Economic and effective security design
Storms are capable of paralyzing entire cities. Only recently, in the first week of April, large parts of Germany were deprived of power due to hurricane-force winds. Rail services were cancelled, elevators were blocked, and computer screens went blank.
Such extreme weather events often subside as quickly as they arrive but their effects reveal the Achilles heel of modern society, namely our dependence on critical infrastructures such as the power grid. Hence the urgent need for effective security measures. Other public infrastructures, such as airports and road networks, are similarly in need of increased security.
“Quite simply, all operators of critical infrastructures want to increase security in order to ward off acts of sabotage and other malicious attacks. At the same time, they also have to make sure such measures are cost effective,” says Prof. Jan Jürjens of the Fraunhofer Institute for Software and Systems Engineering ISST, describing the basic dilemma.
Researchers at the Dortmund-based institute have teamed up with international partners in the EU’s SECONOMICS project to develop an analysis tool that will enable infrastructure operators to evaluate existing and planned security measures in terms of their effectiveness and cost-efficiency. “Our system provides a founded basis for decisions that will enable users to optimize their security without over-stretching their financial resources,” says Jürjens.
Software provides a graphical map of security-related weak points
The starting point is a customized risk analysis of the current situation. The ISST researchers have developed a model-based software solution containing scenarios for different infrastructures. “After studying the security-related aspects identified during site visits, we put together a set of mathematical algorithms that allow us to determine their interrelationship,” explains Jürjens.
In the case of airports, for example, relevant parameters include the number of security checks, the human resources available, and imposed security regulations such as the presence of liquids in carry-on baggage. In order to tailor the analysis to specific circumstances, the user enters data concerning each of these factors via the user interface – for example staffing levels at the security gate.
The risk analysis software uses these data to create a model scenario and present the results in the form of a graphical diagram. As well as revealing existing weak points, this simulation can also be used to verify the effectiveness and cost-efficiency of planned security measures by varying different parameters, for instance by increasing the number of available personnel. This type of walk-through analysis helps to predict the effect of individual measures on overall security and calculate the necessary investments.
In addition to finding a smart way of correlating the various security aspects, the scientists were also faced with the challenge of managing large quantities of heterogeneous data. “Evaluating the effectiveness of security measures involves factoring in a large number of individual components – a process that, in order to be user-friendly, requires fast processing speeds,” says Jürjens. This is where the ISST’s many years of experience in big data management has proved to be an advantage.
The analysis tool has already demonstrated its practical use in case studies conducted by the project partners, including the evaluation of a U.K. power supply network, Barcelona’s subway system, and a Turkish airport. The software has also been in use for many years at Fraunhofer ISST for consultations with research clients. The project’s final results were recently presented in Brussels. A number of new scenarios are being prepared and, in a next step, the project partners aim to produce a marketable version of their virtual toolbox.
Media Contact
All latest news from the category: Transportation and Logistics
This field deals with all spatial and time-related activities involved in bridging the gap between goods and people, including their restructuring. This begins with the supplier and follows each stage of the operational value chain to product delivery and concludes with product disposal and recycling.
innovations-report provides informative reports and articles on such topics as traffic telematics, toll collection, traffic management systems, route planning, high-speed rail (Transrapid), traffic infrastructures, air safety, transport technologies, transport logistics, production logistics and mobility.
Newest articles
A new puzzle piece for string theory research
Dr. Ksenia Fedosova from the Cluster of Excellence Mathematics Münster, along with an international research team, has proven a conjecture in string theory that physicists had proposed regarding certain equations….
Climate change can cause stress in herring larvae
The occurrence of multiple stressors undermines the acclimatisation strategies of juvenile herring: If larvae are exposed to several stress factors at the same time, their ability to respond to these…
Making high-yielding rice affordable and sustainable
Plant biologists show how two genes work together to trigger embryo formation in rice. Rice is a staple food crop for more than half the world’s population, but most farmers…