On the Protection and Technologies of Critical Information Infrastructures

  • Javier Lopez
  • Cristina Alcaraz
  • Rodrigo Roman
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4677)

Abstract

Critical Infrastructures are complex and highly interconnected systems that are crucial for the well-being of the society. Any type of failure can cause significant damage, affecting one or more sectors due to their inherent interdependency. Not only the infrastructures are critical, but also the information infrastructures that manage, control and supervise them. Due to the seriousness of the consequences, the protection of these critical (information) infrastructures must have the highest priority. It is the purpose of this book chapter to review and discuss about these infrastructures, to explain their elements, and to highlight their research and development issues. This chapter will also discuss the role of Wireless Sensor Network (WSN) technology in the protection of these infrastructures.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Critical Infrastructure Programmable Logic Controller 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Definition of the word Infrastructure. Merriam Webster’s Collegiate Dictionary (11th edn.), Springfield, MA (2003)Google Scholar
  2. 2.
    National Research Council, Dahms, L.: Infrastructure for the 21st century - framework for a research agenda. National Academy Press, Washington, D.C. (1987)Google Scholar
  3. 3.
    Critical Information Infrastructure Research Co-ordination (CI2RCO). Deliverable D12, ICT R&D for CIIP: Towards a European Research Agenda (April 13, 2007)Google Scholar
  4. 4.
    Definition of the word Critical: Merriam Webster’s Collegiate Dictionary (11th edn.), Springfield, MA (2003)Google Scholar
  5. 5.
    Commission of the European Communities: Communication from the Commission to the Council and the European Parliament: Critical Infrastructure Protection in the Fight Against Terrorism, COM (2004) 702 final, Brussels (2004)Google Scholar
  6. 6.
    Congress of the United States of America: USA PATRIOT ACT. Public Law, 107–156, Washington, D.C. (2001)Google Scholar
  7. 7.
    Analysis and Assessment for Critical Infrastructure Protection (ACIP). Deliverable D1.1 (August 31, 2002)Google Scholar
  8. 8.
    Metzger, J.: The Concept of Critical Infrastructure Protection (CIP). In: Business and Security: Public-Private Sector Relationships in a New Security Environment, pp. 197–209. Oxford University Press, Oxford (2004)Google Scholar
  9. 9.
    Dunn, M., Abele-Wigert, I.: The International CIIP Handbook 2006: An Inventory of Protection Policies in 20 Countries and 6 International Organizations (vol. I) (Zurich, Center for Security Studies, 2006)Google Scholar
  10. 10.
    Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems. In: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-30, Washington, D.C. (2002)Google Scholar
  11. 11.
    Radvanovksy, R.: Critical Infrastructure: Homeland Security and Emergency Preparedness. CRC Press, Boca Raton (2006)Google Scholar
  12. 12.
    Rinaldi, S., Peerenboom, J., Kelly, T.: Identifying, understanding, and analyzing Critical infrastructure interdependencies. IEEE Control Systems Magazine 21, 11–25 (2001)CrossRefGoogle Scholar
  13. 13.
    President’s Commission on Critical Infrastructure Protection (PCCIP): Critical Foundations: Protecting America’s Infrastructures. Washington, D.C. (1997)Google Scholar
  14. 14.
    Landau, S., Stytz, M.R., Landwehr, C.E., Schneider, F.B.: Overview of Cyber Security: A Crisis of Prioritization. IEEE Security and Privacy 03(3), 9–11 (2005)CrossRefGoogle Scholar
  15. 15.
    Dunn, M.: Threat Frames in the US Cyber-Terror Discourse. In: Paper presentation at the 2004 British International Studies Association (BISA) Conference, Warwick (2004)Google Scholar
  16. 16.
    Bologna, S., Setola, R.: The need to improve local self-awareness in CIP/CIIP. In: Proceedings of First IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005), Darmstadt, Germany, pp. 84–89 (2005)Google Scholar
  17. 17.
    Dunn, M.: Understanding Critical Information Infrastructures: An Elusive Quest. In: Dunn, M., Mauer, V. (eds.) The International CIIP Handbook 2006: Analyzing Issues, Challenges, and Prospects (Zürich, Forschungsstelle für Sicherheitspolitik, 2006), vol. II, pp. 27–53 (2006)Google Scholar
  18. 18.
    Critical Information Infrastructure Research Co-ordination (CI2RCO): Deliverable D1, Common Understanding of CI2RCO-Basics (March 1, 2005)Google Scholar
  19. 19.
    Henriksen, S.: The Shift of Responsibilities within Government and Society. In: CRN Workshop Report. Societal Security and Crisis Management in the 21st Century, Stockholm, pp. 60–63 (2004)Google Scholar
  20. 20.
    Dunn, M.: The Socio-Political Dimensions of Critical Information Infrastructure Protection (CIIP). International Journal for Critical Infrastructure Protection 1(2/3), 258–268 (2005)CrossRefGoogle Scholar
  21. 21.
    Krutz, R.L.: Securing SCADA Systems. Wiley Publishing, Chichester (2005)Google Scholar
  22. 22.
    Malcolm Pirnie: Why Malcolm Pirnie Can your Configuration Needs. White Paper (2000), http://www.pirniecentral.com/Docs/MPI_Configure.html
  23. 23.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38(4), 393–422 (2002)Google Scholar
  24. 24.
    The Department of Homeland Security, Science and Technology Directorate: The National Plan for Research and Development in Support of Critical Infrastructure Protection. Washington, D.C. (2005)Google Scholar
  25. 25.
    Collaborative Business Items project (CoBIS) (2004-2007), http://www.cobis-online.de
  26. 26.
    Collin, J.: BP Tests RFID Sensor Network at U.K. Plant (2006), http://www.rfidjournal.com/article/articleview/2443/
  27. 27.
  28. 28.
    SMEPP Secure Middleware for Embedded Peer-to-Peer Systems (FP6-2005-IST-5) (2007), http://www.smepp.org
  29. 29.
    WINES II – Smart Infrastructure University of Cambridge and Imperial College, London (2006), http://www.winesinfrastructure.org
  30. 30.
    Distributed Intelligence, Sensing and Coordination in Variable Environments. CSIRO (2006), http://www.ict.csiro.au/page.php?cid=97
  31. 31.
    Ramanathan, N., Balzano, L., Estrin, D., Hansen, M., Harmon, T., Jay, J., Kaiser, W.J., Sukhatme, G.: Designing Wireless Sensor Networks as a Shared Resource for Sustainable Development. In: Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2006), Berkeley, USA (2006)Google Scholar
  32. 32.
    Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, Boca Raton (2006)Google Scholar
  33. 33.
    Alarifi, A., Du, W.: Diversifying Sensor Nodes to Improve Resilience Against Node Compromise. In: Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), Alexandria, USA (2006).Google Scholar
  34. 34.
    Park, T., Shin, K.G.: Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks. IEEE Transactions on Mobile Computing 4(3), 297–309 (2005)CrossRefGoogle Scholar
  35. 35.
    Law, Y.W., Doumen, J., Hartel, P.: Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks 2(1), 65–93 (2006)CrossRefGoogle Scholar
  36. 36.
    Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, Springer, Heidelberg (2004)Google Scholar
  37. 37.
    Alcaraz, C., Roman, R.: Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: Lopez, J. (ed.) CRITIS 2006. LNCS, vol. 4347, Springer, Heidelberg (2006)CrossRefGoogle Scholar
  38. 38.
    Critical Information Infrastructure Research Co-ordination (CI2RCO). Deliverable D10, Gap analysis of existing CIIP R&D programmes at regional, national and EU level. (September 29, 2006)Google Scholar
  39. 39.
    Schwabach, H., Harrer, M., Waltl, A., Horst, B., Tacke, A., Zoffmann, G., Beleznai, C., Strobl, B., Helmut, G., Fernández, G.: VITUS: Video based Image analysis for Tunnel Safety. In: International Conference on Tunnel Safety and Ventilation (2006)Google Scholar
  40. 40.
    Commission of the European Communities: European transport policy for 2010: Time to decide. White Paper 370 (2001)Google Scholar
  41. 41.
    Schwabach, H., Harrer, M., Holzmann, W., Bischof, Fernández Domínguez, H.G., Nölle, M., Pflugfelder, R., Strobl, B., Tacke, A., Waltl, A.: Video Based Image Analysis for Tunnel Safety – VITUS-1: A Tunnel Video Surveillance and Traffic Control System. In: 12th World Congress on Intelligent Transport Systems (2005)Google Scholar
  42. 42.
    Center for Sensed Critical Infrastructure Research (CenSCIR) (2006), http://www.ices.cmu.edu/censcir/
  43. 43.
    Akinci, B., Boukamp, F., Gordon, C., Huber, D., Lyons, C., Park, K.: A formalism for utilization of sensor systems and integrated project models for active construction quality control. Carnegie Mellon University, Pittsburgh, United States, ScienceDirect (2005)Google Scholar
  44. 44.
    Singhvi, V., Krause, A., Guestrin, C., Matthews, H.S., Garrett, J.H., Matthews, H.: Intelligent Lighting Control using Sensor Networks. In: Proceedings of SenSys 2005, San Diego, California, USA (2005)Google Scholar
  45. 45.
    Critical Information Infrastructure Research Co-ordination (CI2RCO): Deliverable D6, Report on the analysis and evaluation of CIIP R&D programmes (June 2, 2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Javier Lopez
    • 1
  • Cristina Alcaraz
    • 1
  • Rodrigo Roman
    • 1
  1. 1.Computer Science Department, University of MalagaSpain

Personalised recommendations