Technical Report Annual V-RMTC & T-RMN Experts’ Reunions &

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

17 March 2010 Workshop on Efficient and Effective eGovernment FASTeTEN : a Flexible Technology in Different European Administrative Contexts
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
PKI Implementation in the Real World
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
SAP Student Interest Group
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Users’ Authentication in the VRVS System David Collados California Institute of Technology November 20th, 2003TERENA - Authentication & Authorization.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Acting nationally, focusing regionally, envisioning globally
What is BizTalk ?
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Technical Report 7th V-RMTC & T-RMN Experts’ Reunion
Training for developers of X-Road interfaces
Building Distributed Educational Applications using P2P
Module Overview Installing and Configuring a Network Policy Server
Cryptography and Network Security
Securing the Network Perimeter with ISA 2004
V-RMTC Technical Report
V-RMTC 5+5 NET Exercise Support
Module 8: Securing Network Traffic by Using IPSec and Certificates
Public Key Infrastructure (PKI)
October 27, 2016 EMV 3DS Seizing the opportunity to enhance security and deliver a great consumer experience September 22, 2018.
Cryptography and Network Security
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
Security in ebXML Messaging
Message Digest Cryptographic checksum One-way function Relevance
Enterprise Service Bus (ESB) (Chapter 9)
Goals Introduce the Windows Server 2003 family of operating systems
HIMSS National Conference New Orleans Convention Center
Module 8: Securing Network Traffic by Using IPSec and Certificates
Introduction to Network Security
The Italian Academic Community’s Electronic Voting System
Unit 8 Network Security.
Advanced Computer Networks
September 2002 CSG Meeting Jim Jokl
Development roadmap of Suomi.fi-services
Designing IIS Security (IIS – Internet Information Service)
Module 4 System and Application Security
Cryptography and Network Security
Presentation transcript:

Technical Report Annual V-RMTC & T-RMN Experts’ Reunions & 6th V-RMTC & T-RMN Meeting Technical Report Lt.Cdr. Sergio CIANNAMEA Italian Navy Communications & Informatics Centre Head, Command and Intelligence Systems Division C4ISR Systems Project Officer sergio.ciannamea@marina.difesa.it Rome, IT 30 Nov - 3 Dec 2010

Agenda V-RMTC Model System Web Portal Main Features PKI Situation Way Ahead

Agenda V-RMTC Model System 3

Applications A standard V-RMTC Model system is composed by a suite of three applications, developed by Italian Navy: Client application (MERSIT Client v.3.4) manage and store data of each NOC, on a local PC deliver national reports to CINCNAV [Data Fusion Hub (DFH)] Converter (AIS-2-MERSIT v. 2.0) transform AIS data (NMEA 0183) into MERSIT or OTH-T Gold format Webserver application (Web Portal v.2009) allow DFH to receive Reports manage a common tracks database publish the common picture into a secure Website (https://), where a minor Information area is available.

MERSIT Client v.3.4 INTERNET MERSIT (MERchant vessels SITuation): formatted-message created to manage and store data of each NOC, on a local PC, and to deliver national reports to CINCNAV [Data Fusion Hub (DFH)] INTERNET OTH-Gold/AIS/XML/ XLS/MerSit (ARR-DEP-NAV) NAVAL OPS CENTER

MERSIT Client v.3.4 INTERNET MERSIT (MERchant vessels SITuation): following formatted reports, depending on National systems’ output, can be imported into the system by dedicated plug-in developed “ad-hoc” by MARITELE Roma: - .csv .ms .xls OTH–T-Gold Locator Sistram Oasis INTERNET OTH-Gold/AIS/XML/ XLS/MerSit (ARR-DEP-NAV) NAVAL OPS CENTER

AIS-2-MERSIT v.2.0 INTERNET NMEA 0183 MERSIT AIS2MERSIT AIS2GOLD INTERNET OTH-Gold/AIS/XML/ XLS/MerSit (ARR-DEP-NAV) THE VIRTUAL REGIONAL MARITIME TRAFFIC CENTRE (V-RMTC), ORIGINATED AS A PILOT PROJECT DURING THE FIFTH EDITION OF THE VENICE SYMPOSIUM, IS A PRACTICAL DEMONSTRATION OF SUCH A COMMON WILL TO COOPERATE AND TO ACTUALLY “TURN WORDS INTO ACTIONS”. AS A MATTER OF FACT, BY GATHERING A DIVERSIFIED COMMUNITY, THE V-RMTC IS ALSO A UNIQUE PARTNERSHIP BUILDING OPPORTUNITY FOR PARTICIPATING COUNTRIES. THE V-RMTC FOCUSES ON INFORMATION EXCHANGE ON MERCHANT SHIPPING INBOUND, OUTBOUND AND WITHIN THE MEDITERRANEAN AND BLACK SEAS. ON THE 20TH OF SEPTEMBER 2006, THE PROJECT ENTERED ITS FULL OPERATIONAL CAPABILITY PHASE. ON OCTOBER 12TH 2006, ACCORDING TO THE INTENTS REPORTED BY THE V-RMTC COMMUNITY MEMBERS, A DEDICATED SIGNING CEREMONY OF THE OPERATIONAL ARRANGEMENT WAS HELD DURING THE VENICE SYMPOSIUM. THIS EVENT, BESIDES ADDING VALUE TO THE SYMPOSIUM, CONFIRMED THE IMPORTANT ROLE OF COOPERATION & DIALOGUE TO ACHIEVE CONCRETE RESULTS FOR THE IMPROVEMENT OF MARITIME SECURITY. ON THE WHOLE, 17 NAVIES SIGNED THE OPERATIONAL ARRANGEMENT. FURTHERMORE, (CLICK) GERMANY AND BULGARIA RECENTLY COMPLETED THE JOINING PROCESS, CLOSING 2007 WITH THE ADDITION OF TWO NEW MEMBERS TO THE V-RMTC WIDER COMMUNITY. AS A MATTER OF FACT, CONSIDERING THE ONGOING BILATERAL EXCHANGE WITH LEBANON AND THE SPECIAL V-RMTC NET ACTIVATED WITHIN THE 5+5, THE V-RMTC MODEL IS CURRENTLY ADOPTED BY 25 NAVIES. NAVAL OPS CENTER 7

AIS-2-MERSIT v.2.0 INTERNET DB DFH CINCNAV RADAR STATIONS MPA SHIPS AIS2GOLD INTERNET MPA AIS2MERSIT AIS2GOLD SHIPS AIS2MERSIT AIS2GOLD NAVAL OPS CENTER N1 MERSIT CLIENT NAVAL OPS CENTER N… MERSIT CLIENT NAVAL OPS CENTER N2 MERSIT CLIENT

Web Portal v.2009 THE VIRTUAL REGIONAL MARITIME TRAFFIC CENTRE (V-RMTC), ORIGINATED AS A PILOT PROJECT DURING THE FIFTH EDITION OF THE VENICE SYMPOSIUM, IS A PRACTICAL DEMONSTRATION OF SUCH A COMMON WILL TO COOPERATE AND TO ACTUALLY “TURN WORDS INTO ACTIONS”. AS A MATTER OF FACT, BY GATHERING A DIVERSIFIED COMMUNITY, THE V-RMTC IS ALSO A UNIQUE PARTNERSHIP BUILDING OPPORTUNITY FOR PARTICIPATING COUNTRIES. THE V-RMTC FOCUSES ON INFORMATION EXCHANGE ON MERCHANT SHIPPING INBOUND, OUTBOUND AND WITHIN THE MEDITERRANEAN AND BLACK SEAS. ON THE 20TH OF SEPTEMBER 2006, THE PROJECT ENTERED ITS FULL OPERATIONAL CAPABILITY PHASE. ON OCTOBER 12TH 2006, ACCORDING TO THE INTENTS REPORTED BY THE V-RMTC COMMUNITY MEMBERS, A DEDICATED SIGNING CEREMONY OF THE OPERATIONAL ARRANGEMENT WAS HELD DURING THE VENICE SYMPOSIUM. THIS EVENT, BESIDES ADDING VALUE TO THE SYMPOSIUM, CONFIRMED THE IMPORTANT ROLE OF COOPERATION & DIALOGUE TO ACHIEVE CONCRETE RESULTS FOR THE IMPROVEMENT OF MARITIME SECURITY. ON THE WHOLE, 17 NAVIES SIGNED THE OPERATIONAL ARRANGEMENT. FURTHERMORE, (CLICK) GERMANY AND BULGARIA RECENTLY COMPLETED THE JOINING PROCESS, CLOSING 2007 WITH THE ADDITION OF TWO NEW MEMBERS TO THE V-RMTC WIDER COMMUNITY. AS A MATTER OF FACT, CONSIDERING THE ONGOING BILATERAL EXCHANGE WITH LEBANON AND THE SPECIAL V-RMTC NET ACTIVATED WITHIN THE 5+5, THE V-RMTC MODEL IS CURRENTLY ADOPTED BY 25 NAVIES.

X Information Flow Internet DFH V-RMTC Community Userid Password OTH-Gold/AIS/XML/ XLS/MerSit (ARR-DEP-NAV) OTH-Gold/AIS/RADAR/ XML/XLS/MerSit (ARR-DEP-NAV) OTH-Gold/AIS/XML/ XLS/MerSit (ARR-DEP-NAV) Live Secure Web Information Portal RMMP COP NMEA 0183 THE VIRTUAL REGIONAL MARITIME TRAFFIC CENTRE (V-RMTC), ORIGINATED AS A PILOT PROJECT DURING THE FIFTH EDITION OF THE VENICE SYMPOSIUM, IS A PRACTICAL DEMONSTRATION OF SUCH A COMMON WILL TO COOPERATE AND TO ACTUALLY “TURN WORDS INTO ACTIONS”. AS A MATTER OF FACT, BY GATHERING A DIVERSIFIED COMMUNITY, THE V-RMTC IS ALSO A UNIQUE PARTNERSHIP BUILDING OPPORTUNITY FOR PARTICIPATING COUNTRIES. THE V-RMTC FOCUSES ON INFORMATION EXCHANGE ON MERCHANT SHIPPING INBOUND, OUTBOUND AND WITHIN THE MEDITERRANEAN AND BLACK SEAS. ON THE 20TH OF SEPTEMBER 2006, THE PROJECT ENTERED ITS FULL OPERATIONAL CAPABILITY PHASE. ON OCTOBER 12TH 2006, ACCORDING TO THE INTENTS REPORTED BY THE V-RMTC COMMUNITY MEMBERS, A DEDICATED SIGNING CEREMONY OF THE OPERATIONAL ARRANGEMENT WAS HELD DURING THE VENICE SYMPOSIUM. THIS EVENT, BESIDES ADDING VALUE TO THE SYMPOSIUM, CONFIRMED THE IMPORTANT ROLE OF COOPERATION & DIALOGUE TO ACHIEVE CONCRETE RESULTS FOR THE IMPROVEMENT OF MARITIME SECURITY. ON THE WHOLE, 17 NAVIES SIGNED THE OPERATIONAL ARRANGEMENT. FURTHERMORE, (CLICK) GERMANY AND BULGARIA RECENTLY COMPLETED THE JOINING PROCESS, CLOSING 2007 WITH THE ADDITION OF TWO NEW MEMBERS TO THE V-RMTC WIDER COMMUNITY. AS A MATTER OF FACT, CONSIDERING THE ONGOING BILATERAL EXCHANGE WITH LEBANON AND THE SPECIAL V-RMTC NET ACTIVATED WITHIN THE 5+5, THE V-RMTC MODEL IS CURRENTLY ADOPTED BY 25 NAVIES. Maritime Tracks Data Fusion Hub Server X CINCNAV (NOC1) NOC2 NOCn MERSIT DFH Track Database

Hardware & Software B-E LEBANON lebanon.marina.difesa.it B-E ….. NET

Agenda Web Portal Main Features 12

Web Portal v.2009 NEWS DOCS FORUM CHAT OFFLINE - DB CBT MANUALS GIS

Web Portal v.2009 NEWS Area, managed by DFC (Data Fusion Center), used to inform about news, events and more...

Web Portal v.2009 DOCS Area, managed by DFC, used to share Documents and Files of interest (Statistics, General references, Patches...)

Web Portal v.2009 FORUM

Web Portal v.2009 “PRIVATE ROOM” CHAT CHAT with multichat and private room options... SINGLE CHAT SESSION: two users MULTI CHAT SESSION: more than two users “PRIVATE ROOM”

Web Portal v.2009 OFFLINE-DB Area, managed by the DFC, in which it’s possible to recover in xls format all data received and saved not more available in on-line Database.

(Computer Based Training) Web Portal v.2009 CBT (Computer Based Training) Step by Step video training area…

Web Portal v.2009 MANUALS

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Advanced function of encrypted e-mail exchange using PKI smart cards PKI Encrypted e-mail Advanced function of encrypted e-mail exchange using PKI smart cards Smart Card (no National certificate) Italian Navy management and delivery up to 2 cards for each Nation

Agenda PKI 30

PKI What is PKI: Public Key Infrastructure Comprehensive security technology and policies using cryptography and standards to enable users to: Identify (authenticate) themselves to network services Digitally sign email and other electronic docs and services Encrypt email and other documents to prevent unauthorized access

PKI What is a certificate: Signed data structure (x.509 standard) binds some information to a public key Trusted entity asserts validity of information in certificate, enforces policies for issuing certificates Certificate information is usually a personal identity or a server name Think of a certificate with its keys as an electronic: smart card, encoder/decoder ring, and official signet ring for sealing wax or notary-style stamp

PKI What is a certificate authority (CA): An organization that creates, publishes, and revokes certificates Verifies the information in the certificate Protects general security and policies of the system and its records Allows you to check certificates so you can decide whether to use them in business transactions CA = Certificate Authority RA = Registration Authority VA = Validation Authority

PKI Applications of PKI: Authentication and Authorization of Web users and servers This is the basis for the Secure Sockets Layer (SSL) and the Transport Layer Security (TLS) protocols used to secure web connections using https Server authentication is common, user authentication getting started Secure e-mail (signed and encrypted) Electronic signatures Data encryption Business documents, databases, executable code Network data protection (VPN, wireless) Secure instant messaging

PKI PKI Solutions: Italian Navy IDs Voting Anonymous value exchange Transit ticketing Credit cards Identification (passports and drivers licenses) Notarization (contract, emails, etc.) Software distribution Symmetric key management

Agenda Situation 36

V-RMTC Project x Dati In Dati Out Database V-RMTC RMMP

V-RMTC Project BELGIUM FRANCE GREECE ITALY MALTA NETHERLANDS PORTUGAL SPAIN BAHREIN KUWAIT OMAN QATAR SAUDI ARABIA UNITED ARAB EMIRATES BELGIUM FRANCE GREECE ITALY MALTA

T-RMN Project Database V-RMTC Dati In Dati Out sistema federato RMMP x

T-RMN Project

Agenda Way Ahead 41

the future…

SMART Project SMART stands for Service-oriented infrastructure for MARitime Traffic tracking. It represents the spiral evolution of the V-RMTC, a virtual network conceived and developed by the Italian Navy, connecting Operational Centers of participating Navies to share unclassified information on merchant shipping vessels. SMART is dedicated to the collection, processing and redistribution of maritime traffic data, received from multiple and heterogeneous sources using different communication technologies and messaging formats. In accordance with the Dialog and Cooperation concepts, SMART: seeks new solutions to make V-RMTC more attractive and convenient for the Communities; allows the automatic sharing of information under a federative approach; anticipates the solutions that will be developed by the ITN Integrated Interagency Maritime Surveillance System (SIIMS), within the EU MARSUR project

SMART Project Objectives: Spiral evolution; Portfolio of integrated web based solutions; Service-Oriented Architecture (SOA) based technology; OpenSource software; Share MSA data, gather from various sources and forms.

SMART Project SMART Central Module Front End Processor SOA systems Logical architecture: V-RMTC formats MERSIT, OTH-T-GOLD, XML, LOCATOR, XCTC, CSV, SDF EU MARSUR format EU COMMON MEXS XML AIS format NMEA 0138 VMS format Central Module Front End Processor SOA systems VTS format Web Portal GIS application Web Client SMART

SMART Project Tracks Correlation is based on following processes: T1 (MaxVel) Tracks Correlation is based on following processes: T1 (MinVel) T0 Main Functionalities: Administration GIS Monitoring Statistics Data Normalization; Track Correlation based on the static DBs (IMO + MMSI, Vessel Name, Call Sign, vessel type); Track Correlation based on the semi-static DBs (MMSI, Voyage, Port of destination); Track Correlation based on the dynamic DBs (position, course, speed);

SMART Project Main Functionalities: Administration GIS Monitoring Statistics

CWID 2010

CWID 2010 Austria Korea Japan Singapore Switzerland HS/HD FBI FEMA US/Coalition HS/HD Canada Germany, Italy, Finland USA U.K. Australia New Zealand NATO (SACT) Denmark, France, Hungary, Netherlands, Norway, Poland, Portugal, Romania, Spain, Sweden, Turkey. Austria Korea Japan Singapore Switzerland FBI FEMA 1st Responders NORTHCOM NGB USCG

CWID 2010

CWID 2010 Internet CWID-U Network CWID REAL WORLD ITN Focused on following Scenario Vignettes: HS/HD-08 - VOI (MV Lambert) with TBM Attack on Charleston, SC; HS/HD-10 - Arctic Sighting (non-AIS reporting maritime vessel); HS/HD-11 - VOI (SV Bertrand); CWID SMART Data Fusion Hub Server SSC Pacific, San Diego CWID-U Network USIT2.02 IDSM NSWC Dahlgren USIT3.37 MEVAT SSC Pacific, San Diego GCCS-J USJFCOM (COP broadcast) REAL WORLD XML (SOAP) XML (SOAP) XML (SOAP) XML (SOAP) OTH-T-Gold TCP/IP Internet FIREWALL OTH-T-Gold e-mail Web OTH-T-Gold e-mail Web Web Web Web Web OTH-T-Gold e-mail XML (SOAP) XML (SOAP) + TCP/IP T-RMN ITN COMMCEN Rome, IT #2 Role Players NSWC Dahlgren #2 Role Players USNORTHCOM #3 Role Players CFEC Shirley Bay #1 Role Player USJFCOM Live T-RMN Tracks + SMART Central Track DB Lt Cdr Sergio Ciannamea +39 06 3680 9334 - sergio.ciannamea@marina.difesa.it Service-oriented infrastructure for MARitime Traffic tracking Architecture v.1.6 CWID 2010 RMPs, COPs & VOIs = SMART COP

CWID 2011

Q & A Time STRATEGICITÀ ?