digital safety & security @ ait · digital safety & security @ ait helmut leopold . head of...
TRANSCRIPT
DIGITAL SAFETY & SECURITY @ AIT
Helmut Leopold Head of Center for Digital Safety & Security AIT Austrian Institute of Technology Institute of Microelectronic, Institute of Computing Technology (ICT), Institute of Software (IS) Shenzhen, Guangzhou, Shanghai, Beijing, March 13th-17th, 2017
Austrian – China ICT Conference & B2B Meetings 2017
New Sensor Technologies
Intelligent Cameras & Video Analytics
2
CENTER FOR DIGITAL SAFETY & SECURITY
Dependable Systems Engineering
Visual Surveillance & Insight Digital Identity Management
Verification & Validation of Complex Systems
Modelling & Automated Test Case Generation
Runtime Verification Predictive System Health Monitoring
Safety & Security Co-Engineering Security for Industrial Control Systems
Risk Management Security by Design
Cloud Security Cryptography
Cyber Attack Information System (CAIS) Cyber Incident Information Sharing (CIIS)
Cyber Range
Data Science
Machine Learning Scalable Data Analytics
Blockchain Technologies
Physical Layer Security
Wireless M2M Communication 5G & Broadband Technologies Optical Quantum Technologies
Crisis and Disaster Management
IoT Sensor Networks Command & Control Systems
Community Engagement Environmental Management
Smart Sensor Solutions Signal Processing & Pattern Analysis
Situational Awareness & Decision Support
Cyber Security
Highest System Reliability Surveillance and Protection Critical Cyber Infrastructures
• 180+ experts (1/3 with PhD): 51% Scientists, 39% Engineers, 10% Admin • 50% of new employees with international education • 30+ EU running projects
• Community involvements:
• Strategic partnerships:
Digital Market Austria
3
International Competence Center for Airport Securtiy, Border Control & Mobile Identity
28 Mio € project budget
sichere Prozess
e
Bildverarbeitung
Kameranetze
Biometrie
Vernetzte IT-Systeme
sichere Prozesse
sichere Prozesse
sichere Prozesse
sichere Prozesse
Cyber Security
sichere Behördenprozess
e
sichere Prozesse
ASAP FBC
Mobile ID Smartphone 2.0
4
Contact less finger prints
Face recognition
Passport (optical MRZ, chip RFID)
Number plate recognition
scenes
1
2
3
4
5
https://youtu.be/nEOoDY2wxpc
Mobile Identity security technologies 3D Que-Length Detection
3D Vision based Access Control ID Erfassung
Verk.kontrolle
Fallaufnahme
Anwendung x
17.11.2016
18.03.2017 6
Detection of dangerous or criminal events by combined video + thermal + audio signal analysis, data fusion and situational awareness in railway stations
https://youtu.be/U-RugIRyCHo
Secure City Protection of Public Spaces – Sensor Fusion
Large Data Video Management
7
3/18/2017
User Interface
AIT Video Search Platform Connected Vision
Format converter
results
face recognition
rule based object
identification number
plate
Novel video archive search machine learning and smart user interaction Platform approach to mange huge amount of image and video data
Factor 1:100 performance increase
object separation
Y: Size
X: Color
Interactive User
Interface
Content sorted by
similarities
18.03.2017 8
UNMANNED ARIAL VEHICLE BASED SITUATION AWARENESS Real-time situation awareness for first responders
Smart Encryption for Data Privacy in the Cloud
Current methodologies cannot be used to protect data in the cloud over their whole life cycle
New agile cryptpgraphy processes are needed to protect data for storage and processing
9 18.03.2017
“Data ownership & control of distribution by the end-user”
Secure Distributed Storage Solutions Selective Data Sharing Privacy-Preserving Authentication
10
SECURE SMART GRIDS BY MODEL DRIVEN DESIGN
Energy network ICT network
NISTIR 7628 Interface Categories and
Security Requirements
BSI threat catalogue … other Threat catalogues
AIT Smart Grid threat Catalogue
• Manufacturer • System integrator • Network operator • Service operator • Network planning • Security management • Business management
SECURE NETWORK DESIGN
11
A defined cyber security context has to be put in context:
– national security – economical – technical feasibility
A common model (common language)
Tools modeling, reporting,
verification, etc.
A dedicated implementation (architecture, processes, different manufacturers) is only feasible based on free market mechanism, which consider different business strategies, background, etc. of network operators.
There is no single reference architecture, but we need ….
Systematic approach Method for scenario
management, ensuring open standards,
recommendations
Scenario development,
Definition of security requirements,
Support of risk management
Verification of security levels,
Reports
Open standards (IEC, IEEE, NIST, CEN-
CENELEC-ETSI, ENTS-E, etc.)
CASTLE: CYBER SECURITY RANGE @ AIT
12
Enterprise ICT Environments
Simulation specific systems
Physical environment
Connected Cars
Industry 4.0
Smart grid eHealth Smart
City Digital
Transport Social media
Virtual and Simulated Physical
Cyber Security R&D
Security Technology Validation
Training Ethical Hacking
Modelling & Simulation
Test Data Generation
Architecture Scenario Planning
Threat Emulation
Cyber Exercises
Cyber Training
Blockchain Leading analytics technology for the fintech market @ AIT
13 18.03.2017
Blockchain Digital Insight Platform @ AIT
“Overall, Bitcoin is beginning to feature heavily in many EU law enforcement investigations, accounting for over 40% of all identified criminal-to-criminal payments.” (Quelle: Europol Bericht 2016)
14
Command & Control System
Strategic Decision Support Tactical Orchestration Supervision &
Visualization
IoT Convergence
IoT GW IoT GW IoT GW
IoT APIs
Open Source Information (OSI) Big Data Analysis
Crowd Tasking
Crises and Disaster Management (CDM) - Command & Control Systems and Crowd Tasking
St.Pölten
Salzburg
Linz Wien
Innsbruck Graz Feldkirch
Klagenfurt
B‘Hof St Johann
Eisenstadt
5G – Reliable IoT communication Connected Vehicles
Source: Car 2 Car Communication Consortium, http://www.car‐to‐car.org/
5G node 2 (relay) 5G node 1
(relay)
5G node 3 (relay)
5G
18 18.03.2017
5G: Convergence of Optical & Wireless Networks
Opto-electronic 3D Chip Integration
► Convergence of fixed & mobile networks (fully passive ROADM, RRH for mm-wave radio)
► Functional and technological convergence of photonics and electronics on silicon but also on polymer
5G & Photonics @ AIT
electronics
Co- integration
CMOS-compatible integration and assembly processes
5G @ AIT Ultra Reliable Machine-to-Machine Wireless Communications
Wireless automation and control • low latency • distributed time synchronization of
different channels • Real-time behavior - interface to time-
triggered systems • robust operation in dynamic topologies
Rapid prototyping of wireless systems • software defined radio platform • wide frequency range • fast adaptation to use cases
21
Tx
Rx
Power Delay Profile
new models for radio management (20-60 GHz) at high speed (350 km/h)
Ultra broadband RF modelling