Abstract
Critical Infrastructures are complex and highly interconnected systems that are crucial for the well-being of the society. Any type of failure can cause significant damage, affecting one or more sectors due to their inherent interdependency. Not only the infrastructures are critical, but also the information infrastructures that manage, control and supervise them. Due to the seriousness of the consequences, the protection of these critical (information) infrastructures must have the highest priority. It is the purpose of this book chapter to review and discuss about these infrastructures, to explain their elements, and to highlight their research and development issues. This chapter will also discuss the role of Wireless Sensor Network (WSN) technology in the protection of these infrastructures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Definition of the word Infrastructure. Merriam Webster’s Collegiate Dictionary (11th edn.), Springfield, MA (2003)
National Research Council, Dahms, L.: Infrastructure for the 21st century - framework for a research agenda. National Academy Press, Washington, D.C. (1987)
Critical Information Infrastructure Research Co-ordination (CI2RCO). Deliverable D12, ICT R&D for CIIP: Towards a European Research Agenda (April 13, 2007)
Definition of the word Critical: Merriam Webster’s Collegiate Dictionary (11th edn.), Springfield, MA (2003)
Commission of the European Communities: Communication from the Commission to the Council and the European Parliament: Critical Infrastructure Protection in the Fight Against Terrorism, COM (2004) 702 final, Brussels (2004)
Congress of the United States of America: USA PATRIOT ACT. Public Law, 107–156, Washington, D.C. (2001)
Analysis and Assessment for Critical Infrastructure Protection (ACIP). Deliverable D1.1 (August 31, 2002)
Metzger, J.: The Concept of Critical Infrastructure Protection (CIP). In: Business and Security: Public-Private Sector Relationships in a New Security Environment, pp. 197–209. Oxford University Press, Oxford (2004)
Dunn, M., Abele-Wigert, I.: The International CIIP Handbook 2006: An Inventory of Protection Policies in 20 Countries and 6 International Organizations (vol. I) (Zurich, Center for Security Studies, 2006)
Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems. In: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-30, Washington, D.C. (2002)
Radvanovksy, R.: Critical Infrastructure: Homeland Security and Emergency Preparedness. CRC Press, Boca Raton (2006)
Rinaldi, S., Peerenboom, J., Kelly, T.: Identifying, understanding, and analyzing Critical infrastructure interdependencies. IEEE Control Systems Magazine 21, 11–25 (2001)
President’s Commission on Critical Infrastructure Protection (PCCIP): Critical Foundations: Protecting America’s Infrastructures. Washington, D.C. (1997)
Landau, S., Stytz, M.R., Landwehr, C.E., Schneider, F.B.: Overview of Cyber Security: A Crisis of Prioritization. IEEE Security and Privacy 03(3), 9–11 (2005)
Dunn, M.: Threat Frames in the US Cyber-Terror Discourse. In: Paper presentation at the 2004 British International Studies Association (BISA) Conference, Warwick (2004)
Bologna, S., Setola, R.: The need to improve local self-awareness in CIP/CIIP. In: Proceedings of First IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005), Darmstadt, Germany, pp. 84–89 (2005)
Dunn, M.: Understanding Critical Information Infrastructures: An Elusive Quest. In: Dunn, M., Mauer, V. (eds.) The International CIIP Handbook 2006: Analyzing Issues, Challenges, and Prospects (Zürich, Forschungsstelle für Sicherheitspolitik, 2006), vol. II, pp. 27–53 (2006)
Critical Information Infrastructure Research Co-ordination (CI2RCO): Deliverable D1, Common Understanding of CI2RCO-Basics (March 1, 2005)
Henriksen, S.: The Shift of Responsibilities within Government and Society. In: CRN Workshop Report. Societal Security and Crisis Management in the 21st Century, Stockholm, pp. 60–63 (2004)
Dunn, M.: The Socio-Political Dimensions of Critical Information Infrastructure Protection (CIIP). International Journal for Critical Infrastructure Protection 1(2/3), 258–268 (2005)
Krutz, R.L.: Securing SCADA Systems. Wiley Publishing, Chichester (2005)
Malcolm Pirnie: Why Malcolm Pirnie Can your Configuration Needs. White Paper (2000), http://www.pirniecentral.com/Docs/MPI_Configure.html
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38(4), 393–422 (2002)
The Department of Homeland Security, Science and Technology Directorate: The National Plan for Research and Development in Support of Critical Infrastructure Protection. Washington, D.C. (2005)
Collaborative Business Items project (CoBIS) (2004-2007), http://www.cobis-online.de
Collin, J.: BP Tests RFID Sensor Network at U.K. Plant (2006), http://www.rfidjournal.com/article/articleview/2443/
Sensor Nets / RFID. Intel Corporation, http://www.intel.com/research/exploratory/wirelesssensors.htm
SMEPP Secure Middleware for Embedded Peer-to-Peer Systems (FP6-2005-IST-5) (2007), http://www.smepp.org
WINES II – Smart Infrastructure University of Cambridge and Imperial College, London (2006), http://www.winesinfrastructure.org
Distributed Intelligence, Sensing and Coordination in Variable Environments. CSIRO (2006), http://www.ict.csiro.au/page.php?cid=97
Ramanathan, N., Balzano, L., Estrin, D., Hansen, M., Harmon, T., Jay, J., Kaiser, W.J., Sukhatme, G.: Designing Wireless Sensor Networks as a Shared Resource for Sustainable Development. In: Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2006), Berkeley, USA (2006)
Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, Boca Raton (2006)
Alarifi, A., Du, W.: Diversifying Sensor Nodes to Improve Resilience Against Node Compromise. In: Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), Alexandria, USA (2006).
Park, T., Shin, K.G.: Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks. IEEE Transactions on Mobile Computing 4(3), 297–309 (2005)
Law, Y.W., Doumen, J., Hartel, P.: Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks 2(1), 65–93 (2006)
Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, Springer, Heidelberg (2004)
Alcaraz, C., Roman, R.: Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: Lopez, J. (ed.) CRITIS 2006. LNCS, vol. 4347, Springer, Heidelberg (2006)
Critical Information Infrastructure Research Co-ordination (CI2RCO). Deliverable D10, Gap analysis of existing CIIP R&D programmes at regional, national and EU level. (September 29, 2006)
Schwabach, H., Harrer, M., Waltl, A., Horst, B., Tacke, A., Zoffmann, G., Beleznai, C., Strobl, B., Helmut, G., Fernández, G.: VITUS: Video based Image analysis for Tunnel Safety. In: International Conference on Tunnel Safety and Ventilation (2006)
Commission of the European Communities: European transport policy for 2010: Time to decide. White Paper 370 (2001)
Schwabach, H., Harrer, M., Holzmann, W., Bischof, Fernández Domínguez, H.G., Nölle, M., Pflugfelder, R., Strobl, B., Tacke, A., Waltl, A.: Video Based Image Analysis for Tunnel Safety – VITUS-1: A Tunnel Video Surveillance and Traffic Control System. In: 12th World Congress on Intelligent Transport Systems (2005)
Center for Sensed Critical Infrastructure Research (CenSCIR) (2006), http://www.ices.cmu.edu/censcir/
Akinci, B., Boukamp, F., Gordon, C., Huber, D., Lyons, C., Park, K.: A formalism for utilization of sensor systems and integrated project models for active construction quality control. Carnegie Mellon University, Pittsburgh, United States, ScienceDirect (2005)
Singhvi, V., Krause, A., Guestrin, C., Matthews, H.S., Garrett, J.H., Matthews, H.: Intelligent Lighting Control using Sensor Networks. In: Proceedings of SenSys 2005, San Diego, California, USA (2005)
Critical Information Infrastructure Research Co-ordination (CI2RCO): Deliverable D6, Report on the analysis and evaluation of CIIP R&D programmes (June 2, 2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lopez, J., Alcaraz, C., Roman, R. (2007). On the Protection and Technologies of Critical Information Infrastructures. In: Aldini, A., Gorrieri, R. (eds) Foundations of Security Analysis and Design IV. FOSAD FOSAD 2007 2006. Lecture Notes in Computer Science, vol 4677. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74810-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-74810-6_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74809-0
Online ISBN: 978-3-540-74810-6
eBook Packages: Computer ScienceComputer Science (R0)