Methodology

WORKPACKAGE 5: SCOUT demonstrator design, realization and testing

The goal of this Workpackage is to built a demonstrator of the SCOUT system, and to test and assess it in the considered real scenario.

Workpackage 5.1.- Demonstration scenario definition

The scenario will be completely characterized in term of available IOs, DEM, size and shape of the infrastructure, surround analysis , network configuration and architecture, existing alarm system, location of the control unit, definition of risk area priority.

Workpackage 5.2.- Requirements and architecture

The use case and the demonstration goals must be translated into technical system requirements of the SCOUT demonstrator. The demonstrator will fit the requirements for fully demonstration of the capability of the SCOUT system.  In accordance of the determined system requirements, the overall SCOUT demonstrator architecture will be defined.

Workpackage 5.3.- SENSNET subsystem demonstrator design and analysis

It consists in defining the number of sensors, their positioning, the structure, the surveillance area, the data link structure for data exchange and sensor control, the basic architecture for implementing data fusion processing and GUI realization.

Workpackage 5.4.- CYBERSENS subsystem demonstrator design and analysis

The CYBERSENS will require the definition of the number of detectors and where they will act in the network to control anomaly throughput behavior. A demonstrator of CYBERSENS will be defined and integrated in the platform in order to verify the subsystem works properly in the application scenario, and the interaction with RECOVER performs as defined in the specification.

Workpackage 5.5.- RECOVER subsystem demonstrator design and analysis

The RECOVER subsystem will be designed and implemented according to the novel, emerging architectural model called SDN (Software Defined Networking) that separates the control plane from the data plane in network switches and routers. The activation and reaction of the RECOVER system will be based on the network probing activity and will be controlled by the Main Control Unit, under the current assessment of the risks.

Workpackage 5.6.- Control and decision making support sybsystem design and analysis

Control and decision making support subsystem will be designed based on AI methodologies, that enhance and improve the system functionalities, mainly in terms of early warning generation. The design criteria and the subsystem realization will be guided by the risk analysis tool outcomes applied to the selected scenarios, and ground stations, without forgetting the user application quality of service requirements.

Workpackage 5.7.- Experimental set up and measurement

The measurement planning and experimental set up will be defined based on the demonstration scenario and on the objective capability we intend to demonstrate. In accordance with the ethical and privacy people respectful, a staff for measurement will be recruited and employed during the measurement to emulate physical intrusions. A cyber jamming will be also generated to emulate a cyber attack in order to test the reactivity of the CYBERSENS. A node network fault will be produced by switching off some routers, serves and other network devices to test how the RECOVER acts to restore or reconfigure the network.

Workpackage 5.8.- Data analysis and system validation

In order to assess the system  performance, standard scenarios will be defined, which bear the potential to be extrapolated to any generic or real application scenario.