TY - GEN
T1 - Information assurance in critical infrastructures via wireless sensor networks
AU - Albano, Michele
AU - Chessa, Stefano
AU - Pietro, Roberto Di
PY - 2008/11/10
Y1 - 2008/11/10
N2 - Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; so that action could be undertaken when anomalies arise, to avoid more severeconsequences to the infrastructure. In this paper, we relax the hypothesis of intervening when anomalies are detected: we focus on sensed data surviv-ability. Specifically, we study this problem in a specific critical infrastructure: pipelines. The problem we introduce is how to place sensors in such a way that the sensed data related to the monitoringof the pipeline will survive even in presence of a partial destruction of the infrastructure. The contributions of this paper are twofold. First, we introduce the problem of sensed data survivability in critical infrastructure. In this framework, the goal is to have the sensed data to survive to the infrastructure failure, so that the phenomena that lead to the failure could be better understood and possibly tackled in similardeployment. Second, we provide a model that allows to produce an optimal network topology with respect to the level of information assurance desired, while satisfying deployment constraints, such as available bandwidth and available energy of the sensors. We believe thatthe work addressed in this paper could foster further research in the field of information assurance in critical infrastructure.
AB - Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; so that action could be undertaken when anomalies arise, to avoid more severeconsequences to the infrastructure. In this paper, we relax the hypothesis of intervening when anomalies are detected: we focus on sensed data surviv-ability. Specifically, we study this problem in a specific critical infrastructure: pipelines. The problem we introduce is how to place sensors in such a way that the sensed data related to the monitoringof the pipeline will survive even in presence of a partial destruction of the infrastructure. The contributions of this paper are twofold. First, we introduce the problem of sensed data survivability in critical infrastructure. In this framework, the goal is to have the sensed data to survive to the infrastructure failure, so that the phenomena that lead to the failure could be better understood and possibly tackled in similardeployment. Second, we provide a model that allows to produce an optimal network topology with respect to the level of information assurance desired, while satisfying deployment constraints, such as available bandwidth and available energy of the sensors. We believe thatthe work addressed in this paper could foster further research in the field of information assurance in critical infrastructure.
KW - critical infrastructure protection
KW - data survivability
KW - modeling
KW - optimization problem
KW - Wireless sensor network
UR - http://www.scopus.com/inward/record.url?scp=55249127687&partnerID=8YFLogxK
U2 - 10.1109/IAS.2008.54
DO - 10.1109/IAS.2008.54
M3 - Article in proceeding
AN - SCOPUS:55249127687
SN - 9780769533247
T3 - Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008
SP - 305
EP - 310
BT - Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008
T2 - 4th International Symposium on Information Assurance and Security, IAS 2008
Y2 - 8 September 2008 through 10 September 2008
ER -