Abstract
This chapter presents a distributed data fusion algorithm for situational awareness in critical infrastructures whose link failures are based on the transferable belief model. The algorithm is applied to a case study involving a class of critical infrastructures that exchange the possible causes of the faults or threats that affect them. The algorithm is robust to communications link failures caused by natural disasters, cyber attacks or physical security breaches. Theoretical results show that algorithm convergence only requires the connectedness of the network topology over a certain time window, providing resilience in the face of temporary disruptions in the infrastructure communications layer.
Chapter PDF
Similar content being viewed by others
References
S. Boyd, A. Ghosh, B. Prabhakar and D. Shah, Randomized gossip algorithms, IEEE Transactions on Information Theory, vol. 52(6), pp. 2508–2530, 2006.
F. Caldeira, M. Castrucci, M. Aubigny, D. Macone, E. Monteiro, F. Rente, P. Simoes and V. Suraci, Secure mediation gateway architecture enabling communications among critical infrastructures, Proceedings of the Future Network and Mobile Summit, 2010.
J. Cortes, Finite-time convergent gradient flows with applications to network consensus, Automatica, vol. 42(11), pp. 1993–2000, 2006.
L. Decanini and F. Mollaioli, Formulation of elastic earthquake input energy spectra, Earthquake Engineering and Structural Dynamics, vol. 27(12), pp. 1503–1522, 1998.
A. Dempster, A generalization of Bayesian inference, Journal of the Royal Statistical Society, Series B (Methodological), vol. 30(2), pp. 205–247, 1968.
A. Dempster, Upper and lower probabilities induced by a multivalued mapping, in Classic Works of the Dempster-Shafer Theory of Belief Functions, R. Yager and L. Liu (Eds.), Springer, Berlin-Heidelberg, Germany, pp. 57–72, 2008.
T. Denoeux, Conjunctive and disjunctive combination of belief functions induced by nondistinct bodies of evidence, Artificial Intelligence, vol. 172(2–3), pp. 234–264, 2008.
B. Ducourthial, V. Cherfaoui and T. Denoeux, Self-stabilizing distributed data fusion, in Stabilization, Safety and Security of Distributed Systems, A. Richa and C. Scheideler (Eds.), Springer, Berlin, Germany, pp. 148–162, 2012.
F. Flammini, A. Gaglione, N. Mazzocca, V. Moscato and C. Pragliola, Wireless sensor data fusion for critical infrastructure security, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, pp. 92–99, 2008.
V. Formicola, A. Di Pietro, A. Alsubaie, S. D’Antonio and J. Marti, Assessing the impact of cyber attacks on wireless sensor nodes that monitor interdependent physical systems, in Critical Infrastructure Protection VIII, J. Butts and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 213–229, 2014.
S. Lagomarsino and S. Giovinazzi, Macroseismic and mechanical models for the vulnerability and damage assessment of current buildings, Bulletin of Earthquake Engineering, vol. 4(4), pp. 415–443, 2006.
G. Lanzano, E. Salzano, F. Santucci de Magistris and G. Fabbrocino, Vulnerability of pipelines subjected to permanent deformation due to geotechnical co-seismic effects, Chemical Engineering Transactions, vol. 32, pp. 415–420, 2013.
C. Pathirage, D. Amaratunga, R. Haigh and D. Baldry, Knowledge sharing in disaster management strategies: Sri Lankan post-tsunami context, Proceedings of the CIB World Building Congress, pp. 2981–2993, 2007.
I. Patterson, J. Nutaro, G. Allgood, T. Kuruganti and D. Fugate, Optimizing investments in cyber-security for critical infrastructure, Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, article 20, 2013.
M. Pollino, G. Fattoruso, L. La Porta, A. Della Rocca and V. James, Collaborative open source geospatial tools and maps supporting response planning for disastrous earthquake events, Future Internet, vol. 4(2), pp. 451–468, 2012.
G. Shafer, A Mathematical Theory of Evidence, Princeton University Press, Princeton, New Jersey, 1976.
P. Smets, The combination of evidence in the transferable belief model, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12(5), pp. 447–458, 1990.
D. Sutton, J. Harrison, S. Bologna and V. Rosato, The contribution of NEISAS to EP3R, in Critical Information Infrastructure Security, S. Bologna, B. Hammerli, D. Gritzalis and S. Wolthusen (Eds.), Springer-Verlag, Berlin Heidelberg, Germany, pp. 175–186, 2013.
L. Zadeh, On the Validity of Dempster’s Rule of Combination of Evidence, Memorandum UCB/ERL-M, Electronics Research Laboratory, University of California, Berkeley, Berkeley, California, 1979.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 IFIP International Federation for Information Processing
About this paper
Cite this paper
Di Pietro, A., Panzieri, S., Gasparri, A. (2017). DISTRIBUTED DATA FUSION FOR SITUATIONAL AWARENESS IN CRITICAL INFRASTRUCTURES WITH LINK FAILURES. In: Rice, M., Shenoi, S. (eds) Critical Infrastructure Protection XI. ICCIP 2017. IFIP Advances in Information and Communication Technology, vol 512. Springer, Cham. https://doi.org/10.1007/978-3-319-70395-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-70395-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70394-7
Online ISBN: 978-3-319-70395-4
eBook Packages: Computer ScienceComputer Science (R0)