Zolesi B. 1, Belehaki A. 2, Tsagouri I. 2, Altadill D. 3, and Morelli M. 4 1 Istituto Nazionale di Geofisica e Vulcanologia, Rome, Italy, 2 National Observatory.

Slides:



Advertisements
Similar presentations
h Protection from cyber attacks is achieved by acting on several levels: first, at the physical and material, placing the server in a place as safe as.
Advertisements

New HF/MF Digital Maritime Mobile Systems
B. Zolesi *, Lj.R. Cander **, A. Belehaki ***, I.Tsagouri ***, M.Pezzopane * and S.Pau * Istituto Nazionale di Geofisica e Vulcanologia, Italy; ** Rutherford.
Performance Testing - Kanwalpreet Singh.
The SWING Project: status and closure of the project Bruno Zolesi. Istituto Nazionale di Geofisica e Vulcanologia.
System’s generalities and structure of the final report Cesidio Bianchi. INGV.
Data Communication lecture10
INGV-CNIT-NOA-EO Project presented in the ambit of CIPS program SWING Short Wave critical Infrastructure Network based on new Generation of.
INGV-CNIT-NOA-EO Plenary meeting – First year activities Short Wave critical Infrastructure Network based on new Generation of high survival.
HF management communication system and link optimization Bruno Zolesi. Istituto Nazionale di Geofisica e Vulcanologia.
1.1 Chapter 1 Introduction Lecture # 1 – 2 Ali Mustafa.
Identification of Critical Infrastructures in the Mediterranean Sea context and communications’ criticalities Irene Fiorucci Cesidio Bianchi Istituto Nazionale.
Bruno Zolesi Istituto Nazionale di Geofisica e Vulcanologia The SWING Project: Headlines and Aims With the support of the Prevention,
Chapter 19: Network Management Business Data Communications, 4e.
Space Weather influence on satellite based navigation and precise positioning R. Warnant, S. Lejeune, M. Bavier Royal Observatory of Belgium Avenue Circulaire,
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
1-1 Introduction to Computer Networks and Data Communications.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
INTERNET CRITICALITIES Activation and deactivation of the emergency back-up network Fabrizio Cuccoli, Francesco Sermi RaSS CNIT UO Firenze.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Transmission Media / Channels. Introduction Provides the connection between the transmitter and receiver. 1.Pair of wires – carry electric signal. 2.Optical.
Rome, February 14, 2013 Status of the Project Report on the first year activities With the support of the Prevention, Preparedness and Consequence.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
High survival HF radio network Michele Morelli, Marco Moretti, Luca Sanguinetti CNIT- PISA.
Ebro Observatory, October 1st, 2013 Internet Failure and Physical Layer Architecture With the support of the Prevention, Preparedness and Consequence.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
Data Communications and Networks
Monday 13 th November GSY/050388/ © BAE SYSTEMS All Rights Reserved ESA Space Weather Applications Pilot Project Service Development.
ANSALDO: BACKGROUND experience in dependable Signalling Automation Systems experience in dependable Management Automation Systems experience in installation,
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Sharif University of Technology Physical layer: Wireless Transmission.
1 System Models. 2 Outline Introduction Architectural models Fundamental models Guideline.
Chapter 1 Introduction to Computer Networks and Data Communications Data Communications and Computer Networks: A Business User’s Approach.
Test Of Distributed Data Quality Monitoring Of CMS Tracker Dataset H->ZZ->2e2mu with PileUp - 10,000 events ( ~ 50,000 hits for events) The monitoring.
“SAFETY THROUGH QUALITY” Vessel Traffic Management and Information System on Romanian Danube ( Ro – RIS )
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Data Communications and Networking CSCS 311 Lecture 2 Amjad Hussain Zahid.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Chapter 7 Propagation The Ionosphere
The OSI Model.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
Lecturer: Jinglin Wang Student name: Hao Li Student ID:
Architectures of distributed systems Fundamental Models
FARGIS Seminar og Work Shop 16. – 17. mars 2004 Ved Reidar Kjennbakken.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
1 IGY The ALERT signal of ground level enhancements of solar cosmic rays: physics basis, the ways of realization and development Anashin V., Belov A.,
Adaphed from Rappaport’s Chapter 5
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Captain Robert Tremlett Infrastructure Communications Navigation (Light beacons, buoys, Terrestrial radio-navigation (including local GPS.
O PTIMAL SERVICE TASK PARTITION AND DISTRIBUTION IN GRID SYSTEM WITH STAR TOPOLOGY G REGORY L EVITIN, Y UAN -S HUN D AI Adviser: Frank, Yeong-Sung Lin.
Ad Hoc Network.
A GRID solution for Gravitational Waves Signal Analysis from Coalescing Binaries: preliminary algorithms and tests F. Acernese 1,2, F. Barone 2,3, R. De.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
1 Orthogonal Frequency- Division Multiplexing (OFDM) Used in DSL, WLAN, DAB, WIMAX, 4G.
Part 3  Transmission Media & EM Propagations.  Provides the connection between the transmitter and receiver. 1.Pair of wires – carry electric signal.
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
Quasi-Longitudinal approximations applied to ionospheric ray tracing and absorption Alessandro Settimi a,*, Carlo Scotto a a Istituto Nazionale di Geofisica.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
© ExplorNet’s Centers for Quality Teaching and Learning 1 Select appropriate hardware for building networks. Objective Course Weight 2%
Radio Wave Propagation
Performance of long-distance VHF-band communication links based on scattering from perturbed Ionosphere. מציגים : יואב צידון שי ביטון מנחה : פרופ ' נתן.
Port Knocking Benjamin DiYanni.
French Port Cybersecurity Initiative
An IP-based multimedia traffic generator
CHAPTER 3 Architectures for Distributed Systems
Basic Concept of the GMDSS
Presentation transcript:

Zolesi B. 1, Belehaki A. 2, Tsagouri I. 2, Altadill D. 3, and Morelli M. 4 1 Istituto Nazionale di Geofisica e Vulcanologia, Rome, Italy, 2 National Observatory of Athens, Athens, Greece 3 Observatori de l’Ebre, Roquetes, Spain, 4 Consorzio Nazionale Interuniversitario per le Telecomunicazioni, Parma, Italy SWING (Short Wave critical Infrastructure Network based on a new Generation high survival radio communication system) is an European project aimed at studying a large survival high frequency (HF) radio network to link European Critical Infrastructures (ECIs) and Controlling Governmental Agencies (CGAs) among themselves. This system is thought to replace broad band internet transmission, maintaining the minimum flux of essential information for the ECIs management and control, in case of wide scale terrorist attacks able to put out of order internet links over the Mediterranean region. SWING is designed to evaluate the threat and increase the security awareness, as well as the level of protection, of analogous and/or interdependent ECIs. The project has to develop the standard software and hardware tools necessary for implementing communication protocols suited for a reliable and interoperable Short Wave HF radio network back up. Therefore, SWING must also analyze the HF network requirements necessary for alerting and controlling ECIs in case of threat or attack, understand the particular characteristics of the ionospheric channel in order to establish safe HF radio links. It is foreseen a suitable frequency management system for the frequencies selection and a study of a HF radio network architecture for Southern Europe. The use of proper ionospheric channels for data communication requires, in fact, the support of a geomagnetic and ionospheric awareness to provide information on the terrestrial effects generated by the arrival of interplanetary disturbances. Particularly intense solar events can affect the geomagnetic field and ionospheric plasma, changing the ionospheric structure consequently affecting the propagation the HF band. The table summarizes the coordinates, the azimuth and the distances between the selected CGA and the corresponding ECIs. The figure shows on the map the links between the CGA and the three ECIs. MOTIVATION: The Council Directive of the European Union has established, by means of the promulgation of the Directive 2008/114/EC, the requirements for the identification and designation of European Critical Infrastructures and the assessment of the need to improve their protection. In this Directive the interest is focused only on the Energy and Transport sectors, considered strategically important. In SWING project we have focused on the maritime sub-sector and individuated three ports in the Mediterranean area as possible ECIs: Barcelona (Spain), Palermo (Italy) and Pireo (Athens-Greece). INTERNET CRITICALITIES OF ECIS AND CGAS Security threats began more and more sophisticated. The numerous kind of threats and intrusions to the web services include a huge variety of Malwares which infect users computers, leakage of personal information, phishing by means of subtle messages and other kind of attacks like Denial-of-Services (DoS) and Distributed Denial of Services (DDoS). DOS A Denial-of-Service (DoS) attack is designed to hinder or stop the normal functioning of a web site, server or other network resource. There are various ways for hackers to achieve this. One common method is to flood a server by sending it more requests than it is able to handle. This will make the server run slower than usual (and web pages will take much longer to open), and may crash the server completely. DDOS A distributed-Denial-of-Service (DDoS) attack differs only in the fact that this dangerous threat/attack is conducted using multiple machines. The hacker typically uses one compromised machine as the ‘master’ and co-ordinates the attack across other, so-called ‘zombie’, machines. Among the numerous functions of the port authorities (search and rescue at sea, safety of navigation, maritime security, protection of the marine environment etc.) only the maritime traffic control is considered here. In this context the Operative Room (OR) of the CGA receives data from 100 very high frequency (VHF) transponders concerning the traffic of the vessels in the Mediterranean Sea under the control of Italian CGA. These data are exchanged by means of an AIS-VTS system. AIS: The system named Automatic Identification System (AIS) operates as an electronic transponder installed on a boat or vessel that continuously transmits a VHF signal containing information including its name, call sign, type and position etc. VTS: Vessel Traffic Services (VTS) are systems intended to establish maritime safety in particular areas of dense shipping. The VTS infrastructure typically consists of a station onshore where the staff maintains a picture of the local maritime traffic. Each vessel exchanges approximately 1 kbit with the nearest AIS-VTS. Considering the normal vessels traffic (a hundred of vessels in the sector of competence), the minimum amount of information in this simulated scenario can reach about 100 kbit. GENERAL REQUIREMENTS FOR BACK UP HF NETWORK IN CASE OF AN INTERNET FAILURE SCENARIO : Since the technological features and ionospheric channel limit the interval of the operative frequency which can be used to establish the HF link, a frequency management system is necessary for the correct functioning of the SWING network. The main constraints derive from the ionospheric channel conditions which limit the data throughput especially in disturbed SW conditions. Most reasonable scenarioWorst case scenario 1) Communications between GCAs and ECIs must be guaranteed at least 90% of the day. 2) Each HF terminal must be provided with a pool of frequencies to select the best operating frequencies at each month, day and hour 3) TX power and receiver sensibility must be designed by taking into account the fading characteristics of the HF channel 4) The channel bandwidth, the modulation format and coding rate must be designed on the basis of the desired data throughput 5) SWING must provide half-duplex voice link and data link 6) A supervisor control system must recognize when the internet communications fails so as to activate the SWING network in less than 15 minutes. COMMON PROPAGATING PHENOMENA OF IONOSPHERIC CHANNEL MAIN CAUSES OF SIGNAL DEGRADATION DUE TO SW MAIN EFFECT ON THE SIGNAL reflectionIrregularities at different spatial scales time delay (ms) refraction (depending on the refractive index) Irregularities at different spatial scales spreading, differential group delay absorptionsudden ionization of the lower ionospheric regions (D, E) deep fading due to SID (tens of dB) multiple reflectionsdefocusing layers (spread F etc.) multipath fading at different time and spatial scales diffraction, scatteringIrregularities at different volume spatial scales Short and long term fading Doppler effectMotion of the ionospheric layers and time-dependent variation of electron density profiles. frequency shifting and phase distortion PROPAGATING PHENOMENA IN CASE OF SPACE WEATHER (SW) CONCLUSIONS Radio communications in Mediterranean region have to take into account the Space Weather effects. The SWING project is aimed to guarantee transmission of the minimal amount of information necessary to maintain communication control among ECIs and CGAs, even in very critical conditions. This project has to consider a radio propagating scenario that could be very degraded, and to be able to mitigate SW phenomena. S W disturbances time scale in the HF channel 10 th European Space Weather week November 18-22, 2013 ANTWERP, Belgium