Skip to main content

On the Protection and Technologies of Critical Information Infrastructures

  • Conference paper
Book cover Foundations of Security Analysis and Design IV (FOSAD 2007, FOSAD 2006)

Abstract

Critical Infrastructures are complex and highly interconnected systems that are crucial for the well-being of the society. Any type of failure can cause significant damage, affecting one or more sectors due to their inherent interdependency. Not only the infrastructures are critical, but also the information infrastructures that manage, control and supervise them. Due to the seriousness of the consequences, the protection of these critical (information) infrastructures must have the highest priority. It is the purpose of this book chapter to review and discuss about these infrastructures, to explain their elements, and to highlight their research and development issues. This chapter will also discuss the role of Wireless Sensor Network (WSN) technology in the protection of these infrastructures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Definition of the word Infrastructure. Merriam Webster’s Collegiate Dictionary (11th edn.), Springfield, MA (2003)

    Google Scholar 

  2. National Research Council, Dahms, L.: Infrastructure for the 21st century - framework for a research agenda. National Academy Press, Washington, D.C. (1987)

    Google Scholar 

  3. Critical Information Infrastructure Research Co-ordination (CI2RCO). Deliverable D12, ICT R&D for CIIP: Towards a European Research Agenda (April 13, 2007)

    Google Scholar 

  4. Definition of the word Critical: Merriam Webster’s Collegiate Dictionary (11th edn.), Springfield, MA (2003)

    Google Scholar 

  5. Commission of the European Communities: Communication from the Commission to the Council and the European Parliament: Critical Infrastructure Protection in the Fight Against Terrorism, COM (2004) 702 final, Brussels (2004)

    Google Scholar 

  6. Congress of the United States of America: USA PATRIOT ACT. Public Law, 107–156, Washington, D.C. (2001)

    Google Scholar 

  7. Analysis and Assessment for Critical Infrastructure Protection (ACIP). Deliverable D1.1 (August 31, 2002)

    Google Scholar 

  8. Metzger, J.: The Concept of Critical Infrastructure Protection (CIP). In: Business and Security: Public-Private Sector Relationships in a New Security Environment, pp. 197–209. Oxford University Press, Oxford (2004)

    Google Scholar 

  9. Dunn, M., Abele-Wigert, I.: The International CIIP Handbook 2006: An Inventory of Protection Policies in 20 Countries and 6 International Organizations (vol. I) (Zurich, Center for Security Studies, 2006)

    Google Scholar 

  10. Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems. In: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-30, Washington, D.C. (2002)

    Google Scholar 

  11. Radvanovksy, R.: Critical Infrastructure: Homeland Security and Emergency Preparedness. CRC Press, Boca Raton (2006)

    Google Scholar 

  12. Rinaldi, S., Peerenboom, J., Kelly, T.: Identifying, understanding, and analyzing Critical infrastructure interdependencies. IEEE Control Systems Magazine 21, 11–25 (2001)

    Article  Google Scholar 

  13. President’s Commission on Critical Infrastructure Protection (PCCIP): Critical Foundations: Protecting America’s Infrastructures. Washington, D.C. (1997)

    Google Scholar 

  14. Landau, S., Stytz, M.R., Landwehr, C.E., Schneider, F.B.: Overview of Cyber Security: A Crisis of Prioritization. IEEE Security and Privacy 03(3), 9–11 (2005)

    Article  Google Scholar 

  15. Dunn, M.: Threat Frames in the US Cyber-Terror Discourse. In: Paper presentation at the 2004 British International Studies Association (BISA) Conference, Warwick (2004)

    Google Scholar 

  16. Bologna, S., Setola, R.: The need to improve local self-awareness in CIP/CIIP. In: Proceedings of First IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005), Darmstadt, Germany, pp. 84–89 (2005)

    Google Scholar 

  17. Dunn, M.: Understanding Critical Information Infrastructures: An Elusive Quest. In: Dunn, M., Mauer, V. (eds.) The International CIIP Handbook 2006: Analyzing Issues, Challenges, and Prospects (Zürich, Forschungsstelle für Sicherheitspolitik, 2006), vol. II, pp. 27–53 (2006)

    Google Scholar 

  18. Critical Information Infrastructure Research Co-ordination (CI2RCO): Deliverable D1, Common Understanding of CI2RCO-Basics (March 1, 2005)

    Google Scholar 

  19. Henriksen, S.: The Shift of Responsibilities within Government and Society. In: CRN Workshop Report. Societal Security and Crisis Management in the 21st Century, Stockholm, pp. 60–63 (2004)

    Google Scholar 

  20. Dunn, M.: The Socio-Political Dimensions of Critical Information Infrastructure Protection (CIIP). International Journal for Critical Infrastructure Protection 1(2/3), 258–268 (2005)

    Article  Google Scholar 

  21. Krutz, R.L.: Securing SCADA Systems. Wiley Publishing, Chichester (2005)

    Google Scholar 

  22. Malcolm Pirnie: Why Malcolm Pirnie Can your Configuration Needs. White Paper (2000), http://www.pirniecentral.com/Docs/MPI_Configure.html

  23. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38(4), 393–422 (2002)

    Google Scholar 

  24. The Department of Homeland Security, Science and Technology Directorate: The National Plan for Research and Development in Support of Critical Infrastructure Protection. Washington, D.C. (2005)

    Google Scholar 

  25. Collaborative Business Items project (CoBIS) (2004-2007), http://www.cobis-online.de

  26. Collin, J.: BP Tests RFID Sensor Network at U.K. Plant (2006), http://www.rfidjournal.com/article/articleview/2443/

  27. Sensor Nets / RFID. Intel Corporation, http://www.intel.com/research/exploratory/wirelesssensors.htm

  28. SMEPP Secure Middleware for Embedded Peer-to-Peer Systems (FP6-2005-IST-5) (2007), http://www.smepp.org

  29. WINES II – Smart Infrastructure University of Cambridge and Imperial College, London (2006), http://www.winesinfrastructure.org

  30. Distributed Intelligence, Sensing and Coordination in Variable Environments. CSIRO (2006), http://www.ict.csiro.au/page.php?cid=97

  31. Ramanathan, N., Balzano, L., Estrin, D., Hansen, M., Harmon, T., Jay, J., Kaiser, W.J., Sukhatme, G.: Designing Wireless Sensor Networks as a Shared Resource for Sustainable Development. In: Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2006), Berkeley, USA (2006)

    Google Scholar 

  32. Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, Boca Raton (2006)

    Google Scholar 

  33. Alarifi, A., Du, W.: Diversifying Sensor Nodes to Improve Resilience Against Node Compromise. In: Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), Alexandria, USA (2006).

    Google Scholar 

  34. Park, T., Shin, K.G.: Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks. IEEE Transactions on Mobile Computing 4(3), 297–309 (2005)

    Article  Google Scholar 

  35. Law, Y.W., Doumen, J., Hartel, P.: Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks 2(1), 65–93 (2006)

    Article  Google Scholar 

  36. Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, Springer, Heidelberg (2004)

    Google Scholar 

  37. Alcaraz, C., Roman, R.: Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: Lopez, J. (ed.) CRITIS 2006. LNCS, vol. 4347, Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  38. Critical Information Infrastructure Research Co-ordination (CI2RCO). Deliverable D10, Gap analysis of existing CIIP R&D programmes at regional, national and EU level. (September 29, 2006)

    Google Scholar 

  39. Schwabach, H., Harrer, M., Waltl, A., Horst, B., Tacke, A., Zoffmann, G., Beleznai, C., Strobl, B., Helmut, G., Fernández, G.: VITUS: Video based Image analysis for Tunnel Safety. In: International Conference on Tunnel Safety and Ventilation (2006)

    Google Scholar 

  40. Commission of the European Communities: European transport policy for 2010: Time to decide. White Paper 370 (2001)

    Google Scholar 

  41. Schwabach, H., Harrer, M., Holzmann, W., Bischof, Fernández Domínguez, H.G., Nölle, M., Pflugfelder, R., Strobl, B., Tacke, A., Waltl, A.: Video Based Image Analysis for Tunnel Safety – VITUS-1: A Tunnel Video Surveillance and Traffic Control System. In: 12th World Congress on Intelligent Transport Systems (2005)

    Google Scholar 

  42. Center for Sensed Critical Infrastructure Research (CenSCIR) (2006), http://www.ices.cmu.edu/censcir/

  43. Akinci, B., Boukamp, F., Gordon, C., Huber, D., Lyons, C., Park, K.: A formalism for utilization of sensor systems and integrated project models for active construction quality control. Carnegie Mellon University, Pittsburgh, United States, ScienceDirect (2005)

    Google Scholar 

  44. Singhvi, V., Krause, A., Guestrin, C., Matthews, H.S., Garrett, J.H., Matthews, H.: Intelligent Lighting Control using Sensor Networks. In: Proceedings of SenSys 2005, San Diego, California, USA (2005)

    Google Scholar 

  45. Critical Information Infrastructure Research Co-ordination (CI2RCO): Deliverable D6, Report on the analysis and evaluation of CIIP R&D programmes (June 2, 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Alessandro Aldini Roberto Gorrieri

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lopez, J., Alcaraz, C., Roman, R. (2007). On the Protection and Technologies of Critical Information Infrastructures. In: Aldini, A., Gorrieri, R. (eds) Foundations of Security Analysis and Design IV. FOSAD FOSAD 2007 2006. Lecture Notes in Computer Science, vol 4677. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74810-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74810-6_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74809-0

  • Online ISBN: 978-3-540-74810-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics