SlideShare a Scribd company logo
EWSN 2015 - 12th European Conference on Wireless Sensor Networks
INDUSTRY SESSION, February 9th 2015, Porto, Portugal
Experimenting Secure WSN for
Railway Surveillance
Francesco Flammini
The company
ASTS is a leading international technology
company which specializes in railway
signaling and integrated transport systems
for mass-transit, passenger and freight rail
operations.
www.ansaldo-sts.com
2
The rail and mass-transit security business
• Prevention, detection and counteraction of
vandalisms, thefts, sabotage, terrorism, etc.
• Use of smart-technologies for intrusion detection
and surveillance, including audio-video content
analytics
• Relatively new business for companies
developing railway and mass-transit systems
• Several succesful installations worldwide
(Metrocampania, Copenhagen Cityringen, Abu
Dhabi, etc.)
3
Flammini, F., Gaglione, A., Mazzocca, N., Pragliola, C., “Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures”,
In: Proc. 3rd International Workshop on Critical Information Infrastructures Security (CRITIS’08), Frascati (Rome), Italy, October 13-15, 2008, pp. 213-223.
Physical Security Information Management (PSIM)
4Bocchetti, G., Flammini, F., Pappalardo, A., Pragliola, C.: Dependable integrated surveillance systems for the physical security of metro railways. In: Proc. 3rd
ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC 2009), 30 August - 2 September, 2009, Como (Italy): pp. 1-7
Towards WSN for rail surveillance: opportunities & issues
PROS:
• Low-cost devices (also low or no cabling costs) measuring several environmental parameters that can be indicative of
physical threats
• Resilience to physical attacks due to easy to implement mesh topology and absence of both power and data cables
• Possibly “Plug’n’play”, easily maintainable and scalable
CONS:
• Radio connection (“open” network) vulnerable to interferences and attacks (jamming, hacking, etc.)
• No “ruggedized” hardware
• Limitation in power, memory and other resources -> power/resource-aware security
5Flammini, F., Gaglione, A., Ottello, F., Pappalardo, A., Pragliola, C., Tedesco, A.: Towards Wireless Sensor Networks for Railway Infrastructure Monitoring. In: Proc.
ESARS 2010, pp. 1--6, Bologna, Italy (2010)
Integrating and fusing heterogeneous sensors
6
Flammini, F., Gaglione, A., Mazzocca, N., Moscato, V., Pragliola, C., “Wireless Sensor Data Fusion for Critical Infrastructure Security”, In: Advances in Soft Computing
Vol. 53: Proc. International Workshop on Computational Intelligence in Security for Information Systems (CISIS’08), Genoa, Italy, October 23-24, 2008, pp. 92-99.
DETECT Engine
Alarm level
(1, 2, 3, ...)
Detected
attack
scenario
Event
History
Scenario
Repository
The SHIELD framework
• nSHIELD (New SHIELD) is a EU project co-
funded by the ARTEMIS JOINT UNDERTAKING
(Sub-programme SP6) focused on the research
of SPD (Security, Privacy, Dependability) in the
context of Embedded Systems.
• The nSHIELD consortium comprises 5
manufacturers and system integrators (ASTS,
ETH, HAI, ISL, SES), 7 universities (MGEP,
UNIGE, UNIROMA1, UNIUD, TUC, SICS, S-
LAB,), 10 SMEs (AT, TECNALIA, ALFA, ISD,
MAS, NOOM, T2D, TELC, THYIA, SknFnd) and 2
Industrial R&D organizations (SESM, ATHENA).
pSHIELD
Start/end: 01.06.2010 – 31.12.2011
Costs: whole project 5,4 M€
nSHIELD
Start/end: 01.11.2011 – 31.10.2014
Costs: whole project 13 M€
7Fiaschetti, A., Lavorato, F., Suraci, V., Palo, A., Taglialatela, A., Morgagni, A., Baldelli, R., Flammini, F.: On the Use of Semantic Technologies to Model and Control
Security, Privacy and Dependability in Complex Systems. In: Proc. SAFECOMP 2011, pp: 467-479
The pSHIELD rail experimentation: architecture
8Casola, V.; Esposito, M.; Mazzocca, N.; Flammini, F., "Freight Train monitoring: A Case-Study for the pSHIELD Project," Innovative Mobile and Internet Services in
Ubiquitous Computing (IMIS), 2012 Sixth International Conference on , vol., no., pp.597,602, 4-6 July 2012
The pSHIELD experimentation: functionalities
9
The pSHIELD experimentation: security
10
A security attack has been simulated in which an intruder node tries to intercept the
ECDH protocol in order to pick up private information. Since the master node knows the
nodes participating in the protocol and by their ID Number (established at system
deployment), it becomes aware of an intrusion, then it immediately toggles a red led and
stops the communication.
 It allows to establish a shared secret key for channel encryption and a mechanism to achieve broadcast authentication
of query messages sent by the master to the motes through the ECDSA protocol.
 The cryptosystem is based on the WM-ECC library, a publicly available open source implementation of a 160-bit ECC
(Elliptic curve cryptography) cryptosystem.
A mechanism for key exchanging
(between the master and the
motes) based on the ECDH
protocol has been implemented.
The nSHIELD experimentation: architecture
11
The nSHIELD experimentation: methodology
12
“Safety-world heritage” approach:
- reference railway norms and international standards (CENELEC EN501XX)
- semi(formal) methods like state-based testing already used for ERTMS/ETCS functional verification
- “hardware-in-the-loop” simulation environment with threat-injection capabilities
CENELEC EN 50159 Keywords
Keyword Meaning
Repetition A message is received more than once
Deletion A message is removed from a message stream
Insertion A new message is implanted in the message
stream
Resequencing Messages are received in an unexpected
sequence
Corruption The information contained in a message is
changed, casually or not
Delay Messages are received at a time later than
intended
Masquerade A non-authentic message is designed thus to
appear to be authentic (an authentic message
means a valid message in which the
information is certificated as originated from
an authenticated data source)
The nSHIELD experimentation: SPD prototypes
13
Protot.
number
Prototype name
16 Reputation-Based Secure Routing
19 Policy Based Management Framework
20 Control Algorithms
22 Middleware Intrusion Detection System
24 Network Layer Security
25 OSGI Middleware
26 Semantic Model
32 Secure Discovery
33 Security Agent
Security System
-Node_Number
WSN_2
-Node_Number
WSN_1
Middleware
Smart Camera
1 -is part of*
1
-is part of*
-includes1
-is part of*
1 -is part of*
Threat
Bad mounthing
Node Failure
Unauthorized Data Access
Middleware Intrusion
Black Hole
Node Intrusion
Countermeasure
-State
-SPD_value
Prototype 19
-State
-SPD_value
Prototype 24
-State
-SPD_Value
Prototype 16
-State
-SPD_Value
Prototype 22
is installed on
is installed on
is installed on
is installed on
is conteracted by
is effective againist
is conteracted by
is effective against
is counteracted by
is effective against
is conteracted by is effective against
is conteracted byis effective against
is counteracted by is effective against
The nSHIELD experimentation: demonstration scenario
14
STEP Description
System
Status
SPD norm Level
2
In WSN_1 a bad mouthing attack has occurred. The middleware is informed that an attack is
occurring and it sends a command to the smart camera to activate its security mechanisms. The
SPD level decreases.
WSN_1: Bad mouthing attack
WSN_2: Encryption 64 bits
Smart Camera: Messaging - no protection
MDW_IDS: Normal
State_03 0
VERY LOW
3
The smart camera improves its SPD functionality and SPD level increases.
WSN_1: Bad mouthing attack
WSN_2: Encryption 64 bits
Smart Camera: Messaging - Authentication & Integrity
MDW_IDS: Normal
State_19 0,3
LOW
Lessons learnt, conclusions & future developments
• The usage of WSN in railways is very promising and enables novel real-time monitoring scenarios for
many surveillance and diagnostic applications
• Data security issues can be effectively addressed by the recent research and technological developments
• Several other issues need to be addressed in real-world scenarios to ensure feasibility, like:
• Appropriate enclosures and certification for use on-board
• Installation & maintenance procedures, compliant with railway norms and best-practices
• Energy harvesting options (solar, wind, vibrations, thermal, etc.)
• In fact, railway operators are interested in low-cost, plug’n’play, easy to maintain, reliable, safe and secure
systems… something that is not so easy to achieve at the current state of research and technology!
• While several issues have been already solved regarding data integration and security, still further efforts
are needed for the final industralisation of general-purpose WSN-based solutions for railway applications
15
Hodge, V.J.; O'Keefe, S.; Weeks, M.; Moulds, A., "Wireless Sensor Networks for Condition Monitoring in the Railway Industry: A Survey,
"Intelligent Transportation Systems, IEEE Transactions on , vol.PP, no.99, pp.1,19
THANK YOU FOR YOUR ATTENTION

More Related Content

What's hot

TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
IJCNCJournal
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
IJNSA Journal
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
ijcsa
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentationUshnish Chowdhury
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
IJERA Editor
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
LogicMindtech Nologies
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
Baggam Sailusha
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)CSCJournals
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
IJNSA Journal
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
IJECEIAES
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
JPINFOTECH JAYAPRAKASH
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
ijwmn
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksZainab Nayyar
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
LogicMindtech Nologies
 

What's hot (17)

TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 

Viewers also liked

Kadane's continuous subarray algorithm
Kadane's continuous subarray algorithmKadane's continuous subarray algorithm
Kadane's continuous subarray algorithm
arunodhaya80
 
Datos Del Sistema Solar
Datos Del Sistema SolarDatos Del Sistema Solar
Datos Del Sistema Solarmontemorcillo
 
Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.montemorcillo
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...ketaki19deshmukh
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor Networks
Torsten Braun, Universität Bern
 
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksReliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Torsten Braun, Universität Bern
 
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
Francesco Flammini
 
SOFA communication protocol (EWSN 2014)
SOFA communication protocol (EWSN 2014)SOFA communication protocol (EWSN 2014)
SOFA communication protocol (EWSN 2014)Marco Cattani
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
Mshari Alabdulkarim
 

Viewers also liked (12)

Uiui444
Uiui444Uiui444
Uiui444
 
Kadane's continuous subarray algorithm
Kadane's continuous subarray algorithmKadane's continuous subarray algorithm
Kadane's continuous subarray algorithm
 
Datos Del Sistema Solar
Datos Del Sistema SolarDatos Del Sistema Solar
Datos Del Sistema Solar
 
Indianapolis Book Unveiling 2008
Indianapolis Book Unveiling 2008Indianapolis Book Unveiling 2008
Indianapolis Book Unveiling 2008
 
Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor Networks
 
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksReliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
 
Esrel08 Final
Esrel08 FinalEsrel08 Final
Esrel08 Final
 
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
 
SOFA communication protocol (EWSN 2014)
SOFA communication protocol (EWSN 2014)SOFA communication protocol (EWSN 2014)
SOFA communication protocol (EWSN 2014)
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 

Similar to EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)

Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
ijcisjournal
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
Sergey Gordeychik
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
Kristen Carter
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
Wendy Berg
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
nicfs
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
IJET - International Journal of Engineering and Techniques
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
IJCNCJournal
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
IJERA Editor
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
Eng. Mohammed Ahmed Siddiqui
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
IJRES Journal
 
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
ijceronline
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
EditorJST
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
ijwmn
 
SHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptxSHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptx
officelifehq
 

Similar to EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS) (20)

Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
 
SHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptxSHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptx
 

More from Francesco Flammini

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdf
Francesco Flammini
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdf
Francesco Flammini
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdf
Francesco Flammini
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference Certificate
Francesco Flammini
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
Francesco Flammini
 
Appreciation Certificate
Appreciation CertificateAppreciation Certificate
Appreciation Certificate
Francesco Flammini
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy Autonomy
Francesco Flammini
 
IEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificateIEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificate
Francesco Flammini
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
Francesco Flammini
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of Reviewing
Francesco Flammini
 
ACM DSP appointment letter
ACM DSP appointment letter ACM DSP appointment letter
ACM DSP appointment letter
Francesco Flammini
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009
Francesco Flammini
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Francesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNU
Francesco Flammini
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual coupling
Francesco Flammini
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Francesco Flammini
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560Francesco Flammini
 

More from Francesco Flammini (20)

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdf
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdf
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdf
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference Certificate
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
Appreciation Certificate
Appreciation CertificateAppreciation Certificate
Appreciation Certificate
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy Autonomy
 
IEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificateIEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificate
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of Reviewing
 
ACM DSP appointment letter
ACM DSP appointment letter ACM DSP appointment letter
ACM DSP appointment letter
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNU
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual coupling
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
 
Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 

EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)

  • 1. EWSN 2015 - 12th European Conference on Wireless Sensor Networks INDUSTRY SESSION, February 9th 2015, Porto, Portugal Experimenting Secure WSN for Railway Surveillance Francesco Flammini
  • 2. The company ASTS is a leading international technology company which specializes in railway signaling and integrated transport systems for mass-transit, passenger and freight rail operations. www.ansaldo-sts.com 2
  • 3. The rail and mass-transit security business • Prevention, detection and counteraction of vandalisms, thefts, sabotage, terrorism, etc. • Use of smart-technologies for intrusion detection and surveillance, including audio-video content analytics • Relatively new business for companies developing railway and mass-transit systems • Several succesful installations worldwide (Metrocampania, Copenhagen Cityringen, Abu Dhabi, etc.) 3 Flammini, F., Gaglione, A., Mazzocca, N., Pragliola, C., “Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures”, In: Proc. 3rd International Workshop on Critical Information Infrastructures Security (CRITIS’08), Frascati (Rome), Italy, October 13-15, 2008, pp. 213-223.
  • 4. Physical Security Information Management (PSIM) 4Bocchetti, G., Flammini, F., Pappalardo, A., Pragliola, C.: Dependable integrated surveillance systems for the physical security of metro railways. In: Proc. 3rd ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC 2009), 30 August - 2 September, 2009, Como (Italy): pp. 1-7
  • 5. Towards WSN for rail surveillance: opportunities & issues PROS: • Low-cost devices (also low or no cabling costs) measuring several environmental parameters that can be indicative of physical threats • Resilience to physical attacks due to easy to implement mesh topology and absence of both power and data cables • Possibly “Plug’n’play”, easily maintainable and scalable CONS: • Radio connection (“open” network) vulnerable to interferences and attacks (jamming, hacking, etc.) • No “ruggedized” hardware • Limitation in power, memory and other resources -> power/resource-aware security 5Flammini, F., Gaglione, A., Ottello, F., Pappalardo, A., Pragliola, C., Tedesco, A.: Towards Wireless Sensor Networks for Railway Infrastructure Monitoring. In: Proc. ESARS 2010, pp. 1--6, Bologna, Italy (2010)
  • 6. Integrating and fusing heterogeneous sensors 6 Flammini, F., Gaglione, A., Mazzocca, N., Moscato, V., Pragliola, C., “Wireless Sensor Data Fusion for Critical Infrastructure Security”, In: Advances in Soft Computing Vol. 53: Proc. International Workshop on Computational Intelligence in Security for Information Systems (CISIS’08), Genoa, Italy, October 23-24, 2008, pp. 92-99. DETECT Engine Alarm level (1, 2, 3, ...) Detected attack scenario Event History Scenario Repository
  • 7. The SHIELD framework • nSHIELD (New SHIELD) is a EU project co- funded by the ARTEMIS JOINT UNDERTAKING (Sub-programme SP6) focused on the research of SPD (Security, Privacy, Dependability) in the context of Embedded Systems. • The nSHIELD consortium comprises 5 manufacturers and system integrators (ASTS, ETH, HAI, ISL, SES), 7 universities (MGEP, UNIGE, UNIROMA1, UNIUD, TUC, SICS, S- LAB,), 10 SMEs (AT, TECNALIA, ALFA, ISD, MAS, NOOM, T2D, TELC, THYIA, SknFnd) and 2 Industrial R&D organizations (SESM, ATHENA). pSHIELD Start/end: 01.06.2010 – 31.12.2011 Costs: whole project 5,4 M€ nSHIELD Start/end: 01.11.2011 – 31.10.2014 Costs: whole project 13 M€ 7Fiaschetti, A., Lavorato, F., Suraci, V., Palo, A., Taglialatela, A., Morgagni, A., Baldelli, R., Flammini, F.: On the Use of Semantic Technologies to Model and Control Security, Privacy and Dependability in Complex Systems. In: Proc. SAFECOMP 2011, pp: 467-479
  • 8. The pSHIELD rail experimentation: architecture 8Casola, V.; Esposito, M.; Mazzocca, N.; Flammini, F., "Freight Train monitoring: A Case-Study for the pSHIELD Project," Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on , vol., no., pp.597,602, 4-6 July 2012
  • 9. The pSHIELD experimentation: functionalities 9
  • 10. The pSHIELD experimentation: security 10 A security attack has been simulated in which an intruder node tries to intercept the ECDH protocol in order to pick up private information. Since the master node knows the nodes participating in the protocol and by their ID Number (established at system deployment), it becomes aware of an intrusion, then it immediately toggles a red led and stops the communication.  It allows to establish a shared secret key for channel encryption and a mechanism to achieve broadcast authentication of query messages sent by the master to the motes through the ECDSA protocol.  The cryptosystem is based on the WM-ECC library, a publicly available open source implementation of a 160-bit ECC (Elliptic curve cryptography) cryptosystem. A mechanism for key exchanging (between the master and the motes) based on the ECDH protocol has been implemented.
  • 11. The nSHIELD experimentation: architecture 11
  • 12. The nSHIELD experimentation: methodology 12 “Safety-world heritage” approach: - reference railway norms and international standards (CENELEC EN501XX) - semi(formal) methods like state-based testing already used for ERTMS/ETCS functional verification - “hardware-in-the-loop” simulation environment with threat-injection capabilities CENELEC EN 50159 Keywords Keyword Meaning Repetition A message is received more than once Deletion A message is removed from a message stream Insertion A new message is implanted in the message stream Resequencing Messages are received in an unexpected sequence Corruption The information contained in a message is changed, casually or not Delay Messages are received at a time later than intended Masquerade A non-authentic message is designed thus to appear to be authentic (an authentic message means a valid message in which the information is certificated as originated from an authenticated data source)
  • 13. The nSHIELD experimentation: SPD prototypes 13 Protot. number Prototype name 16 Reputation-Based Secure Routing 19 Policy Based Management Framework 20 Control Algorithms 22 Middleware Intrusion Detection System 24 Network Layer Security 25 OSGI Middleware 26 Semantic Model 32 Secure Discovery 33 Security Agent Security System -Node_Number WSN_2 -Node_Number WSN_1 Middleware Smart Camera 1 -is part of* 1 -is part of* -includes1 -is part of* 1 -is part of* Threat Bad mounthing Node Failure Unauthorized Data Access Middleware Intrusion Black Hole Node Intrusion Countermeasure -State -SPD_value Prototype 19 -State -SPD_value Prototype 24 -State -SPD_Value Prototype 16 -State -SPD_Value Prototype 22 is installed on is installed on is installed on is installed on is conteracted by is effective againist is conteracted by is effective against is counteracted by is effective against is conteracted by is effective against is conteracted byis effective against is counteracted by is effective against
  • 14. The nSHIELD experimentation: demonstration scenario 14 STEP Description System Status SPD norm Level 2 In WSN_1 a bad mouthing attack has occurred. The middleware is informed that an attack is occurring and it sends a command to the smart camera to activate its security mechanisms. The SPD level decreases. WSN_1: Bad mouthing attack WSN_2: Encryption 64 bits Smart Camera: Messaging - no protection MDW_IDS: Normal State_03 0 VERY LOW 3 The smart camera improves its SPD functionality and SPD level increases. WSN_1: Bad mouthing attack WSN_2: Encryption 64 bits Smart Camera: Messaging - Authentication & Integrity MDW_IDS: Normal State_19 0,3 LOW
  • 15. Lessons learnt, conclusions & future developments • The usage of WSN in railways is very promising and enables novel real-time monitoring scenarios for many surveillance and diagnostic applications • Data security issues can be effectively addressed by the recent research and technological developments • Several other issues need to be addressed in real-world scenarios to ensure feasibility, like: • Appropriate enclosures and certification for use on-board • Installation & maintenance procedures, compliant with railway norms and best-practices • Energy harvesting options (solar, wind, vibrations, thermal, etc.) • In fact, railway operators are interested in low-cost, plug’n’play, easy to maintain, reliable, safe and secure systems… something that is not so easy to achieve at the current state of research and technology! • While several issues have been already solved regarding data integration and security, still further efforts are needed for the final industralisation of general-purpose WSN-based solutions for railway applications 15 Hodge, V.J.; O'Keefe, S.; Weeks, M.; Moulds, A., "Wireless Sensor Networks for Condition Monitoring in the Railway Industry: A Survey, "Intelligent Transportation Systems, IEEE Transactions on , vol.PP, no.99, pp.1,19
  • 16. THANK YOU FOR YOUR ATTENTION