Improving railway security

Standardised European rail equipment makes it easy to attack the network. A European study assessed likely forms of electromagnetic (EM) attack, and is devising protective solutions involving reliable communications architecture and a management system.

The homogenisation of European rail network technologies brings many advantages, yet also introduces security risks. EM equipment able to affect one part of the system can easily affect another, especially considering that Europe's railways only adapt public technologies.

With EU funding, the 'Security of railways against electromagnetic attacks' (SECRET) project investigated the impact of EM attacks on European rail networks. Comprised of an 11-member consortium, the project's objectives include threat assessment, technical protection and policy recommendations. The initiative will conclude in August 2015, after three years of operation.

The project considered how to proceed with a risk analysis of rail network technologies and threat assessment. Research identified the three most probable classes of attack. Two were possible but technically difficult, leaving the most credible threat as the jamming of information transmitted between system components. Publicly detailing such threats makes implementing them easier; therefore, a 'use case' lacking sensitive information has been defined to test various solutions.

Laboratory testing characterised the signals produced by jamming devices and assessed the vulnerability of receiver equipment. Similar measurements were performed along the tracks, as well as inside train carriages and stations. Data were collected showing the effect of separated two-part EM attack devices.

The team has proposed a protection solution that combines robust communications architecture with an attack management sub-system. Testing will commence in a future phase of the project.

SECRET has thus far defined possible security threats to European rail systems, and is on the path to offering practical solutions. The research has also showed how attacks might work in practice.

last modification: 2015-07-02 14:08:52
Comments


Privacy Policy