Optimization Problems in Infrastructure Security

Similar documents
Optimization Problems in Infrastructure Security

Computational Geometry. Lecture 1: Introduction and Convex Hulls

Load Balancing. Load Balancing 1 / 24

Assessment Anchors and Eligible Content

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Data Security Concerns for the Electric Grid

The Self-Protection Problem in Wireless Sensor Networks

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring

Cloud Enabled Emergency Navigation Using Faster-than-real-time Simulation

Wireless Sensor Network Performance Monitoring

NEW MEXICO Grade 6 MATHEMATICS STANDARDS

Sample Test Questions

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

System Aware Cyber Security

Dynamic Trust Management for the Internet of Things Applications

Geometry. Higher Mathematics Courses 69. Geometry

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

Face detection is a process of localizing and extracting the face region from the

Find-The-Number. 1 Find-The-Number With Comps

Inv 1 5. Draw 2 different shapes, each with an area of 15 square units and perimeter of 16 units.

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

Geometry and Measurement

Relay2 Enterprise Cloud Controller Datasheet

OPTIMIZING WEB SERVER'S DATA TRANSFER WITH HOTLINKS

Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems

1 Location Management in Cellular

GEOMETRY COMMON CORE STANDARDS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

EE602 Algorithms GEOMETRIC INTERSECTION CHAPTER 27

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Efficient Fault-Tolerant Infrastructure for Cloud Computing

Treemaps with bounded aspect ratio

Shareability and Locality Aware Scheduling Algorithm in Hadoop for Mobile Cloud Computing

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

Using Received Signal Strength Variation for Surveillance In Residential Areas

On Ubiquitous Network Security and Anomaly Detection *

Cybersecurity on a Global Scale

Analyzing Distribution of Traffic Capacity

Computing by Mobile Robotic Sensors

Chapter 111. Texas Essential Knowledge and Skills for Mathematics. Subchapter B. Middle School

Section 1.1. Introduction to R n

New York State Student Learning Objective: Regents Geometry

7.2 Quadratic Equations

Optimizing the Placement of Integration Points in Multi-hop Wireless Networks

The Importance of Cybersecurity Monitoring for Utilities

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

Wireless Intrusion Detection Systems (WIDS)

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

Random graphs with a given degree sequence

Curriculum Map by Block Geometry Mapping for Math Block Testing August 20 to August 24 Review concepts from previous grades.

Event Processing Middleware for Wireless Sensor Networks

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL

Mini-project in TSRT04: Cell Phone Coverage

Geometry Enduring Understandings Students will understand 1. that all circles are similar.

Rules for the IEEE Very Small Competition Version 1.0

MATH 095, College Prep Mathematics: Unit Coverage Pre-algebra topics (arithmetic skills) offered through BSE (Basic Skills Education)

SANS Top 20 Critical Controls for Effective Cyber Defense

Kangas Cybersecurity strategy

Technology White Paper Capacity Constrained Smart Grid Design

Prentice Hall Algebra Correlated to: Colorado P-12 Academic Standards for High School Mathematics, Adopted 12/2009

Academic Standards for Mathematics

Numerical Methods for Option Pricing

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data.

Disjoint Compatible Geometric Matchings

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

Understanding SCADA System Security Vulnerabilities

Partitioning and Divide and Conquer Strategies

Constrained curve and surface fitting

Offline sorting buffers on Line

Largest Fixed-Aspect, Axis-Aligned Rectangle

MA107 Precalculus Algebra Exam 2 Review Solutions

.:!II PACKARD. Performance Evaluation ofa Distributed Application Performance Monitor

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

MATH BOOK OF PROBLEMS SERIES. New from Pearson Custom Publishing!

Managing cyber risk the global banking perspective

VISUALIZING HIERARCHICAL DATA. Graham Wills SPSS Inc.,

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Dynamic Vulnerability Assessment

Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks

MA 408 Computer Lab Two The Poincaré Disk Model of Hyperbolic Geometry. Figure 1: Lines in the Poincaré Disk Model

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

Social Media Mining. Graph Essentials

MCTA: Target Tracking Algorithm based on

Big Ideas in Mathematics

How performance metrics depend on the traffic demand in large cellular networks

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland

Agenda. TreeMaps. What is a Treemap? Basics

Prediction of DDoS Attack Scheme

On demand synchronization and load distribution for database grid-based Web applications

Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing

Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Transcription:

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa, ON, Canada

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 2 Outline Infrastructure Security SCADA Optimization Problems Robot Patrolling. Sensor Coverage and Interference. Robot Evacuation. Domain Protection and Blocking. Conclusion

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 3 What is Infrastructure Security? Someone may steal from it at night! So, a night watchman position was created! How can the watchman work with no instructions? So, a planning department was created! How we know the watchman is doing the tasks correctly? So, a Quality Control Department was created! How are these people going to get paid? So,... How...? So,...

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 4 Infrastructure Security

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 5 Infrastructure Security Infrastructure security is concerned with securing physical assets so as to withstand, and rapidly recover from potential threats that may affect critical resources located or enclosed within a given bounded region. This is a very broad statement.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 6 Diversity of Infrastructure Security The diversity of such systems makes potential threats difficult to grasp and the required rigorous security analysis almost impossible to pursue.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 7 Infrastructure Sectors Buildings and roads, Border systems, Economic structures and materials, Energy and water supply systems, Internet and telecommunication systems.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 8 What is SCADA? Supervisory Control And Data Acquisition (SCADA). Large scale computer based industrial control system for monitoring and controlling industrial facility based processes Includes various general buildings, transport systems, heating and ventilation systems, energy production and consumption. SCADA architectures: originally primitive in design and conception evolving systems; distributed and networked control augmented with sensor systems based on IoT. Network Infrastructure: system concepts and details of system components, control system for HCI by supervisory station(s), various types of communication methods.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 9 SCADA a a T. Lewis, Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2006

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 10 General fault tree of possible vulnerabilities a a T. Lewis, Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2006

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 11 Smart Cities Intelligent Operations Center (IOC) for monitoring city services water systems, public safety, transportation, hospitals, electricity grids, and buildings,...

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 12 Optimization Problems

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 13 Optimization Problems Why optimization? Optimizing the solution of a problem affects reaction time. Which optimization problems? There are so many! Will discuss some which are relevant to security. Robot Patrolling. Sensor Coverage and Interference. Robot Evacuation. Domain Protection and Blocking.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 14 Patrolling

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 15 Motivation Patrolling problems in computer games Safeguard a given region/domain/territory from enemy invasions. Exterior Interior Patrolling problems in robotics Patrolling is defined as the perpetual process of walking around an area in order to protect or supervise it. Exterior Interior

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 16 Problem k mobile agents are placed on the boundary of a terrain. An intruder attempts to penetrate to the interior of the terrain through a point of the boundary, unknown to and unseen by the agents. The intrusion requires some period of time t. The agents are required to protect the boundary, arriving before the intrusion is complete.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 17 Setting Each agent i has its own predefined maximal speed v i, for 1, 2,..., k. Agents are deployed on the boundary and programmed to move around the boundary, without exceeding their maximum speed. Question: for given speeds {v 1, v 2,..., v k } and time τ, does there exist a deployment of agents which protects the boundary from any intruder with intrusion time not exceeding τ?

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 18 Efficiency How do you optimize the frequency of visits to the points of the environment? Idleness (or refresh time:) is the time elapsed since the last visit of the node. Idleness can be average, worst-case, experimentally verified, etc,... In a way, given the input parameters you want to know what is the best effort result you can accomplish!

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 19 Patrolling Strategies The graph (or environment) to be patrolled is usually approximated by a set of subgraphs forming a (skeletonization). A skeleton of the environment is defined over which patrolling is being conducted by the robots.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 20 Goal Minimize maximal idle time for a set of boundary patrolling robots with distinct maximal speeds (v 1, v 2,..., v k ) Studied Environments Studied Strategies

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 21 Traversal Algorithms The position of agent a i at time t [0, ) is described by the continuous function a i (t). Hence respecting the maximal speed v i of agent a i means that for each real value t 0 and ɛ > 0, s.t., ɛv i < 1/2, the following condition is true dist(a i (t), a i (t + ɛ)) v i ɛ (1) where dist(a i (t), a i (t + ɛ)) denotes the distance along the cycle between the positions of agent a i at times t and t + ɛ. A traversal algorithm on the cycle for k mobile agents is a k-tuple A = (a 1 (t), a 2 (t),..., a k (t)) which satisfies Inequality (1), for all i = 1, 2,..., k.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 22 Proportional Partition Algorithm 1. Proportional Partition for k agents with maximal speeds (v 1, v 2,..., v k ) 1. Partition the unit segment into k segments, such that the length of the i-th segment s i equals v i v 1 +v 2 + +v k. 2. For each i, place the i-th agent at any point of segment s i. 3. For each i, the i-th agent moves perpetually at maximal speed, alternately visiting both endpoints of s i. On unit-length segment or circle, algorithm achieves idle time: I = 2 v 1 + v 2 + + v k.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 23 Cyclic Goal: deploy (some of) the robots, all moving around the circle at the same speed, with equal spacing. Algorithm 2. Uniform-Cyclic for k agents with maximal speeds (v 1, v 2,..., v k ) on the circle Let v 1 v 2 v k. 1. Choose r from the range 1..k, so as to maximize: rv r 2. Place agents 1, 2,..., r at equal distances of 1/r around the circle. 3. Agents 1, 2,..., r move perpetually counterclockwise around the circle at speed v r. 4. Agents r + 1, r + 2,..., k are not used by the algorithm.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 24 Conclusion & Further Results Faulty robots. General Graph & Geometric Environments. Distributed vs Centralized Control. Many open and very difficult problems.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 25 Coverage & Interference

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 26 Why Monitoring Making Canadian Ice Wine. The Beautiful game!

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 27 Sensor (Barrier) Coverage A geometric domain and n sensors in(out)side the domain. Sensors may not cover the (barrier of the) domain! Problem: We want to move the sensors so as to cover the (barrier of the) domain in the sense that every point in the (barrier of the) domain is within the range of a sensor. Optimize the movement!

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 28 Sensor Coverage & Interference Move the sensors from start positions so as to cover the domain. A critical value r specifies the coverage range. r s r r A critical value, say s > 0 specifies that sensors be kept a distance of at least s apart. Signals interfere during communication if distance is < s.

X 1 X 2... X n... Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 29 Random Model for Coverage & Interference Sensors are thrown randomly and independently with the uniform distribution in the unit interval. X 1, X 2,..., X n represent sensor positions. Coverage Problem in the unit interval [0, 1]: X 1 X 2... X n Interference Problem in the half-line [0, + ): X i is the i-th arrival in a Poisson process. How much movement is needed to accomplish the task?

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 30 Coverage: Motivation (1/3) Throw n sensors of radius r := 1 2n at random in a unit interval. To ensure coverage of the interval they must be moved to anchors a i = i n + 1 2n, for i = 0, 1,..., n 1. This is the worst-case total movement! The cost is roughly n. Why? Do a simulation!

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 31 Coverage: Motivation (2/3) Keep increasing the sensor radius. The bigger the radius the less the movement! Why? For n sensors of radius Θ( ln n n ), w.h.p. no sensor needs to move! Why? The probability that no sensor drops inside a subinterval of length x is (1 x) n. x 0 1 However, (1 x) n = ( 1 xn n ) n e xn = 1 n c, for x = c ln n n, where c > 0.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 32 Coverage: Prediction (3/3) Sensor movement as a function of the sensor range. n Movement O(1) 1 2n ln n n Sensor Range r The bigger the radius (range) the smaller the movement.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 33 Interference: Motivation (1/2) Throw n sensors at random in a unit interval. We want to ensure no two sensors are at distance < s. To ensure no two sensors are at distance < 1 2n they must all be placed to anchors a i = i n + 1 2n, for i = 0, 1,..., n 1. This is the worst-case total movement! Why? Keep decreasing the interference distance s. The smaller the interference distance s the less the movement! Why? In general, Arrival Time of i + 1st sensor Arrival Time of ith sensor are the interarrival times of the Poisson process.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 34 Interference: Prediction (2/2) Sensor movement as a function of the sensor distance. n Movement O(1) 0 1 n Interference Distance s The smaller the interference distance the smaller the movement.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 35 Critical Regime for Coverage Sensor Range r Total Displacement E(r) 1 2n Θ( n) 1+ɛ 2n O (1) n Movement Sharp Drop O(1) 1 2n ln n n Sensor Range r

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 36 Critical Regime for Interference On a line there is critical threshold around 1 n, 1. for s below 1 n 1, E(s) is a constant O(1), n 3/2 2. for s [ 1 n 1, 1 n 3/2 n + ] 1 n, E(s) is in Θ( n), 3/2 3. for s above 1 n + 1, E(s) is above Θ( n). n 3/2 Sensor movement as a function of the sensor distance. n Sharp Drop Movement O(1) 0 1 n Interference Distance s

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 37 Conclusion and Further Results Several algorithms known in 1D Problem is harder in 2D Several metrics have been considered. Many interesting (difficult) questions for general domans.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 38 Evacuation

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 39 Searching for an Exit (1/3) You are located at some point. You are told an exit is at distance 1 from you. Your max speed is 1. What is the best (time optimal) algorithm to find the exit?

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 40 Searching for an Exit (2/3) Go for distance 1 (to the perimeter). On the perimeter choose a direction (CW or CCW). How long does it take you (in the worst case) to find the exit?

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 41 Searching for an Exit (3/3) In the worst case, this algorithm takes time 1 + 2π 7.28. Can you do better than 1 + 2π?

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 42 Evacuation from a Circle k 2 robots start from anywhere inside a disk. exit k robots Exit is located on the perimeter.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 43 Lets simplify the geometry! k robots start from the center of a disk. exit k robots Exit is located on the perimeter.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 44 Evacuation Problem Consider k mobile robots inside a circular disk of unit radius. The robots are required to evacuate the disk through an unknown exit: a point situated on its boundary. We assume all robots having the same (unit) maximal speed and starting at the centre of the disk. The robots may communicate in order to inform themselves about the presence (and its position) or the absence of an exit. The goal is for all the robots to evacuate through the exit in minimum time.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 45 Communication Models How do the robots communicate? We consider two models of communication between the robots: face-to-face (or local) communication model: robots exchange information only when simultaneously located at the same point, and wireless communication model: robots can communicate with each other at any time.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 46 Evacuation Time Robots do not necessarily evacuate at the same time. Robots can try to find the exit on their own! As soon as a robot finds the exit it tries to inform the rest! Measuring the complexity of an algorithm. Minimum time required so that all robots evacuate.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 47 Face-to-Face Model: Evacuation Algorithm for 2 robots Theorem 1 There is an algorithm for evacuating the robots from an unknown exit located on the perimeter of the disk which takes time 1 + α/2 + 3 sin(α/2) where the angle α satisfies the equation cos(α/2) = 1/3. It follows that the evacuation algorithm takes time 5.74. Evacuation Algorithm B x A x C α K y D y

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 48 Wireless Communication Model Theorem 2 There is an algorithm for evacuating two robots from an unknown exit located on the perimeter of the disk which takes time at most 1 + 2π 3 + 3 4.826. Evacuation Algorithm A x x B c(x)

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 49 What Else is Known about Evacuation

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 50 Blocking

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 51 Rectangular Domain Consider a rectangular grid domain including buildings and sensors in specific locations.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 52 Penetration Intruders attempt to penetrate walking in a rectangular domain. Sensors are placed at nodes of a regular spaced grid laid out over the rectangle.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 53 Protection & Blocking An intruder that steps within the sensing range of a sensor will be detected. It is desired that we prevent potential attacks in either one dimension or two dimensions. A one-dimensional attack succeeds when an intruder enters from the top (North) side and exits out the bottom (South) side of the domain without being detected. Preventing attacks in two dimensions requires that we simultaneously prevent the intruder from either entering North and exiting South or entering East (left side) and exiting West (right side) undetected.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 54 Fault Tolerant Initially, all of the sensors are working properly and the domain is fully protected, i.e., attacks will be detected, in both dimensions Over time, the sensors may fail and we are left with a subset of working sensors. Under these conditions we wish to 1. determine if one or two-dimensional attack detection still persists and 2. if not, restore protection by adding the least number of sensors required to ensure detection in either one or two dimensions.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 55 Main Problem: Blocking: k-fault Tolerant 1. Decide if a subset of the sensors provides protection with up to k faults and 2. if not, find the minimum number of grid points to add sensors to in order to achieve k fault-tolerance 3. or, if not, find the minimum number of grid points to add sensors to in order to achieve k fault-tolerance that minimizes the total or max movement. Also interesting for optimally restoring k-fault tolerant protection in one dimension and for restoring protection in two dimensions (optimally for k = 0 and approximately otherwise).

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 56 Main Idea: Steiner Points Add four virtual points: N, S, E, W N W E Sensors (Steiner Points) are placed at nodes of a regular spaced grid laid out over the rectangle. S

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 57 Results We show the following for an m n grid: 1. There exist O(mn) time algorithms for solving the one- and two-dimensional k-protection decision problems. 2. There exists a O(kmn log(mn)) time algorithm for solving the one-dimensional k-protection placement problem. 3. There exists a O(m 2 n 2 ) time algorithm for solving the two-dimensional protection placement problem. 4. There exists a O(kmn log(mn)) time 2-approximation algorithm for solving the two-dimensional k-protection placement problem. In all of the above we assume k < min{m, n} as we shall see that the problems can not be solved otherwise.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 58 Extensions More general versions of these problems could be studied, including protecting: 1. domains containing impassable regions, 2. non-rectangular domains, and 3. against more general attacks than just North-South or East-West.

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 59 Conclusions Many optimization problems are tied to infrastructure security. Their study, analysis and appropriate implementation could be vital to the proper functioning of infrastrucure in our society.