V-RMTC Technical Report

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Lecture 23 Internet Authentication Applications
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Web services security I
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Creating and Managing Digital Certificates Chapter Eleven.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Key management issues in PGP
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Technical Report 7th V-RMTC & T-RMN Experts’ Reunion
Technical Report Annual V-RMTC & T-RMN Experts’ Reunions &
Cryptography and Network Security
Secure Sockets Layer (SSL)
Securing the Network Perimeter with ISA 2004
V-RMTC 5+5 NET Exercise Support
Module 8: Securing Network Traffic by Using IPSec and Certificates
Public Key Infrastructure (PKI)
Using SSL – Secure Socket Layer
Cryptography and Network Security
Security in ebXML Messaging
Message Digest Cryptographic checksum One-way function Relevance
Goals Introduce the Windows Server 2003 family of operating systems
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Module 8: Securing Network Traffic by Using IPSec and Certificates
Introduction to Network Security
The Italian Academic Community’s Electronic Voting System
PKI (Public Key Infrastructure)
Unit 8 Network Security.
Advanced Computer Networks
September 2002 CSG Meeting Jim Jokl
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

V-RMTC Technical Report 5th V-RMTC 5+5 Net Experts’ Meeting V-RMTC Technical Report Lt.Cdr. Sergio CIANNAMEA Italian Navy Communications & Informatics Centre Head, Command and Intelligence Systems Division C4ISR Systems Project Officer sergio.ciannamea@marina.difesa.it Rome, IT 13 - 15 April 2010

Agenda V-RMTC Model System Web Portal Main Features PKI Situation Way Ahead

Agenda V-RMTC Model System 3

Applications A standard V-RMTC Model system is composed by a suite of three applications, developed by Italian Navy: Client application (MERSIT Client v.3.4) manage and store data of each NOC, on a local PC deliver national reports to CINCNAV [Data Fusion Hub (DFH)] Converter (AIS-2-MERSIT v.1.2) transform AIS data (NMEA 0183) into MERSIT format Webserver application (Web Portal v.2009) allow DFH to receive Reports manage a common tracks database publish the common picture into a secure Website (https://), where a minor Information area is available.

MERSIT Client v.3.4 Internet MERSIT (MERchant vessels SITuation): (ARR-DEP-NAV) NOC Internet MERSIT (MERchant vessels SITuation): formatted-message created to manage and store data of each NOC, on a local PC, and to deliver national reports to CINCNAV [Data Fusion Hub (DFH)]

MERSIT Client v.3.4 Internet MERSIT (MERchant vessels SITuation): (ARR-DEP-NAV) /OTH-Gold/CSV/ XLS/)…. NOC Internet MERSIT (MERchant vessels SITuation): following formatted reports, depending on National systems’ output, can be imported into the system by dedicated plug-in developed “ad-hoc” by MARITELE Roma: - .csv .ms .xls OTH–T-Gold Locator Sistram Oasis

AIS-2-MERSIT v.1.2 INTERNET 7 AIS2MERSIT OTH-Gold/AIS/XML/ XLS/MerSit NMEA 0183 MERSIT INTERNET OTH-Gold/AIS/XML/ XLS/MerSit (ARR-DEP-NAV) AIS2MERSIT NAVAL OPS CENTER 7

AIS-2-MERSIT v.1.2 INTERNET DB DFH CINCNAV RADAR STATIONS MPA SHIPS NAVAL OPS CENTER N1 MERSIT CLIENT NAVAL OPS CENTER N… MERSIT CLIENT NAVAL OPS CENTER N2 MERSIT CLIENT

Web Portal v.2009

X Information Flow Internet DFH V-RMTC Community Userid Password OTH-Gold/AIS/XML/ XLS/MerSit (ARR-DEP-NAV) OTH-Gold/AIS/RADAR/ XML/XLS/MerSit (ARR-DEP-NAV) OTH-Gold/AIS/XML/ XLS/MerSit (ARR-DEP-NAV) Live Secure Web Information Portal RMMP COP NMEA 0183 Maritime Tracks Data Fusion Hub Server X CINCNAV (NOC1) NOC2 NOCn MERSIT DFH Track Database

Hardware & Software B-E LEBANON lebanon.marina.difesa.it B-E ….. NET

Agenda Web Portal Main Features 12

Web Portal v.2009 NEWS DOCS FORUM CHAT OFFLINE - DB CBT MANUALS GIS

Web Portal v.2009 NEWS Area, managed by DFC (Data Fusion Center), used to inform about news, events and more...

Web Portal v.2009 DOCS Area, managed by DFC, used to share Documents and Files of interest (Statistics, General references, Patches...)

Web Portal v.2009 FORUM

Web Portal v.2009 “PRIVATE ROOM” CHAT CHAT with multichat and private room options... SINGLE CHAT SESSION: two users MULTI CHAT SESSION: more than two users “PRIVATE ROOM”

Web Portal v.2009 OFFLINE-DB Area, managed by the DFC, in which it’s possible to recover in xls format all data received and saved not more available in on-line Database.

(Computer Based Training) Web Portal v.2009 CBT (Computer Based Training) Step by Step video training area…

Web Portal v.2009 MANUALS

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Web Portal v.2009 GIS MY MAP OVERLAY Advanced filters (vessel type, Mersit type, VoI) Ref Points Dead Reckoning History Points Advanced Search tools VoI

Advanced function of encrypted e-mail exchange using PKI smart cards PKI Encrypted e-mail Advanced function of encrypted e-mail exchange using PKI smart cards Smart Card (no National certificate) Italian Navy management and delivery up to 2 cards for each Nation

PKI Encrypted e-mail First Request: Oct 5, 2009 Second Request: Jan 26, 2010 NATION DELIVERED SMART CARD Algeria - France Italy 7 Libia 2 Malta Mauritania Morocco Portugal Spain Tunisia

PKI Encrypted e-mail First Request: Oct 5, 2009 Second Request: Jan 26, 2010 NATION DELIVERED SMART CARD Algeria - France Italy 7 Libia 2 Malta Mauritania Morocco 1 Portugal Spain Tunisia

Agenda PKI 32

PKI In this scheme, each party generates a public/private key pair and distributes the public key. After obtaining an authentic copy of each other's public keys, Alice and Bob can compute a shared secret offline. In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. In some related signature schemes, the private key is used to sign a message; but anyone can check the signature using the public key. An unpredictable (typically a large randomly chosen) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm.

PKI What is PKI: Public Key Infrastructure Comprehensive security technology and policies using cryptography and standards to enable users to: Identify (authenticate) themselves to network services Digitally sign email and other electronic docs and services Encrypt email and other documents to prevent unauthorized access

PKI Applications of PKI: Authentication and Authorization of Web users and servers This is the basis for the Secure Sockets Layer (SSL) and the Transport Layer Security (TLS) protocols used to secure web connections using https Server authentication is common, user authentication getting started Secure e-mail (signed and encrypted) Electronic signatures Data encryption Business documents, databases, executable code Network data protection (VPN, wireless) Secure instant messaging

PKI PKI Solutions: Italian Navy IDs Voting Anonymous value exchange Transit ticketing Credit cards Identification (passports and drivers licenses) Notarization (contract, emails, etc.) Software distribution Symmetric key management

PKI What is a certificate: Signed data structure (x.509 standard) binds some information to a public key Trusted entity asserts validity of information in certificate, enforces policies for issuing certificates Certificate information is usually a personal identity or a server name Think of a certificate with its keys as an electronic: smart card, encoder/decoder ring, and official signet ring for sealing wax or notary-style stamp

PKI What is a certificate authority (CA): An organization that creates, publishes, and revokes certificates Verifies the information in the certificate Protects general security and policies of the system and its records Allows you to check certificates so you can decide whether to use them in business transactions CA = Certificate Authority RA = Registration Authority VA = Validation Authority

Agenda Situation 39

V-RMTC Project x Dati In Dati Out Database V-RMTC RMMP

V-RMTC Project BELGIUM FRANCE GREECE ITALY MALTA NETHERLANDS PORTUGAL SPAIN BAHREIN KUWAIT OMAN QATAR SAUDI ARABIA UNITED ARAB EMIRATES BELGIUM FRANCE GREECE ITALY MALTA

T-RMN Project Database V-RMTC Dati In Dati Out sistema federato RMMP x

T-RMN Project

Agenda Way Ahead 44

SMART Project Main Goals: Develop new solutions to make V-RMTC more effective and convenient for the Communities, fulfilling the operational users’ needs; Allow the automatic sharing of information with the T-RMN partners’ federate systems.

SMART Project Objectives: Spiral evolution; Portfolio of integrated web based solutions; Service-Oriented Architecture (SOA) based technology; OpenSource software; Share MSA data, gather from various sources and forms.

SMART Project Objectives: Spiral evolution; Portfolio of integrated web based solutions; Service-Oriented Architecture (SOA) based technology; OpenSource software; Share MSA data, gather from various sources and forms.

SMART Project Objectives: Spiral evolution; Portfolio of integrated web based solutions; Service-Oriented Architecture (SOA) based technology; OpenSource software; Share MSA data, gather from various sources and forms.

SMART Project Objectives: Spiral evolution; Open Source modules: V-RMTC; BRITE (NATO); STIRES (SafeSeaNet). Objectives: Spiral evolution; Portfolio of integrated web based solutions; Service-Oriented Architecture (SOA) based technology; OpenSource software; Share MSA data, gather from various sources and forms.

SMART Project Objectives: Spiral evolution; Sources & Forms: MerSit, OTH-T-Gold, Locator, Binario, Excel, CSV, SDF, XCTC, XML (V-RMTC); EU COMMON MEXS XML (EU MARSUR); NMEA-0138 (AIS); VMS; VTS. Objectives: Spiral evolution; Portfolio of integrated web based solutions; Service-Oriented Architecture (SOA) based technology; OpenSource software; Share MSA data, gather from various sources and forms.

SMART Project V-RMTC EU MARSUR AIS VMS Central Module Logical architecture: V-RMTC EU MARSUR AIS VMS Central Module Front End Processor SOA systems VTS Web Portal GIS application Web Client

SMART Project Main Functionalities: Administration GIS Monitoring Statistics

SMART Project Main Functionalities: Administration GIS Monitoring Statistics

SMART Project Tracks Correlation is based on following processes: T1 (MaxVel) Tracks Correlation is based on following processes: T1 (MinVel) T0 Main Functionalities: Administration GIS Monitoring Statistics Data Normalization; Track Correlation based on the static DBs (IMO + MMSI, Vessel Name, Call Sign, vessel type); Track Correlation based on the semi-static DBs (MMSI, Voyage, Port of destination); Track Correlation based on the dynamic DBs (position, course, speed);

SMART Project Main Functionalities: Administration GIS Monitoring Statistics

SMART Project

CWID 2010

CWID 2010 Austria Korea Japan Singapore Switzerland HS/HD FBI FEMA US/Coalition HS/HD Canada Germany, Italy, Finland USA U.K. Australia New Zealand NATO (SACT) Denmark, France, Hungary, Netherlands, Norway, Poland, Portugal, Romania, Spain, Sweden, Turkey. Austria Korea Japan Singapore Switzerland FBI FEMA 1st Responders NORTHCOM NGB USCG

CWID 2010

CWID 2010 Internet CWID-U Network CWID REAL WORLD ITN Focused on following Scenario Vignettes: HS/HD-08 - VOI (MV Lambert) with TBM Attack on Charleston, SC; HS/HD-10 - Arctic Sighting (non-AIS reporting maritime vessel); HS/HD-11 - VOI (SV Bertrand); CWID SMART Data Fusion Hub Server SSC Pacific, San Diego CWID-U Network USIT2.02 IDSM NSWC Dahlgren USIT3.37 MEVAT SSC Pacific, San Diego GCCS-J USJFCOM (COP broadcast) REAL WORLD XML (SOAP) XML (SOAP) XML (SOAP) XML (SOAP) OTH-T-Gold TCP/IP Internet FIREWALL OTH-T-Gold e-mail Web OTH-T-Gold e-mail Web Web Web Web Web OTH-T-Gold e-mail XML (SOAP) XML (SOAP) + TCP/IP T-RMN ITN COMMCEN Rome, IT #2 Role Players NSWC Dahlgren #2 Role Players USNORTHCOM #3 Role Players CFEC Shirley Bay #1 Role Player USJFCOM Live T-RMN Tracks + SMART Central Track DB Lt Cdr Sergio Ciannamea +39 06 3680 9334 - sergio.ciannamea@marina.difesa.it Service-oriented infrastructure for MARitime Traffic tracking Architecture v.1.6 CWID 2010 RMPs, COPs & VOIs = SMART COP

Q&A Time STRATEGICITÀ ?