Converged Security and Information Management System as a Tool for Smart City Infrastructure Resilience Assessment
Abstract
:1. Introduction
1.1. The Importance of Security
1.2. Smart City Infrastructure Resilience
1.3. The Importance of Converged Security in the Context of Smart City Infrastructure Resilience
1.4. Smart Security Alarm Systems Convergence
2. Materials and Methods
2.1. Classification of Security Types
2.2. Converged Resilience Assessment
2.3. PSIM/SIEM Category Systems Convergence as a Data Source for Resilience Assessment
- Continuous resilience reduction based on the resilience recomputation when applying individual dynamic penalty factors (for example, at each alarm from individual fire signalization);
- Leap resilience reduction based on an already assessed and categorized event with a certain severity, for example “High” or “Critical”, possibly based on sub-events that are related to the occurrence of this event, for example “Outage of information passenger system”, “Radio outage”, etc.
2.3.1. PSIM Systems
2.3.2. PSIM Systems and Data Sources for Smart Security Alarm Systems
Security Systems
- VSS with video analysis and specialized video analysis tools—means for monitoring events in real time using cameras including the ability to detect different events types;
- I&HAS—I&HAS control panels, evaluating various types of motion, shock, contact, linear light, radio types of intrusion detectors and other types of means to ensure comprehensive technical protection against unauthorized entry into objects and systems for triggering an intentional emergency alarm;
- ACS—systems for controlling access to objects, using various types of identification technologies, such as magnetic cards, Radio Frequency IDentification (RFID) chips and biometric data. Access control systems may be used even for location determination;
- EFS—electrical fire signalization control panels evaluating and controlling various types of fire detectors and devices;
- Perimeter systems—perimeter protection systems in the form of detection cables, infrared barriers, microwave barriers, etc. with specialized software for perimeter detection;
- Radar and sonar systems (as part of I&HAS)—systems for searching and determining the assets various types location (e.g., people and means of transport) with specialized software.
Location Systems
- Systems for external localization—systems based on GPS;
- Systems for localization inside the building—systems based on the technology of active RFID tags and suitably placed fixed or mobile RFID readers or radio localization systems.
Graphics Systems
- Geographic Information Systems (GIS)—sophisticated systems that work with spatial data and which make it possible to locate all PSIM system entities (assets, sensors, available forces and resources) on map bases;
- Computer Aided Design (CAD)—project drawings of various types buildings;
- Vector/raster graphics—map materials in the vector or raster graphics form;
- 3D—some types of PSIM systems also work with 3D models for the graphic materials presentation.
Database Systems
Control and Operating Systems
Enterprise Systems
Communication Systems
- early notification systems—ensure mass notification of people by calls means or SMS, providing functionalities such as Text to Speech or Speech to Text, etc.;
- radio stations—they enable the playback of predefined announcements to certain system branches and ensure a certain degree of automation in the distribution of information in the locality;
- SMS gateways—systems for sending SMS;
- IP telephones and dispatch terminals—these devices enable the control workplace to initiate telephone calls directly from the PSIM system workplace and create complex conferences, ensure communication with radio resources, etc.
2.3.3. SIEM Systems
- more flexible and faster response to any anomalies and threats in the ICT infrastructure;
- more successful detection of these anomalies and attacks;
- streamlining of ICT infrastructure management.
- Security Information Management (SIM)—technology dealing with the long-term storage of events, their analysis and reporting of problems;
- Security Event Management (SEM)—technology dealing with infrastructure monitoring, event correlations and creating alarms in real time.
3. Results
3.1. Mathematical Framework for Converged Security and Information Management System Development
- penalization refers to individual factors (external and internal factors),
- the penalty represents a number whose size reflects the degree of severity of the factor’s influence (the level of positive or negative effect) on the reference object and its assets,
- the penalty is determined separately for individual types of security,
- the penalty can be applied both to individual assets and centrally to the entire reference object.
- static penalty factor specifies such influences (measures) that have a long-term effect on the protection system and will not be removed or appear by themselves. The invalidity of the relevant static penalty factor is mostly due to the non-existence of processes necessary to manage security, non-existence of physical security elements, non-compliance with valid legislation, unimplemented checks, revisions, etc.
- dynamic penalty factor represents factors (risks) that themselves change over time, and the duration of their action cannot be accurately estimated. This includes the detection of events and incidents in which it is necessary to determine the monitored time effect of the factor that contributes to the reduction of the object resilience. After the duration of its action, the relevant dynamic penalty factor is deactivated, and the object resilience will increase again.
3.2. Logical Framework for Converged Security and Information Management System Development
3.3. Function Blocks of CSIM
3.3.1. Block: Databases and Catalogues
Catalogue of Smart City Infrastructure Assets
Catalogue of Risks
Catalogue of Penalty Factors
- The point of view of the application of individual factors when determining the initial or static resilience (off-line mode) it is in question on the use of so-called static penalty factors, and when determining the real resilience (online mode), the so-called dynamic penalty factors are also used;
- Aspect of security jurisdiction which includes physical security category penalty factors, cyber security category penalty factors, and operational safety category penalty factors.
3.3.2. Block: Module Setup
3.3.3. Block: Resilience Computation
3.3.4. Block: Configuration Interface
3.3.5. Block: Data Display
3.3.6. Block: History
3.3.7. Block: Input Data and Data Conversion
3.3.8. Block: Output Data and Data Conversion
4. Discussion
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Ristvej, J.; Lacinak, M.; Ondrejka, R. On Smart City and Safe City Concepts. Mob. Netw. Appl. 2020, 25, 836–845. [Google Scholar] [CrossRef]
- Lacson, J.J.; Lidasan, H.S.; Spay Putri Ayuningtyas, V.; Feliscuzo, L.; Malongo, J.H.; Lactuan, N.J.; Bokingkito, P., Jr.; Velasco, L.C. Smart City Assessment in Developing Economies: A Scoping Review. Smart Cities 2023, 6, 1744–1764. [Google Scholar] [CrossRef]
- Prochazkova, D.; Prochazka, J. Smart Cities and Critical Infrastructure. In Proceedings of the Smart City Symposium Prague, Prague, Czech Republic, 24–25 May 2018; Ruzicka, J., Ed.; IEEE: New York, NY, USA, 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Rehak, D.; Senovsky, P.; Slivkova, S. Resilience of Critical Infrastructure Elements and its Main Factors. Systems 2018, 6, 21. [Google Scholar] [CrossRef]
- Lukas, L.; Urbancokova, H. Types of Security and their Convergence. In Converged Security; Lukas, L., Ed.; VerBuM: Zlin, Czech Republic, 2019; pp. 26–42. [Google Scholar]
- Hettne, B. Development and Security: Origins and Future. Secur. Dialogue 2010, 41, 31–52. [Google Scholar] [CrossRef]
- Plachkinova, M.; Maurer, C. Security breach at target. J. Inf. Syst. Educ. 2018, 29, 11–20. [Google Scholar]
- Santos-Reyes, J.; Padilla-Pérez, D.; Beard, A.N. Modeling Critical Infrastructure Interdependency: The Case of the Mexico City Metro Transport System. Hum. Ecol. Risk Assess. Int. J. 2015, 21, 1428–1444. [Google Scholar] [CrossRef]
- Pescaroli, G.; Alexander, D. Critical Infrastructure, Panarchies and the Vulnerability Paths of Cascading Disasters. Nat. Hazards 2016, 82, 175–192. [Google Scholar] [CrossRef]
- Rinaldi, S.M.; Peerenboom, J.P.; Kelly, T.K. Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies. IEEE Control. Syst. Mag. 2001, 21, 11–25. [Google Scholar] [CrossRef]
- National Infrastructure Advisory Council. Critical Infrastructure Resilience Final Report and Recommendations; U.S. Department of Homeland Security: Washington, DC, USA, 2009.
- Elvas, L.B.; Mataloto, B.M.; Martins, A.L.; Ferreira, J.C. Disaster Management in Smart Cities. Smart Cities 2021, 4, 819–839. [Google Scholar] [CrossRef]
- Tzioutziou, A.; Xenidis, Y. A Study on the Integration of Resilience and Smart City Concepts in Urban Systems. Infrastructures 2021, 6, 24. [Google Scholar] [CrossRef]
- Kriaa, S.; Pietre-Cambacedes, L.; Bouissou, M.; Halgand, Y. A Survey of Approaches Combining Safety and Security for Industrial Control Systems. Reliab. Eng. Syst. Saf. 2015, 139, 156–178. [Google Scholar] [CrossRef]
- Eames, D.P.; Moffett, J. The Integration of Safety and Security Requirements. In Proceedings of the International Conference on Computer Safety, Reliability, and Security, Toulouse, France, 27–29 September 1999. [Google Scholar]
- Rehak, D.; Senovsky, P.; Hromada, M.; Lovecek, T.; Novotny, P. Cascading Impact Assessment in a Critical Infrastructure System. Int. J. Crit. Infrastruct. Prot. 2018, 22, 125–138. [Google Scholar] [CrossRef]
- Rehak, D.; Hromada, M.; Onderkova, V.; Walker, N.; Fuggini, C. Dynamic Robustness Modelling of Electricity Critical Infrastructure Elements as a Part of Energy Security. Int. J. Electr. Power Energy Syst. 2022, 136, 107700. [Google Scholar] [CrossRef]
- Matola, K.E. The Convergence of Physical and Cybersecurity: The Path Forward for Secure and Resilient Infrastructure. In Homeland Security and Critical Infrastructure Protection; Baggett, R.K., Simpkins, B.K., Eds.; Praeger: Santa Barbara, CA, USA, 2018; pp. 347–364. [Google Scholar]
- Hromada, M.; Rehak, D.; Lukas, L. Resilience Assessment in Electricity Critical Infrastructure from the Point of View of Converged Security. Energies 2021, 14, 1624. [Google Scholar] [CrossRef]
- Anderson, K. Convergence: A Holistic Approach to Risk Management. Netw. Secur. 2007, 5, 4–7. [Google Scholar] [CrossRef]
- Spears, J.L.; Barki, H. User Participation in Information Systems Security Risk Management. MIS Q. 2010, 34, 503–522. [Google Scholar] [CrossRef]
- Aleem, A.; Wakefield, A.; Button, M. Addressing the Weakest Link: Implementing Converged Security. Secur. J. 2013, 26, 236–248. [Google Scholar] [CrossRef]
- Christensen, J.F. Industrial Evolution Through Complementary Convergence: The Case of IT Security. Ind. Corp. Chang. 2011, 20, 57–89. [Google Scholar] [CrossRef]
- Chang, H.; Kim, J.; Park, J. IT Convergence Security. J. Intell. Manuf. 2014, 25, 213–215. [Google Scholar] [CrossRef]
- Schneller, L.; Porter, C.N.; Wakefield, A. Implementing Converged Security Risk Management: Drivers, Barriers, and Facilitators. Secur. J. 2023, 36, 333–349. [Google Scholar] [CrossRef]
- Contos, B.T.; Crowell, W.P.; DeRodeff, C.; Dunkel, D.; Cole, E.; McKenna, R. Physical and Logical Security Convergence: Powered by Enterprise Security Management; Syngress: Oxford, UK, 2011. [Google Scholar] [CrossRef]
- Anand, S. Convergence of Cyber and Physical Security—A must for Smart Grid Systems. PalArch’s J. Archaeol. Egypt Egyptol. 2020, 17, 8055–8060. [Google Scholar]
- Park, S.; Ko, D. Design of the Convergence Security Platform for Smart Universities. J. Platf. Technol. 2015, 3, 3–7. [Google Scholar]
- Kang, J.; Lee, J.; Hwang, C.; Chang, H. The Study on a Convergence Security Service for Manufacturing Industries. Telecommun. Syst. 2013, 52, 1389–1397. [Google Scholar] [CrossRef]
- Silva, R.B.E.; Piqueira, J.R.C.; Marques, R.P.; Marques, A.L.F. Physical, Corporate and Industrial Digital Security Convergence: Gaps to Close. In Proceedings of the International Conference on Physical Protection of Nuclear Material and Nuclear Facilities, Vienna, Austria, 13–17 November 2017. [Google Scholar]
- Zahran, B.; Hussaini, A.; Ali-Gombe, A. Security of IT/OT Convergence: Design and Implementation Challenges. In Proceedings of the 2021 World Congress in Computer Science, Computer Engineering, & Applied Computing, Las Vegas, NV, USA, 26–29 July 2021. [Google Scholar]
- Shi, L.; Nazir, S.; Chen, L.; Zhu, R. Secure Convergence of Artificial Intelligence and Internet of Things for Cryptographic Cipher: A Decision Support System. Multimed. Tools Appl. 2021, 80, 31451–31463. [Google Scholar] [CrossRef]
- Oh, S.Y.; Ghose, S.; Jeong, Y.K.; Ryu, J.K.; Han, J. Convergence security systems. J. Comput. Virol. Hacking Tech. 2015, 11, 119–121. [Google Scholar] [CrossRef]
- Shin, Y.S.; Han, S.H.; Yu, I.J.; Lee, J.Y. A Study on the Linkage between Intelligent Security Technology based on Spatial Information and other Technologies for Demonstration of Convergence Technology. J. Korea Acad. Ind. Coop. Soc. 2018, 19, 622–632. [Google Scholar] [CrossRef]
- Alalade, E.D. Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine Hybrid Approach. In Proceedings of the IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–16 June 2020. [Google Scholar]
- Humphry, J.; Chesher, C. Visibility and security in the smart home. Convergence 2021, 27, 1170–1188. [Google Scholar] [CrossRef]
- Upadhyay, D.; Sharma, S. Convergence of Artificial Intelligence of Things: Concepts, Designing, and Applications. In Towards Smart World: Homes to Cities Using Internet of Things; Sharma, L., Ed.; Chapman and Hall/CRC: Boca Raton, FL, USA, 2020; pp. 119–142. [Google Scholar]
- Lee, B.; Jung, W.S. Intelligent disaster safety warning system through risk level analysis. In Proceedings of the 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 19–21 October 2022; pp. 2187–2191. [Google Scholar]
- Fenz, S.; Ekelhart, A.; Neubauer, T. Information security risk management: In which security solutions is it worth investing? Commun. Assoc. Inf. Syst. 2011, 28, 22. [Google Scholar] [CrossRef]
- Straub, D.W.; Welke, R.J. Coping with systems risk: Security planning models for management decision making. MIS Q. 1998, 22, 441–469. [Google Scholar] [CrossRef]
- Rehak, D. Introduction to risk management issues. In Security Technologies, Systems, and Management II; Lukas, L., Ed.; VerBuM: Zlin, Czech Republic, 2012; pp. 74–95. [Google Scholar]
- Hromada, M.; Lukas, L. Security Assurance Models. In Security Theory; Lukas, L., Ed.; VerBuM: Zlin, Czech Republic, 2017; pp. 72–85. [Google Scholar]
- Walt, S.M. The renaissance of security studies. Int. Stud. Q. 1991, 35, 211–239. [Google Scholar] [CrossRef]
- Bertocchi, G.; Bologna, S.; Carducci, G.; Carrozzi, L.; Cavallini, S.; Lazari, A.; Oliva, G.; Traballesi, A. Guidelines for Critical Infrastructure Resilience Evaluation; Italian Association of Critical Infrastructures’ Experts: Rome, Italy, 2016. [Google Scholar]
- Nan, C.; Sansavini, G. A quantitative method for assessing resilience of interdependent infrastructures. Reliab. Eng. Syst. Saf. 2017, 157, 35–53. [Google Scholar] [CrossRef]
- Cai, B.; Xie, M.; Liu, Y.; Liu, Y.; Feng, Q. Availability-based engineering resilience metric and its corresponding evaluation methodology. Reliab. Eng. Syst. Saf. 2018, 172, 216–224. [Google Scholar] [CrossRef]
- Rehak, D.; Senovsky, P.; Hromada, M.; Lovecek, T. Complex Approach to Assessing Resilience of Critical Infrastructure Elements. Int. J. Crit. Infrastruct. Prot. 2019, 25, 125–138. [Google Scholar] [CrossRef]
- Vennam, P.; Pramod, T.C.; Thippeswamy, B.M.; Kim, Y.G.; Pavan Kumar, B.N. Attacks and preventive measures on video surveillance systems: A review. Appl. Sci. 2021, 11, 5571. [Google Scholar] [CrossRef]
- Pappalardo, A. A Framework for Threat Recognition in Physical Security Information Management. Doctoral Dissertation, University of Naples Federico II, Naples, Italy, 2013. [Google Scholar]
- González-Granadillo, G.; González-Zarzosa, S.; Diaz, R. Security information and event management (SIEM): Analysis, trends, and usage in critical infrastructures. Sensors 2021, 21, 4759. [Google Scholar] [CrossRef]
- Lukas, L. Algorithm for calculating the resilience of protection system from the viewpoint of converged security. In Converged Security; Lukas, L., Ed.; VerBuM: Zlin, Czech Republic, 2019; pp. 113–126. [Google Scholar]
- Malik, P. Converged security and its importance. In Converged Security; Lukas, L., Ed.; VerBuM: Zlin, Czech Republic, 2019; pp. 43–56. [Google Scholar]
- Kopacek, V. PSIM/SIEM category systems as a data source for resilience assessment. In Converged Security; Lukas, L., Ed.; VerBuM: Zlin, Czech Republic, 2019; pp. 169–183. [Google Scholar]
- Physical Security Information Management (PSIM) and Situation Management. Available online: http://www.qognify.com/situation-management-psim/ (accessed on 13 March 2023).
- TTC Marconi. Technical Documentation of the Functional Sample: Analytical Software Module for Real-Time Resilience Assessment from the Point of View of Converged SECURITY; TTC Marconi: Prague, Czech Republic, 2019. [Google Scholar]
- Bosch, R. NICE Systems Deal Finalized, Name Changed to Qognify. Available online: https://www.securitysales.com/news/nice_is_selling_its_video_surveillance_business_for_100m/ (accessed on 25 June 2023).
- Budin, E. The Use of Automated Tools for Managing Information Security According to the Standards of the CSN ISO/IEC 27,000 Series; Masaryk University: Brno, Czech Republic, 2014. [Google Scholar]
- SIEM Technologies—Streamline Your System Security Management. Available online: https://www.wallarm.com/what/siem-whats-security-information-and-event-management-technology-part-1 (accessed on 10 July 2023).
- Bernatik, A.; Senovsky, P.; Senovsky, M.; Rehak, D. Territorial Risk Analysis and Mapping. Chem. Eng. Trans. 2013, 31, 79–84. [Google Scholar] [CrossRef]
Characteristics of the Factor | Default Penalty | ||
---|---|---|---|
PS | CS | OS | |
There is a detection function in front of the perimeter | 50 | 10 | 10 |
The area in front of the perimeter can be monitored | 40 | 10 | 10 |
The perimeter can be monitored | 60 | 10 | 10 |
The external controlled space can be monitored | 60 | 10 | 10 |
The building envelope can be monitored | 80 | 20 | 10 |
The internal controlled space can be monitored | 80 | 20 | 10 |
Characteristics of the Factor | Default Penalty | ||
---|---|---|---|
PS | CS | OS | |
140 | 120 | 130 | |
850 | 715 | 655 | |
0.165 | 0.168 | 0.198 |
Characteristics of the Factor | Default Penalty | ||
---|---|---|---|
PS | CS | OS | |
90 | 20 | 10 | |
2308 | 3050 | 2737 | |
0.038 | 0.006 | 0.003 |
80.3 | 85.1 | 86.2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hromada, M.; Rehak, D.; Skobiej, B.; Bajer, M. Converged Security and Information Management System as a Tool for Smart City Infrastructure Resilience Assessment. Smart Cities 2023, 6, 2221-2244. https://doi.org/10.3390/smartcities6050102
Hromada M, Rehak D, Skobiej B, Bajer M. Converged Security and Information Management System as a Tool for Smart City Infrastructure Resilience Assessment. Smart Cities. 2023; 6(5):2221-2244. https://doi.org/10.3390/smartcities6050102
Chicago/Turabian StyleHromada, Martin, David Rehak, Bartosz Skobiej, and Martin Bajer. 2023. "Converged Security and Information Management System as a Tool for Smart City Infrastructure Resilience Assessment" Smart Cities 6, no. 5: 2221-2244. https://doi.org/10.3390/smartcities6050102
APA StyleHromada, M., Rehak, D., Skobiej, B., & Bajer, M. (2023). Converged Security and Information Management System as a Tool for Smart City Infrastructure Resilience Assessment. Smart Cities, 6(5), 2221-2244. https://doi.org/10.3390/smartcities6050102