ‘zombie’, machines. DDoS is the dangerous threat / attack
15
Activity 3 - Determination of the topology of high survival radio communication network - We referred to two main aspects of the topology: physical and logical. In fact network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or HF radio network.linksnodescomputerHF radio In our case this report the physical topology deals with the placement of the network's various components, like: HF device location and radio link establishment.physical topology
16
Physical topology Concerning the physical topology we referred to a complex scenario constituted by ECIs and CGAs as in figure where the CGAs can be 3, 4 … N and the ECIs can be mN. Extended Hybrid HF network
17
Reduced HF network to be employed in the demonstrator
18
HF link
19
Logical topology The logical topology shows how data flows within a network, regardless of its physical design i.e. mapping the data flow between the components determines the logical topology of the network. Teams of Siena and Pisa produced a technical reports on this subject.logical topology
20
Activity 4 - Characterization of the minimal amount of information necessary for the survival of the CIs communication. Recognition of the activities, function and organization of the ECIs and CGA Risks assessment and simulation of the scenario in case of internet fault Minimum amount data to transfer in case of internet fault
21
Organization and function of ECIs and CGAs Italian Coast Guards and Maritime Direction (Hellenic and Spanish Coast Guards have approximately the same functions)
22
Risks assessment and simulation of the scenario in case of internet fault Assessments identify assets and identify which are most critical identify, characterize, and assess threats assess the vulnerability of critical assets to specific threats determine the risk (i.e. the expected consequences of specific types of attacks on specific assets) Using Assessments to Identify and Prioritize Risk Reduction Activities identify and characterize ways to reduce those risks prioritize risk reduction activities based on a risk reduction strategy
23
Minimum amount data to transfer in case of internet fault In the following only one among the numerous functions of the CDO and CG is considered. The function examined is the control of maritime traffic. In this context the Operative Room (OR) of the CGA receives data from 100 VHF transponders concerning the traffic of the vessels in the Mediterranean Sea under the control of Italian CGA (or CDO).
24
Minimum information content between a vessel and OR of the Coast Guards AIS-VTS /Vessel information Average length in alphanumeric characters (and bit number) Alphanumeric Identifying Code of the AIS-VTS10 (80) Vessel name10 (80) Coordinate of the vessel10 (80) Nationality10 (80) Vessel owner10 (80) Port of departure10 (80) Port of arrival10(80) Cargo of the vessel10(80) Captain Commander10 (80) Emergency supplementary text8 (80) Estimate amount including control characters≈ 100 Byte (1kbit)
25
Activity 19 - Realization of a demonstrator HF network constituted by 4 terminals. The realization of the demonstrator concerns a HF radio network in a reduced simulated scenario where the ECIs are placed on the three Coast Guards and an unique CGA. The four HF terminals in the Mediterranean area are represented in the following figure.
26
4 POINTS HF network with central node
27
HF transmitting/receiving point
28
Mother board for software defined radio USRP N210 USRP N210
29
TX Daughter boards for software defined radio
30
RX Daughter boards for software defined radio
31
500 W Power amplifier
32
Software defined radio (TX-terminal)
33
Software defined radio (RX-terminal)
34
Antenna system in Rome
35
Acronyms CIPS – “Prevention, Preparedness and Consequence Management of Terrorism and other Security related Risks“ CNIT- Consorzio Nazionale Inter-universitario per le Telecomunicazioni ECIs - European Critical Infrastructures EO – Ebro Observatory CGAs - Controlling Governmental Agencies HF – High Frequency INGV – Istituto Nazionale di Geofisica e Vulcanologia NOA - National Observatory of Athens SW - Short Wave SWING - Short Wave critical Infrastructure Network based on new Generation of high survival radio communication system
36
Thanks for your attention
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.