SlideShare a Scribd company logo
EWSN 2015 - 12th European Conference on Wireless Sensor Networks
INDUSTRY SESSION, February 9th 2015, Porto, Portugal
Experimenting Secure WSN for
Railway Surveillance
Francesco Flammini
The company
ASTS is a leading international technology
company which specializes in railway
signaling and integrated transport systems
for mass-transit, passenger and freight rail
operations.
www.ansaldo-sts.com
2
The rail and mass-transit security business
• Prevention, detection and counteraction of
vandalisms, thefts, sabotage, terrorism, etc.
• Use of smart-technologies for intrusion detection
and surveillance, including audio-video content
analytics
• Relatively new business for companies
developing railway and mass-transit systems
• Several succesful installations worldwide
(Metrocampania, Copenhagen Cityringen, Abu
Dhabi, etc.)
3
Flammini, F., Gaglione, A., Mazzocca, N., Pragliola, C., “Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures”,
In: Proc. 3rd International Workshop on Critical Information Infrastructures Security (CRITIS’08), Frascati (Rome), Italy, October 13-15, 2008, pp. 213-223.
Physical Security Information Management (PSIM)
4Bocchetti, G., Flammini, F., Pappalardo, A., Pragliola, C.: Dependable integrated surveillance systems for the physical security of metro railways. In: Proc. 3rd
ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC 2009), 30 August - 2 September, 2009, Como (Italy): pp. 1-7

Recommended for you

Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation

This document proposes a secure communication framework for embedded networking. The framework aims to be platform neutral and hardware independent. It incorporates a secured database containing all possible system events. Embedded systems can authenticate and access this database. The framework also protects the communication channel by encrypting transmissions, secure handshaking, and using self-adaptive frame structures. It references event indexes from the database rather than transmitting actual information. The database is dynamically recreated on each power-on to change event indexes and improve security. The framework is designed to be easily implemented using proven security technologies while providing modest protection for embedded network devices.

Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness

Passive network monitoring techniques can provide valuable situational awareness for network security professionals. The document describes techniques for passively discovering information about nodes on a network, including operating systems, roles, services, and configurations. This contextual information helps analysts by reducing false positives and focusing resources. The passive approach does not disrupt networks and can operate continuously, in contrast to active scanning tools. A network monitoring prototype is being developed to test these passive discovery techniques.

cloud security 27001 27002 david sweigert hipaa da
Cr32585591
Cr32585591Cr32585591
Cr32585591

IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com

ijera(www.ijera.com)international journal of engin
Towards WSN for rail surveillance: opportunities & issues
PROS:
• Low-cost devices (also low or no cabling costs) measuring several environmental parameters that can be indicative of
physical threats
• Resilience to physical attacks due to easy to implement mesh topology and absence of both power and data cables
• Possibly “Plug’n’play”, easily maintainable and scalable
CONS:
• Radio connection (“open” network) vulnerable to interferences and attacks (jamming, hacking, etc.)
• No “ruggedized” hardware
• Limitation in power, memory and other resources -> power/resource-aware security
5Flammini, F., Gaglione, A., Ottello, F., Pappalardo, A., Pragliola, C., Tedesco, A.: Towards Wireless Sensor Networks for Railway Infrastructure Monitoring. In: Proc.
ESARS 2010, pp. 1--6, Bologna, Italy (2010)
Integrating and fusing heterogeneous sensors
6
Flammini, F., Gaglione, A., Mazzocca, N., Moscato, V., Pragliola, C., “Wireless Sensor Data Fusion for Critical Infrastructure Security”, In: Advances in Soft Computing
Vol. 53: Proc. International Workshop on Computational Intelligence in Security for Information Systems (CISIS’08), Genoa, Italy, October 23-24, 2008, pp. 92-99.
DETECT Engine
Alarm level
(1, 2, 3, ...)
Detected
attack
scenario
Event
History
Scenario
Repository
The SHIELD framework
• nSHIELD (New SHIELD) is a EU project co-
funded by the ARTEMIS JOINT UNDERTAKING
(Sub-programme SP6) focused on the research
of SPD (Security, Privacy, Dependability) in the
context of Embedded Systems.
• The nSHIELD consortium comprises 5
manufacturers and system integrators (ASTS,
ETH, HAI, ISL, SES), 7 universities (MGEP,
UNIGE, UNIROMA1, UNIUD, TUC, SICS, S-
LAB,), 10 SMEs (AT, TECNALIA, ALFA, ISD,
MAS, NOOM, T2D, TELC, THYIA, SknFnd) and 2
Industrial R&D organizations (SESM, ATHENA).
pSHIELD
Start/end: 01.06.2010 – 31.12.2011
Costs: whole project 5,4 M€
nSHIELD
Start/end: 01.11.2011 – 31.10.2014
Costs: whole project 13 M€
7Fiaschetti, A., Lavorato, F., Suraci, V., Palo, A., Taglialatela, A., Morgagni, A., Baldelli, R., Flammini, F.: On the Use of Semantic Technologies to Model and Control
Security, Privacy and Dependability in Complex Systems. In: Proc. SAFECOMP 2011, pp: 467-479
The pSHIELD rail experimentation: architecture
8Casola, V.; Esposito, M.; Mazzocca, N.; Flammini, F., "Freight Train monitoring: A Case-Study for the pSHIELD Project," Innovative Mobile and Internet Services in
Ubiquitous Computing (IMIS), 2012 Sixth International Conference on , vol., no., pp.597,602, 4-6 July 2012

Recommended for you

Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security

This document discusses security issues related to wireless sensor networks. It begins with an introduction to wireless sensor networks and an overview of security challenges due to limited sensor node capabilities. It then summarizes common attacks on different layers of wireless sensor networks and discusses security objectives. The document outlines key areas of research on sensor network security including key management, secure time synchronization, and secure routing. It provides details on different key management schemes, time synchronization protocols, and discusses vulnerabilities of existing synchronization schemes to various attacks.

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com

This document summarizes a research paper that classifies different types of networks and discusses their associated security issues. It categorizes networks based on size (LAN, MAN, WAN), design (peer-to-peer, client-server, standalone), layering (layered, non-layered), and provides examples such as Ethernet, Wi-Fi, VPNs. It also discusses common security threats for different network types like viruses, denial of service attacks, and evaluates security measures including encryption, firewalls, access control. The paper aims to provide a comprehensive classification of networks and analyze how security needs vary depending on the network and software development stages.

international journal of engineering research and
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...

NS2 Projects for M. Tech, NS2 Projects in Vijayanagar, NS2 Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, NS2 IEEE projects in Bangalore, IEEE 2015 NS2 Projects, WSN and MANET Projects, WSN and MANET Projects in Bangalore, WSN and MANET Projects in Vijayangar

ns2 projects for m. techns2 projects in vijayanagarwsn and manet projects in vijayangar
The pSHIELD experimentation: functionalities
9
The pSHIELD experimentation: security
10
A security attack has been simulated in which an intruder node tries to intercept the
ECDH protocol in order to pick up private information. Since the master node knows the
nodes participating in the protocol and by their ID Number (established at system
deployment), it becomes aware of an intrusion, then it immediately toggles a red led and
stops the communication.
 It allows to establish a shared secret key for channel encryption and a mechanism to achieve broadcast authentication
of query messages sent by the master to the motes through the ECDSA protocol.
 The cryptosystem is based on the WM-ECC library, a publicly available open source implementation of a 160-bit ECC
(Elliptic curve cryptography) cryptosystem.
A mechanism for key exchanging
(between the master and the
motes) based on the ECDH
protocol has been implemented.
The nSHIELD experimentation: architecture
11
The nSHIELD experimentation: methodology
12
“Safety-world heritage” approach:
- reference railway norms and international standards (CENELEC EN501XX)
- semi(formal) methods like state-based testing already used for ERTMS/ETCS functional verification
- “hardware-in-the-loop” simulation environment with threat-injection capabilities
CENELEC EN 50159 Keywords
Keyword Meaning
Repetition A message is received more than once
Deletion A message is removed from a message stream
Insertion A new message is implanted in the message
stream
Resequencing Messages are received in an unexpected
sequence
Corruption The information contained in a message is
changed, casually or not
Delay Messages are received at a time later than
intended
Masquerade A non-authentic message is designed thus to
appear to be authentic (an authentic message
means a valid message in which the
information is certificated as originated from
an authenticated data source)

Recommended for you

Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2

This document provides an introduction to cryptography and network security. It defines cryptography as the study of secret writing and discusses its use in securing communications and verifying messages. The document outlines basic concepts in cryptography like plaintext, ciphertext, ciphers, keys, encryption, and decryption. It also discusses different types of security, like unconditional security based on information theory versus computational security based on limiting an attacker's resources. The overall document serves as a high-level overview of cryptography and security.

International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)

This document discusses intrusion detection in mobile ad hoc networks (MANETs). It begins with background on intrusion detection systems (IDS) in general and why they are important for MANETs given their vulnerabilities. It then discusses three key aspects of IDS for MANETs: common attacks on MANETs, architectures for IDS in MANETs, and achievements in research on IDS for MANETs. Specifically, it reviews research on IDS architectures, detection techniques, resistance to attack types, and applicability to different routing protocols. The document provides an overview of issues and approaches regarding securing MANETs through intrusion detection.

HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...

This document proposes a hybrid architecture for a distributed intrusion detection system using multiple agents. The key aspects of the architecture include: - Using multiple independent tracker agents that monitor hosts and generate reports sent to monitors and storage. - Monitors analyze activity and compare to signatures to detect known attacks, or send data to anomaly detectors. - Anomaly and misuse detectors use classification and pattern matching to detect known and unknown attacks. - An inference module coordinates entities across hosts to classify new attacks using a knowledge base and signature generator. - A countermeasure module alerts administrators and can take actions like dropping packets in response to detected attacks.

in order to the rapid growth of the network applicit is necessary that this security concern must benew kinds of network attacks are emerging endlessl
The nSHIELD experimentation: SPD prototypes
13
Protot.
number
Prototype name
16 Reputation-Based Secure Routing
19 Policy Based Management Framework
20 Control Algorithms
22 Middleware Intrusion Detection System
24 Network Layer Security
25 OSGI Middleware
26 Semantic Model
32 Secure Discovery
33 Security Agent
Security System
-Node_Number
WSN_2
-Node_Number
WSN_1
Middleware
Smart Camera
1 -is part of*
1
-is part of*
-includes1
-is part of*
1 -is part of*
Threat
Bad mounthing
Node Failure
Unauthorized Data Access
Middleware Intrusion
Black Hole
Node Intrusion
Countermeasure
-State
-SPD_value
Prototype 19
-State
-SPD_value
Prototype 24
-State
-SPD_Value
Prototype 16
-State
-SPD_Value
Prototype 22
is installed on
is installed on
is installed on
is installed on
is conteracted by
is effective againist
is conteracted by
is effective against
is counteracted by
is effective against
is conteracted by is effective against
is conteracted byis effective against
is counteracted by is effective against
The nSHIELD experimentation: demonstration scenario
14
STEP Description
System
Status
SPD norm Level
2
In WSN_1 a bad mouthing attack has occurred. The middleware is informed that an attack is
occurring and it sends a command to the smart camera to activate its security mechanisms. The
SPD level decreases.
WSN_1: Bad mouthing attack
WSN_2: Encryption 64 bits
Smart Camera: Messaging - no protection
MDW_IDS: Normal
State_03 0
VERY LOW
3
The smart camera improves its SPD functionality and SPD level increases.
WSN_1: Bad mouthing attack
WSN_2: Encryption 64 bits
Smart Camera: Messaging - Authentication & Integrity
MDW_IDS: Normal
State_19 0,3
LOW
Lessons learnt, conclusions & future developments
• The usage of WSN in railways is very promising and enables novel real-time monitoring scenarios for
many surveillance and diagnostic applications
• Data security issues can be effectively addressed by the recent research and technological developments
• Several other issues need to be addressed in real-world scenarios to ensure feasibility, like:
• Appropriate enclosures and certification for use on-board
• Installation & maintenance procedures, compliant with railway norms and best-practices
• Energy harvesting options (solar, wind, vibrations, thermal, etc.)
• In fact, railway operators are interested in low-cost, plug’n’play, easy to maintain, reliable, safe and secure
systems… something that is not so easy to achieve at the current state of research and technology!
• While several issues have been already solved regarding data integration and security, still further efforts
are needed for the final industralisation of general-purpose WSN-based solutions for railway applications
15
Hodge, V.J.; O'Keefe, S.; Weeks, M.; Moulds, A., "Wireless Sensor Networks for Condition Monitoring in the Railway Industry: A Survey,
"Intelligent Transportation Systems, IEEE Transactions on , vol.PP, no.99, pp.1,19
THANK YOU FOR YOUR ATTENTION

Recommended for you

A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...

Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.

attackblstmdbn
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper

The document proposes two techniques - periodic collection and source simulation - to prevent leakage of location information in sensor networks from a global eavesdropper. Periodic collection provides high location privacy while source simulation provides tradeoffs between privacy, communication cost, and latency. The techniques are efficient and effective at providing source and sink location privacy compared to existing methods that only defend against local adversaries.

protecting location privacy in sensor networks aga
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network

Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide in the past few years, so does the need for effective security mechanisms. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats due to unattended installation of sensor nodes as sensor networks may interact with sensitive data and /or operate in hostile unattended environments. These security concerns be addressed from the beginning of the system design. The intent of this paper is to investigate the security related issues in wireless sensor networks. In this paper we have explored general security threats in wireless sensor network with extensive study.

threatswireless sensor networkssecurity

More Related Content

What's hot

TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
IJCNCJournal
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
IJNSA Journal
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
ijcsa
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
Ushnish Chowdhury
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
David Sweigert
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
IJERA Editor
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
elango30
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
LogicMindtech Nologies
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
Baggam Sailusha
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)
CSCJournals
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
IJNSA Journal
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
IJECEIAES
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
JPINFOTECH JAYAPRAKASH
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
ijwmn
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Zainab Nayyar
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
LogicMindtech Nologies
 

What's hot (17)

TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 

Viewers also liked

Kadane's continuous subarray algorithm
Kadane's continuous subarray algorithmKadane's continuous subarray algorithm
Kadane's continuous subarray algorithm
arunodhaya80
 
Datos Del Sistema Solar
Datos Del Sistema SolarDatos Del Sistema Solar
Datos Del Sistema Solar
montemorcillo
 
Indianapolis Book Unveiling 2008
Indianapolis Book Unveiling 2008Indianapolis Book Unveiling 2008
Indianapolis Book Unveiling 2008
Who's Who Publishing
 
Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.
montemorcillo
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
ketaki19deshmukh
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor Networks
Torsten Braun, Universität Bern
 
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksReliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Torsten Braun, Universität Bern
 
Esrel08 Final
Esrel08 FinalEsrel08 Final
Esrel08 Final
Francesco Flammini
 
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
Francesco Flammini
 
SOFA communication protocol (EWSN 2014)
SOFA communication protocol (EWSN 2014)SOFA communication protocol (EWSN 2014)
SOFA communication protocol (EWSN 2014)
Marco Cattani
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
Mshari Alabdulkarim
 

Viewers also liked (12)

Uiui444
Uiui444Uiui444
Uiui444
 
Kadane's continuous subarray algorithm
Kadane's continuous subarray algorithmKadane's continuous subarray algorithm
Kadane's continuous subarray algorithm
 
Datos Del Sistema Solar
Datos Del Sistema SolarDatos Del Sistema Solar
Datos Del Sistema Solar
 
Indianapolis Book Unveiling 2008
Indianapolis Book Unveiling 2008Indianapolis Book Unveiling 2008
Indianapolis Book Unveiling 2008
 
Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor Networks
 
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksReliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
 
Esrel08 Final
Esrel08 FinalEsrel08 Final
Esrel08 Final
 
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
ACIVS'12: Evaluating the effects of MJPEG compression on Motion Tracking in m...
 
SOFA communication protocol (EWSN 2014)
SOFA communication protocol (EWSN 2014)SOFA communication protocol (EWSN 2014)
SOFA communication protocol (EWSN 2014)
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 

Similar to EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)

Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
ijcisjournal
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
Sergey Gordeychik
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
Kristen Carter
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
Wendy Berg
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
nicfs
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
IJET - International Journal of Engineering and Techniques
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
IJCNCJournal
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
IJERA Editor
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
Eng. Mohammed Ahmed Siddiqui
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
janani603976
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
IJRES Journal
 
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
ijceronline
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
EditorJST
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
ijwmn
 
SHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptxSHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptx
officelifehq
 

Similar to EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS) (20)

Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
 
SHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptxSHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptx
 

More from Francesco Flammini

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdf
Francesco Flammini
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdf
Francesco Flammini
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdf
Francesco Flammini
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference Certificate
Francesco Flammini
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
Francesco Flammini
 
Appreciation Certificate
Appreciation CertificateAppreciation Certificate
Appreciation Certificate
Francesco Flammini
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy Autonomy
Francesco Flammini
 
IEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificateIEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificate
Francesco Flammini
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
Francesco Flammini
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of Reviewing
Francesco Flammini
 
ACM DSP appointment letter
ACM DSP appointment letter ACM DSP appointment letter
ACM DSP appointment letter
Francesco Flammini
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009
Francesco Flammini
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Francesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNU
Francesco Flammini
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual coupling
Francesco Flammini
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Francesco Flammini
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
Francesco Flammini
 

More from Francesco Flammini (20)

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdf
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdf
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdf
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference Certificate
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
Appreciation Certificate
Appreciation CertificateAppreciation Certificate
Appreciation Certificate
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy Autonomy
 
IEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificateIEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificate
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of Reviewing
 
ACM DSP appointment letter
ACM DSP appointment letter ACM DSP appointment letter
ACM DSP appointment letter
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNU
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual coupling
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
 
Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298
 

Recently uploaded

PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
itssurajthakur06
 
L-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptxL-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptx
naseki5964
 
IWISS Catalog 2024
IWISS Catalog 2024IWISS Catalog 2024
IWISS Catalog 2024
Iwiss Tools Co.,Ltd
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
yadavsuyash008
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
Mani Krishna Sarkar
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
Rafael Santos
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
Celine George
 
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE DonatoCONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
Servizi a rete
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
ProexportColombia1
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
sharvaridhokte
 
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.docCCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
Dss
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
Kamal Acharya
 
Lecture 3 Biomass energy...............ppt
Lecture 3 Biomass energy...............pptLecture 3 Biomass energy...............ppt
Lecture 3 Biomass energy...............ppt
RujanTimsina1
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
Global Network for Zero
 
Biology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtuBiology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtu
santoshpatilrao33
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
VICTOR MAESTRE RAMIREZ
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
Tool and Die Tech
 
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdfGUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
ProexportColombia1
 
Germany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptxGermany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptx
rebecca841358
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
pavanaroshni1977
 

Recently uploaded (20)

PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
 
L-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptxL-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptx
 
IWISS Catalog 2024
IWISS Catalog 2024IWISS Catalog 2024
IWISS Catalog 2024
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
 
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE DonatoCONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
 
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.docCCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
 
Lecture 3 Biomass energy...............ppt
Lecture 3 Biomass energy...............pptLecture 3 Biomass energy...............ppt
Lecture 3 Biomass energy...............ppt
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
 
Biology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtuBiology for computer science BBOC407 vtu
Biology for computer science BBOC407 vtu
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
 
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdfGUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
GUIA_LEGAL_CHAPTER_4_FOREIGN TRADE CUSTOMS.pdf
 
Germany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptxGermany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptx
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
 

EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)

  • 1. EWSN 2015 - 12th European Conference on Wireless Sensor Networks INDUSTRY SESSION, February 9th 2015, Porto, Portugal Experimenting Secure WSN for Railway Surveillance Francesco Flammini
  • 2. The company ASTS is a leading international technology company which specializes in railway signaling and integrated transport systems for mass-transit, passenger and freight rail operations. www.ansaldo-sts.com 2
  • 3. The rail and mass-transit security business • Prevention, detection and counteraction of vandalisms, thefts, sabotage, terrorism, etc. • Use of smart-technologies for intrusion detection and surveillance, including audio-video content analytics • Relatively new business for companies developing railway and mass-transit systems • Several succesful installations worldwide (Metrocampania, Copenhagen Cityringen, Abu Dhabi, etc.) 3 Flammini, F., Gaglione, A., Mazzocca, N., Pragliola, C., “Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures”, In: Proc. 3rd International Workshop on Critical Information Infrastructures Security (CRITIS’08), Frascati (Rome), Italy, October 13-15, 2008, pp. 213-223.
  • 4. Physical Security Information Management (PSIM) 4Bocchetti, G., Flammini, F., Pappalardo, A., Pragliola, C.: Dependable integrated surveillance systems for the physical security of metro railways. In: Proc. 3rd ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC 2009), 30 August - 2 September, 2009, Como (Italy): pp. 1-7
  • 5. Towards WSN for rail surveillance: opportunities & issues PROS: • Low-cost devices (also low or no cabling costs) measuring several environmental parameters that can be indicative of physical threats • Resilience to physical attacks due to easy to implement mesh topology and absence of both power and data cables • Possibly “Plug’n’play”, easily maintainable and scalable CONS: • Radio connection (“open” network) vulnerable to interferences and attacks (jamming, hacking, etc.) • No “ruggedized” hardware • Limitation in power, memory and other resources -> power/resource-aware security 5Flammini, F., Gaglione, A., Ottello, F., Pappalardo, A., Pragliola, C., Tedesco, A.: Towards Wireless Sensor Networks for Railway Infrastructure Monitoring. In: Proc. ESARS 2010, pp. 1--6, Bologna, Italy (2010)
  • 6. Integrating and fusing heterogeneous sensors 6 Flammini, F., Gaglione, A., Mazzocca, N., Moscato, V., Pragliola, C., “Wireless Sensor Data Fusion for Critical Infrastructure Security”, In: Advances in Soft Computing Vol. 53: Proc. International Workshop on Computational Intelligence in Security for Information Systems (CISIS’08), Genoa, Italy, October 23-24, 2008, pp. 92-99. DETECT Engine Alarm level (1, 2, 3, ...) Detected attack scenario Event History Scenario Repository
  • 7. The SHIELD framework • nSHIELD (New SHIELD) is a EU project co- funded by the ARTEMIS JOINT UNDERTAKING (Sub-programme SP6) focused on the research of SPD (Security, Privacy, Dependability) in the context of Embedded Systems. • The nSHIELD consortium comprises 5 manufacturers and system integrators (ASTS, ETH, HAI, ISL, SES), 7 universities (MGEP, UNIGE, UNIROMA1, UNIUD, TUC, SICS, S- LAB,), 10 SMEs (AT, TECNALIA, ALFA, ISD, MAS, NOOM, T2D, TELC, THYIA, SknFnd) and 2 Industrial R&D organizations (SESM, ATHENA). pSHIELD Start/end: 01.06.2010 – 31.12.2011 Costs: whole project 5,4 M€ nSHIELD Start/end: 01.11.2011 – 31.10.2014 Costs: whole project 13 M€ 7Fiaschetti, A., Lavorato, F., Suraci, V., Palo, A., Taglialatela, A., Morgagni, A., Baldelli, R., Flammini, F.: On the Use of Semantic Technologies to Model and Control Security, Privacy and Dependability in Complex Systems. In: Proc. SAFECOMP 2011, pp: 467-479
  • 8. The pSHIELD rail experimentation: architecture 8Casola, V.; Esposito, M.; Mazzocca, N.; Flammini, F., "Freight Train monitoring: A Case-Study for the pSHIELD Project," Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on , vol., no., pp.597,602, 4-6 July 2012
  • 9. The pSHIELD experimentation: functionalities 9
  • 10. The pSHIELD experimentation: security 10 A security attack has been simulated in which an intruder node tries to intercept the ECDH protocol in order to pick up private information. Since the master node knows the nodes participating in the protocol and by their ID Number (established at system deployment), it becomes aware of an intrusion, then it immediately toggles a red led and stops the communication.  It allows to establish a shared secret key for channel encryption and a mechanism to achieve broadcast authentication of query messages sent by the master to the motes through the ECDSA protocol.  The cryptosystem is based on the WM-ECC library, a publicly available open source implementation of a 160-bit ECC (Elliptic curve cryptography) cryptosystem. A mechanism for key exchanging (between the master and the motes) based on the ECDH protocol has been implemented.
  • 11. The nSHIELD experimentation: architecture 11
  • 12. The nSHIELD experimentation: methodology 12 “Safety-world heritage” approach: - reference railway norms and international standards (CENELEC EN501XX) - semi(formal) methods like state-based testing already used for ERTMS/ETCS functional verification - “hardware-in-the-loop” simulation environment with threat-injection capabilities CENELEC EN 50159 Keywords Keyword Meaning Repetition A message is received more than once Deletion A message is removed from a message stream Insertion A new message is implanted in the message stream Resequencing Messages are received in an unexpected sequence Corruption The information contained in a message is changed, casually or not Delay Messages are received at a time later than intended Masquerade A non-authentic message is designed thus to appear to be authentic (an authentic message means a valid message in which the information is certificated as originated from an authenticated data source)
  • 13. The nSHIELD experimentation: SPD prototypes 13 Protot. number Prototype name 16 Reputation-Based Secure Routing 19 Policy Based Management Framework 20 Control Algorithms 22 Middleware Intrusion Detection System 24 Network Layer Security 25 OSGI Middleware 26 Semantic Model 32 Secure Discovery 33 Security Agent Security System -Node_Number WSN_2 -Node_Number WSN_1 Middleware Smart Camera 1 -is part of* 1 -is part of* -includes1 -is part of* 1 -is part of* Threat Bad mounthing Node Failure Unauthorized Data Access Middleware Intrusion Black Hole Node Intrusion Countermeasure -State -SPD_value Prototype 19 -State -SPD_value Prototype 24 -State -SPD_Value Prototype 16 -State -SPD_Value Prototype 22 is installed on is installed on is installed on is installed on is conteracted by is effective againist is conteracted by is effective against is counteracted by is effective against is conteracted by is effective against is conteracted byis effective against is counteracted by is effective against
  • 14. The nSHIELD experimentation: demonstration scenario 14 STEP Description System Status SPD norm Level 2 In WSN_1 a bad mouthing attack has occurred. The middleware is informed that an attack is occurring and it sends a command to the smart camera to activate its security mechanisms. The SPD level decreases. WSN_1: Bad mouthing attack WSN_2: Encryption 64 bits Smart Camera: Messaging - no protection MDW_IDS: Normal State_03 0 VERY LOW 3 The smart camera improves its SPD functionality and SPD level increases. WSN_1: Bad mouthing attack WSN_2: Encryption 64 bits Smart Camera: Messaging - Authentication & Integrity MDW_IDS: Normal State_19 0,3 LOW
  • 15. Lessons learnt, conclusions & future developments • The usage of WSN in railways is very promising and enables novel real-time monitoring scenarios for many surveillance and diagnostic applications • Data security issues can be effectively addressed by the recent research and technological developments • Several other issues need to be addressed in real-world scenarios to ensure feasibility, like: • Appropriate enclosures and certification for use on-board • Installation & maintenance procedures, compliant with railway norms and best-practices • Energy harvesting options (solar, wind, vibrations, thermal, etc.) • In fact, railway operators are interested in low-cost, plug’n’play, easy to maintain, reliable, safe and secure systems… something that is not so easy to achieve at the current state of research and technology! • While several issues have been already solved regarding data integration and security, still further efforts are needed for the final industralisation of general-purpose WSN-based solutions for railway applications 15 Hodge, V.J.; O'Keefe, S.; Weeks, M.; Moulds, A., "Wireless Sensor Networks for Condition Monitoring in the Railway Industry: A Survey, "Intelligent Transportation Systems, IEEE Transactions on , vol.PP, no.99, pp.1,19
  • 16. THANK YOU FOR YOUR ATTENTION