Ciprnet Deliverable D6.3

Ciprnet Deliverable D6.3

FP7 Grant Agreement N° 312450 Project type: Network of Excellence (NoE) Thematic Priority: FP7 Cooperation, Theme 10: Security Start date of project: March 1, 2013 Duration: 48 months Due date of deliverable: 31/08/2015 Actual submission date: 31/08/2015 Revision: Version 1 Fraunhofer Institute for Intelligent Analysis and Information Systems (Fraunhofer) Project co-funded by the European Commission within the Seventh Framework Programme (2007–2013) Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Author(s) Erich Rome, Josef Börding Stefan Rilling, Norman Voß (Fraunhofer) Contributor(s) Betim Sojeva, Rainer Worst, Jingquan Xie, Thomas Doll, (Fraunhofer) Andreas Burzel (Deltares), Nikolas Flourentzou (UCY), Rafal Kozik (UTP) Security Assessment D. Sérafin (CEA) Approval Date 31.08.2015 Remarks No security issues The project CIPRNet has received funding from the European Union’s Seventh Framework Pro- gramme for research, technological development and demonstration under grant agreement no 312450. The contents of this publication do not reflect the official opinion of the European Union. Responsibility for the information and views expressed herein lies entirely with the authors. TABLE OF CONTENTS 1 INTRODUCTION .............................................................................................................. 7 1.1 Purpose of this document ........................................................................................................ 7 1.2 Relation to other CIPRNet deliverables .................................................................................. 7 1.3 Structure of the document ....................................................................................................... 8 2 CIPRTRAINER – WIA BASED ON FEDERATED MODELLING, SIMULATION & ANALYSIS .................................................................................................................... 9 3 SCENARIO DATA .......................................................................................................... 12 3.1 Acquisition of data and information ...................................................................................... 12 3.1.1 Data sources for the Electrical Power Network .................................................................... 12 3.1.2 Data sources for the telecommunication networks ................................................................ 13 3.1.3 Data sources for the railway network ................................................................................... 13 3.1.4 Data for flood maps and flood risk ........................................................................................ 14 3.1.5 Other data sources ................................................................................................................. 14 3.2 Artificial data ......................................................................................................................... 17 4 SCENARIO MODELS WITH SYMO ........................................................................... 18 4.1 Storyline: Cross-border flooding with a major dike breach on the Rhine near Rees city ..... 18 4.2 Storyline: Cargo train derailment near Emmerich am Rhein main station (Germany) ......... 18 4.3 Modelling with the SyMo-based design engine .................................................................... 18 4.3.1 General introduction – TAM modelling approach ................................................................ 18 4.3.2 Modelling response actions – resource oriented operation planning ................................... 20 4.3.3 Example: TAM static model of the derailment scenario in Emmerich .................................. 22 4.3.4 Example: TAM process model of the derailment scenario in Emmerich .............................. 25 4.3.5 Example: Scenario file for use with Event Processor ........................................................... 26 4.3.6 Interplay between scenario design, runtime, and analysis phase ......................................... 26 5 FLOODING MODELS .................................................................................................... 28 6 MODELS OF CRITICAL INFRASTRUCTURE – SIMULATORS .......................... 32 6.1 Previous work: DIESIS demonstrator ................................................................................... 32 6.2 Electricity infrastructure – SIEMENS PSS® SINCAL ......................................................... 33 6.2.1 Transmission / Sub-transmission Network in the Emmerich Area ........................................ 33 6.2.2 Distribution Network in the Emmerich Area ......................................................................... 35 6.2.3 Modelling with SINCAL ......................................................................................................... 36 6.2.4 Interconnections to other CIs ................................................................................................ 37 6.3 Telecommunication infrastructure – ns-3 .............................................................................. 38 6.3.1 Telecommunication network in the Emmerich Area .............................................................. 38 6.3.2 Modelling with ns-3 ............................................................................................................... 39 6.3.3 Interconnections to other CIs ................................................................................................ 40 6.4 Railway infrastructure – OpenTrack ..................................................................................... 42 6.4.1 Railway network and traffic in the Dutch-German scenario area ........................................ 42 6.4.2 Description of Emmerich main railway station ..................................................................... 43 6.4.3 Modelling with OpenTrack .................................................................................................... 49 6.4.4 Interconnections to other CIs ................................................................................................ 51 7 LESSONS LEARNED IN MODELLING ...................................................................... 52 8 CONCLUSION ................................................................................................................. 54 9 REFERENCES ................................................................................................................. 56 GLOSSARY ............................................................................................................................ 58 LIST OF ACRONYMS .......................................................................................................... 60 LIST OF FIGURES Figure 1: Diagram of CIPRTrainer architecture; scenario models; scenario model base including external threat models; federate CI models and flooding model .................. 9 Figure 2: Screen shot of an itoworld map of railway electrification in an area covering the area of the NL-DE cross-border scenario. Centre: diamond indicates location of Emmerich. The legend shows additional information on the electrification of Emmerich as tags. .............................................................................................................................. 14 Figure 3: Screen shot of CIPRTrainer GUI. Centre: Map of city of Emmerich. Tactical icons of police (green) and firefighters’ (red) stations, base of THW (blue). Other icons: poles of power transmission line, points of interest (POI). ....................................................... 15 Figure 4: Screen shot of the Emmerich scenario model in SyMo. In the right window, the available attribute types (A operator) are displayed. ........................................................ 19 Figure 5: Screen shots of the locations aspect and the manually defined zones inside the map of Emmerich ..................................................................................................................... 20 Figure 6: Class “Action patterns” for modelling the fighting of an incident in zone Z7. The incident (red triangle) is located in zone Z7, and the action forces (red rectangle) for fighting it are also located in Z7. ...................................................................................... 21 Figure 7: Screen shots of the resources graph and its attributes shown on the map. The lower two leave nodes mean that 50 policemen are initially located in zone Z11 and 30 in zone Z12. The rectangles with the pointed right side link the resources with locations. ......... 21 Figure 8: SyMo screen shot of the matrix of dependencies of resources and locations in the initial configuration. ......................................................................................................... 22 Figure 9: Screen shots of the incidents tree and its attributes. ................................................. 23 Figure 10: Screen shot of the Actions subgraph ...................................................................... 23 Figure 11: Screen shots of the different operators and how they are used inside SyMo ......... 24 Figure 12: Screen shot of scenarios

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    61 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us