Scroll Top

CRISIS

Interconnected Sensor Networks for Critical Information Infrastructure Protection

Project Overview: 

CRISIS is mainly focused on the design of security solutions for Critical Information Infrastructures (CIIs) by means of the development of protection, control and evaluation mechanisms. These solutions use Wireless Sensor Networks (WSNs)[1] as a main technological platform because that technology facilitates a distributed control and allow the different components of the network to remain operative, even in crisis situations[2][3][4].

In order to guarantee the faultless interoperability of the protection, control and evaluation mechanisms, new security services had to be created and integrated into a Service-Oriented Architecture. This Architecture was specifically devised for Critical Infrastructures (and in particular for SCADA systems[5][6]) using a trust management model, which was also designed for this purpose.

Finally, the Architecture was validated and verified in different ways. On one hand, we designed and developed management and maintenance systems embedded into the Architecture, such as Early Warning, Dynamic Reconfiguration and Auditing Systems. On the other hand, with the aim of providing support for the infrastructure, some tools for decision support and risk assessment were also provided[7]. Lastly, an integration analysis of WSNs into the Internet and a security analysis were carried out. The idea were to study the feasibility of using the WSN technology in different critical scenarios, such as First Responders and SCADA systems[8].

The results of the CRISIS project have been very varied, in terms of protection[9][10][11][12][13][14][15][16][17][5][6][18] and defense[19][7][1][20], as also indicated below in the references section.

References

  1. Javier Lopez and Rodrigo Roman and Cristina Alcaraz (2009): Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. In: Foundations of Security Analysis and Design 2009, pp. 289-338, Springer Berlin/Heidelberg Springer Berlin/Heidelberg, Bertinoro (Italy), 2009, ISSN: 0302-9743 (Print) 1611-3349 (Online).
  2. Cristina Alcaraz and Rodrigo Roman (2006): Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: 1st International Workshop on Critical Information Infrastructures Security (CRITIS’06), pp. 166-178, Springer Berlin / Heidelberg Springer Berlin / Heidelberg, 2006, ISSN: 0302-9743 (Print) 1611-3349 (Online).
  3. Javier Lopez and Cristina Alcaraz and Rodrigo Roman (2007): On the Protection and Technologies of Critical Information Infrastructures.. In: On Foundations of Security Analysis and Design IV, FOSAD 2006/2007, Springer, vol. 4677, pp. 160-182, 2007, ISSN: 0302-9743, (10.1007/978-3-540-74810-6_6).
  4. Rodrigo Roman and Cristina Alcaraz and Javier Lopez (2007): The Role of Wireless Sensor Networks in the Area of Critical Information Infrastructure. In: Information Security Technical Report, vol. 12, no. 1, pp. 24-31, 2007, ISSN: 1363-4127.
  5. Cristina Alcaraz and Gerardo Fernandez and Rodrigo Roman and Angel Balastegui and Javier Lopez (2008): Gestión segura de redes SCADA. In: Nuevas tendencias en gestión de redes, Novática, no. 196, pp. 20-25, 2008, ISSN: 0211-2124.
  6. Cristina Alcaraz and Gerardo Fernandez and Rodrigo Roman and Angel Balastegui and Javier Lopez (2008): Secure Management of SCADA Networks. In: Novatica, New Trends in Network Management, vol. 9, no. 6, pp. 22-28, 2008, ISSN: 1684-5285.
  7. Cristina Alcaraz and Isaac Agudo and Carmen Fernandez-Gago and Rodrigo Roman and Gerardo Fernandez and Javier Lopez (2009): Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. In: 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’09), pp. 86-94, Springer-Verlag Springer-Verlag, Linz, Austria, 2009, ISBN: 978-3-642-03747-4.
  8. Rodrigo Roman and Javier Lopez and Cristina Alcaraz (2009): Do Wireless Sensor Networks Need to be Completely Integrated into the Internet?. In: 3rd CompanionAble Workshop - Future Internet of People, Things and Services (IoPTS) eco-Systems, pp. xxxx, xxxx xxxx, Brussels (Belgium), 2009.
  9. David Galindo and Rodrigo Roman and Javier Lopez (2012): On the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks. In: Wireless Communications and Mobile Computing, vol. 12, pp. 133-143, 2012, ISSN: 1530-8669.
  10. Isaac Agudo and Carmen Fernandez-Gago and Javier Lopez (2010): A Scale Based Trust Model for Multi-Context Environments. In: Computers and Mathematics with Applications, vol. 60, pp. 209-216, 2010, ISSN: 0898-1221.
  11. Jose L. Vivas and Carmen Fernandez-Gago and Andres Benjumea and Javier Lopez (2010): A security framework for a workflow-based grid development platform.. In: Computer Standards and Interfaces, vol. 32, no. 5-6, pp. 230-245, 2010, ISSN: 0920-5489.
  12. Jordi Forne and M. Francisca Hinarejos and Andres Marin and Florina Almenarez and Javier Lopez and Jose A. Montenegro and Marc Lacoste and Daniel Diaz (2010): Pervasive Authentication and Authorization Infrastructures for Mobile Users. In: Computer and Security, vol. 29, pp. 501-514, 2010, ISSN: 0167-4048.
  13. Javier Lopez and Rodrigo Roman and Isaac Agudo and Carmen Fernandez-Gago (2010): Trust Management Systems for Wireless Sensor Networks: Best practices. In: Computer Communications, vol. 33, no. 9, pp. 0140-3664, 2010, ISSN: 0140-3664.
  14. Isaac Agudo and Carmen Fernandez-Gago and Javier Lopez (2009): Concurrent access control for multi-user and multi-processor systems based on trust relationships. In: Concurrency and Computation: Practice and Experience, vol. 21, pp. 1389-1403, 2009, ISSN: 1532-0626.
  15. Rodrigo Roman and Javier Lopez (2009): Integrating Wireless Sensor Networks and the Internet: A Security Analysis. In: Internet Research, vol. 19, no. 2, pp. 246-259, 2009, ISSN: 1066-2243.
  16. Pablo Najera and Francisco Moyano and Javier Lopez (2009): Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. In: Journal of Universal Computer Science, vol. 15, pp. 970-991, 2009, ISSN: 0948-695X.
  17. Vicente Benjumea and Javier Lopez and Jose M. Troya (2008): Anonymity Analysis in Credentials-based Systems: A Formal Framework. In: Computer Standards & Interfaces, vol. 30, no. 4, pp. 253-261, 2008, ISSN: 0920-5489.
  18. Rodrigo Roman and Cristina Alcaraz and Javier Lopez (2007): A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. In: Mobile Networks and Applications, vol. 12, no. 4, pp. 231-244, 2007, ISSN: 1383-469X.
  19. Cristina Alcaraz and Javier Lopez (2010): A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems. In: IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 40, no. 4, pp. 419-428, 2010, ISSN: 1094-6977.
  20. Rodrigo Roman and Javier Lopez and Stefanos Gritzalis (2008): Situation Awareness Mechanisms for Wireless Sensor Networks. In: IEEE Communications Magazine, vol. 46, no. 4, pp. 102-107, 2008, ISSN: 0163-6804.