E-Book, Englisch, 249 Seiten
Reihe: Engineering (R0)
Setola / Sforza / Vittorini Railway Infrastructure Security
1. Auflage 2015
ISBN: 978-3-319-04426-2
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 249 Seiten
Reihe: Engineering (R0)
ISBN: 978-3-319-04426-2
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark
Autoren/Hrsg.
Weitere Infos & Material
1;Foreword;6
2;Acknowledgments;11
3;Contents;12
4;1 Introduction;14
4.1;Abstract;14
4.2;1 Introduction;15
4.3;2 The Critical Infrastructure Protection;16
4.4;3 The Railway Infrastructure System in the CIP Arena;17
4.5;4 The METRIP Project;20
4.6;5 The Railway Infrastructure Security Book;21
4.7;6 Conclusions;23
5;2 Towards Integrated Railway Protection;25
5.1;Abstract;25
5.2;1 Railway: Constantly Striving for Safety;25
5.3;2 The Emergence of Security;26
5.4;3 The Transport Environment;26
5.5;4 Everyday Security in the Railway Scenario;27
5.6;5 Personal Freedom and Collective Security;28
5.7;6 The Terrorist Threat;29
5.8;7 The Cost of Security;29
5.9;8 Security of Stations: The Challenge of Joined-Up Thinking;30
5.10;9 Consistency at European and International Level;31
5.11;10 Specific Aspects of High Speed Systems: Risks and Opportunities;31
5.12;11 UIC Involvement;32
5.12.1;11.1 UIC Fundamental Values;33
5.12.2;11.2 UIC Security Platform;33
5.12.3;11.3 UIC Research Focuses;34
5.13;12 Conclusions;35
6;3 The Railway Security: Methodologies and Instruments for Protecting a Critical Infrastructure;37
6.1;Abstract;37
6.2;1 Introduction---Why Security?;37
6.3;2 The Security in the Railway Transport;38
6.4;3 Railway: A Critical Infrastructure;39
6.5;4 CIP---Critical Infrastructure Protection;39
6.6;5 Threats in Rail Transport;40
6.6.1;5.1 The Terroristic Threat;41
6.6.2;5.2 Theft of Copper;42
6.7;6 The Security Structures in the Main European Railway Organizations;44
6.7.1;6.1 France (Soci00E9t00E9 Nationale des Chemins de fer Français---SNCF);44
6.7.2;6.2 Spain (RENFE);45
6.7.3;6.3 Poland (PKP Polskie Linie Kolejowe S.A.---PKP PLK S.A.);45
6.7.4;6.4 Switzerland (Schweizerische Bundesbahnen---SBB CFF FFS);46
6.7.5;6.5 Italy (Ferrovie dello Stato Italiane SpA---FS SpA);46
6.8;7 International Organizations Involved in Railway Security;47
6.8.1;7.1 Colpofer;47
6.8.1.1;7.1.1 The Method;48
6.8.1.2;7.1.2 The Mission;48
6.8.2;7.2 Security Platform UIC;49
6.8.3;7.3 Brenner Group;51
6.9;8 Infrastructures Security: A General Survey Regarding the Current Regulation;51
6.10;9 Corporate Protection in Rail Transport Companies;54
6.10.1;9.1 Tasks;54
6.10.2;9.2 The Organization of the Security Function;55
6.11;10 Human Resources;56
6.11.1;10.1 Recruitment;56
6.11.2;10.2 Training;57
6.12;11 Crisis Management;58
6.13;12 Risk Management;58
6.13.1;12.1 The Italian Case of Risk Management by Rete Ferroviaria Italiana SpA, within Ferrovie dello Stato Italiane Group;59
6.14;13 The Information Security;62
6.15;14 Assets Protection Technology in the Railway Field;63
6.15.1;14.1 The Components of a Security System;64
6.15.2;14.2 Security Logic;65
6.15.3;14.3 Security Logic for a Medium-Small Railway Station---Layout;66
6.15.4;14.4 Security Logic for the Main Head Stations and New High Speed Structures---Layout;69
6.15.5;14.5 Control Room;71
6.15.6;14.6 Security for Railway Undertakings;71
6.16;15 Conclusions;74
7;4 Vulnerability Assessment in RIS Scenario Through a Synergic Use of the CPTED Methodology and the System Dynamics Approach;76
7.1;Abstract;76
7.2;1 Introduction;77
7.3;2 The CPTED Methodology;78
7.3.1;2.1 CPTED's Historical Evolution and Main Influences;79
7.3.2;2.2 CPTED: Key Elements;82
7.3.3;2.3 The Application of CPTED to Railway Infrastructure System;84
7.4;3 The Systems Dynamics Approach;86
7.4.1;3.1 Systems Dynamics Main Features;87
7.5;4 The Model;88
7.5.1;4.1 Simulation Results;92
7.6;5 Conclusions;98
7.7;References;99
8;5 Cumana and Circumflegrea Railway Lines: A Circle Network in the Western Metropolitan Area of Naples;101
8.1;Abstract;101
8.2;1 Introduction;101
8.3;2 SEPSA Urban Railway System: Cumana and Circumflegrea;102
8.4;3 Security Challenges;105
8.5;4 Critical Infrastructures of Cumana and Circumflegrea Lines;108
8.5.1;4.1 SEPSA Network System;108
8.5.2;4.2 Critical Assets in the SEPSA Railway System;109
8.5.3;4.3 Maintenance Center Location Problem;111
8.5.4;4.4 Service Time in Case of System Failures;112
8.6;5 Conclusions;117
8.7;Acknowledgments;117
8.8;References;118
9;6 Coping with Suicide Bombing Israel Railways Security Challenges 2000--2005;119
9.1;Abstract;119
9.2;1 Forward;119
9.3;2 Israel Railways;120
9.4;3 The Suicide Bombing Campaign, 2000--2005;120
9.5;4 Israel Railways Response to Suicide Bombing;125
9.6;5 Israel Railways Security Response;126
9.7;6 Conclusions;130
9.8;Further Readings;131
10;7 Technologies for the Implementation of a Security System on Rail Transportation Infrastructures;132
10.1;Abstract;132
10.2;1 Introduction;133
10.3;2 Railway/Metro Security System: Application Context;134
10.4;3 Risk Analysis and Risk Scenarios;135
10.5;4 Critical Assets of a Railway System;136
10.6;5 Security Technologies;137
10.7;6 CCTV and Video Analytics System;138
10.8;7 Alarm Outputs for a Video Analytic System;139
10.9;8 Access Control and Anti-intrusion Systems;140
10.10;9 Abnormal Sound Detection System;142
10.11;10 CBRNe System;143
10.12;11 Application of the Protection Systems on the Assets of a Railway System;144
10.13;12 Stations;145
10.14;13 Tracks;146
10.15;14 Depot;146
10.16;15 Tunnel and Bridges;146
10.17;16 Electrical Substations;147
10.18;17 Integrated Management of the Protection Devices;147
10.19;18 Alarm Management;149
10.20;19 Conclusions;149
10.21;References;149
11;8 A Model-Driven Process for Physical Protection System Design and Vulnerability Evaluation;151
11.1;Abstract;151
11.2;1 METRIP Model-Driven Process;152
11.3;2 The CIP_VAM UML Profile;154
11.3.1;2.1 CIP_VAM UML Extensions;156
11.3.2;2.2 CIP_VAM Library;159
11.4;3 Model Transformations;160
11.4.1;3.1 Forward Transformation Chains;160
11.4.2;3.2 Backward Transformation Chains;164
11.5;4 A Railway Station Case Study;165
11.5.1;4.1 Step 1: Modeling the Infrastructure;167
11.5.2;4.2 Step 2: Modeling the Attacks;168
11.5.3;4.3 Step 3: Modeling Possible Protections;170
11.5.4;4.4 Step 4: Application of the ODM Transformation Chain;171
11.5.5;4.5 Step 5: Vulnerability Analysis;173
11.6;5 Related Work;175
11.7;6 Conclusions;176
11.8;References;177
12;9 Optimal Location of Security Devices;178
12.1;Abstract;178
12.2;1 Introduction;179
12.3;2 Protection Devices for a RIS;180
12.4;3 State of the Art of the Sensor Placement Problem;181
12.5;4 The Optimization Module;182
12.5.1;4.1 Asset Discretization;183
12.5.2;4.2 Coverage Analysis;184
12.5.3;4.3 Coverage Model Selection;186
12.5.3.1;4.3.1 Minimization of the Control Devices Number;187
12.5.3.2;4.3.2 Maximization of the Covered Region;189
12.5.4;4.4 Framework of the OM;190
12.6;5 Experimental Results;191
12.6.1;5.1 Open Space Test Case;191
12.6.2;5.2 Railway Station Case;196
12.7;6 Conclusions;201
12.8;Acknowledgments;202
12.9;References;202
13;10 The METRIP Tool;204
13.1;Abstract;204
13.2;1 Introduction;205
13.3;2 A Reference Architecture;207
13.4;3 Component Specifications;208
13.4.1;3.1 System Level Specifications;209
13.4.2;3.2 UML Modelling Module (UMLM);210
13.4.3;3.3 Optimization Module (OM);210
13.4.4;3.4 Vulnerability Analysis Module (VAM);212
13.5;4 Enabling Technologies and Tools;212
13.6;5 Prototype Implementation;214
13.6.1;5.1 Model Transformations;215
13.6.2;5.2 User Interface;217
13.6.3;5.3 Localization Back-End;219
13.7;6 Conclusions;220
13.8;Acknowledgments;220
13.9;References;221
14;11 Optimizing Investment Decisions for Railway Systems Protection;222
14.1;Abstract;222
14.2;1 Introduction;222
14.3;2 Background;224
14.4;3 The Railway Protection Investment Model;226
14.5;4 Solution Methodology;228
14.6;5 Case Study and Analysis;229
14.7;6 Conclusions and Discussion;238
14.8;References;239
15;12 The Security into the Metro System: The Copenhagen Metro Experience;241
15.1;Abstract;241
15.2;1 Introduction;241
15.3;2 The Threats;242
15.4;3 The Vulnerabilities;244
15.5;4 Metro Copenhagen;244
15.6;5 Cityringen Security Features;247
15.6.1;5.1 Security Solution;248
15.6.2;5.2 Operations Security;248
15.7;6 System Description and Architecture;248
15.7.1;6.1 General;248
15.7.2;6.2 Closed Circuit Television System (CCTV) and Video Analytics;249
15.7.3;6.3 Intrusion Detection and Access Control System;251
15.7.4;6.4 Perimeter Intrusion Detection System;252
15.8;7 Reliability and Redundancy;255
15.9;8 Conclusion;255




