DIGITAL SAFETY & SECURITY @ AIT · DIGITAL SAFETY & SECURITY @ AIT Helmut Leopold . Head of Center...

18
DIGITAL SAFETY & SECURITY @ AIT Helmut Leopold Head of Center for Digital Safety & Security AIT Austrian Institute of Technology Institute of Microelectronic, Institute of Computing Technology (ICT), Institute of Software (IS) Shenzhen, Guangzhou, Shanghai, Beijing, March 13 th -17 th , 2017 Austrian – China ICT Conference & B2B Meetings 2017

Transcript of DIGITAL SAFETY & SECURITY @ AIT · DIGITAL SAFETY & SECURITY @ AIT Helmut Leopold . Head of Center...

DIGITAL SAFETY & SECURITY @ AIT

Helmut Leopold Head of Center for Digital Safety & Security AIT Austrian Institute of Technology Institute of Microelectronic, Institute of Computing Technology (ICT), Institute of Software (IS) Shenzhen, Guangzhou, Shanghai, Beijing, March 13th-17th, 2017

Austrian – China ICT Conference & B2B Meetings 2017

New Sensor Technologies

Intelligent Cameras & Video Analytics

2

CENTER FOR DIGITAL SAFETY & SECURITY

Dependable Systems Engineering

Visual Surveillance & Insight Digital Identity Management

Verification & Validation of Complex Systems

Modelling & Automated Test Case Generation

Runtime Verification Predictive System Health Monitoring

Safety & Security Co-Engineering Security for Industrial Control Systems

Risk Management Security by Design

Cloud Security Cryptography

Cyber Attack Information System (CAIS) Cyber Incident Information Sharing (CIIS)

Cyber Range

Data Science

Machine Learning Scalable Data Analytics

Blockchain Technologies

Physical Layer Security

Wireless M2M Communication 5G & Broadband Technologies Optical Quantum Technologies

Crisis and Disaster Management

IoT Sensor Networks Command & Control Systems

Community Engagement Environmental Management

Smart Sensor Solutions Signal Processing & Pattern Analysis

Situational Awareness & Decision Support

Cyber Security

Highest System Reliability Surveillance and Protection Critical Cyber Infrastructures

• 180+ experts (1/3 with PhD): 51% Scientists, 39% Engineers, 10% Admin • 50% of new employees with international education • 30+ EU running projects

• Community involvements:

• Strategic partnerships:

Digital Market Austria

3

International Competence Center for Airport Securtiy, Border Control & Mobile Identity

28 Mio € project budget

sichere Prozess

e

Bildverarbeitung

Kameranetze

Biometrie

Vernetzte IT-Systeme

sichere Prozesse

sichere Prozesse

sichere Prozesse

sichere Prozesse

Cyber Security

sichere Behördenprozess

e

sichere Prozesse

ASAP FBC

Mobile ID Smartphone 2.0

4

Contact less finger prints

Face recognition

Passport (optical MRZ, chip RFID)

Number plate recognition

scenes

1

2

3

4

5

https://youtu.be/nEOoDY2wxpc

Mobile Identity security technologies 3D Que-Length Detection

3D Vision based Access Control ID Erfassung

Verk.kontrolle

Fallaufnahme

Anwendung x

17.11.2016

18.03.2017 6

Detection of dangerous or criminal events by combined video + thermal + audio signal analysis, data fusion and situational awareness in railway stations

https://youtu.be/U-RugIRyCHo

Secure City Protection of Public Spaces – Sensor Fusion

Large Data Video Management

7

3/18/2017

User Interface

AIT Video Search Platform Connected Vision

Format converter

results

face recognition

rule based object

identification number

plate

Novel video archive search machine learning and smart user interaction Platform approach to mange huge amount of image and video data

Factor 1:100 performance increase

object separation

Y: Size

X: Color

Interactive User

Interface

Content sorted by

similarities

18.03.2017 8

UNMANNED ARIAL VEHICLE BASED SITUATION AWARENESS Real-time situation awareness for first responders

Smart Encryption for Data Privacy in the Cloud

Current methodologies cannot be used to protect data in the cloud over their whole life cycle

New agile cryptpgraphy processes are needed to protect data for storage and processing

9 18.03.2017

“Data ownership & control of distribution by the end-user”

Secure Distributed Storage Solutions Selective Data Sharing Privacy-Preserving Authentication

10

SECURE SMART GRIDS BY MODEL DRIVEN DESIGN

Energy network ICT network

NISTIR 7628 Interface Categories and

Security Requirements

BSI threat catalogue … other Threat catalogues

AIT Smart Grid threat Catalogue

• Manufacturer • System integrator • Network operator • Service operator • Network planning • Security management • Business management

SECURE NETWORK DESIGN

11

A defined cyber security context has to be put in context:

– national security – economical – technical feasibility

A common model (common language)

Tools modeling, reporting,

verification, etc.

A dedicated implementation (architecture, processes, different manufacturers) is only feasible based on free market mechanism, which consider different business strategies, background, etc. of network operators.

There is no single reference architecture, but we need ….

Systematic approach Method for scenario

management, ensuring open standards,

recommendations

Scenario development,

Definition of security requirements,

Support of risk management

Verification of security levels,

Reports

Open standards (IEC, IEEE, NIST, CEN-

CENELEC-ETSI, ENTS-E, etc.)

CASTLE: CYBER SECURITY RANGE @ AIT

12

Enterprise ICT Environments

Simulation specific systems

Physical environment

Connected Cars

Industry 4.0

Smart grid eHealth Smart

City Digital

Transport Social media

Virtual and Simulated Physical

Cyber Security R&D

Security Technology Validation

Training Ethical Hacking

Modelling & Simulation

Test Data Generation

Architecture Scenario Planning

Threat Emulation

Cyber Exercises

Cyber Training

Blockchain Leading analytics technology for the fintech market @ AIT

13 18.03.2017

Blockchain Digital Insight Platform @ AIT

“Overall, Bitcoin is beginning to feature heavily in many EU law enforcement investigations, accounting for over 40% of all identified criminal-to-criminal payments.” (Quelle: Europol Bericht 2016)

14

Command & Control System

Strategic Decision Support Tactical Orchestration Supervision &

Visualization

IoT Convergence

IoT GW IoT GW IoT GW

IoT APIs

Open Source Information (OSI) Big Data Analysis

Crowd Tasking

Crises and Disaster Management (CDM) - Command & Control Systems and Crowd Tasking

St.Pölten

Salzburg

Linz Wien

Innsbruck Graz Feldkirch

Klagenfurt

B‘Hof St Johann

Eisenstadt

5G – Reliable IoT communication Connected Vehicles

Source: Car 2 Car Communication Consortium, http://www.car‐to‐car.org/

5G node 2 (relay) 5G node 1

(relay)

5G node 3 (relay)

5G

node 1

node 2

node 3 (relay)

controller / 5G gateway

5G – Reliable IoT communication Industry 4.0

18 18.03.2017

5G: Convergence of Optical & Wireless Networks

Opto-electronic 3D Chip Integration

► Convergence of fixed & mobile networks (fully passive ROADM, RRH for mm-wave radio)

► Functional and technological convergence of photonics and electronics on silicon but also on polymer

5G & Photonics @ AIT

electronics

Co- integration

CMOS-compatible integration and assembly processes

5G @ AIT Ultra Reliable Machine-to-Machine Wireless Communications

Wireless automation and control • low latency • distributed time synchronization of

different channels • Real-time behavior - interface to time-

triggered systems • robust operation in dynamic topologies

Rapid prototyping of wireless systems • software defined radio platform • wide frequency range • fast adaptation to use cases

21

Tx

Rx

Power Delay Profile

new models for radio management (20-60 GHz) at high speed (350 km/h)

Ultra broadband RF modelling

Herzlichen Dank Merci

Gracias Köszönom

Grazie Hvala Cảm ơn

有り難うございます

Tack

Trản Trong

THANK YOU FOR YOUR ATTENTION!

σας ευχαριστώ

감사

terima kasih

谢谢