However, the WEP protocol is used by the eight
buildings with secure connections.
Table 1: Components and Formula.
Metric Components Formula
1) a
t
=18; a
1
=18; a
2
=8
F
1
= 0.7222
2)
a
t
= 116; a
1
= 111 F
2
= 0.0431
3)
a
t
=18; a
1
=18; a
2
= 0 F
3
= 0.5
4)
a
t1
= 3; a
t2
= 768 hours; a
1
= 0;
a
2
= 3; a
3
= 2; a
4
= 767 hours
and 34 minutes.
F
4
=
0.66652
5)
a
t1
=8 mbits/s; a
t2
=214;
a
1
=0.87844; a
2
= 6
F
5
=
0.93107
The low indicator of metric 2 shows that there is
not a defined policy for users creation in Pedreira’s
network. In metric 3, no default password was
found, but all APs use WEP.
In metric 4, the final result was affected by the
lack of redundancy component. The metric 5 result
reveals that the use of Internet was not abusive
because, on the average only 0.1098% of download
bandwidth and 0.06915% of upload bandwidth is in
use.
The proposed security controls from the results
of security metrics application are: design of a test
suite for the switches access lists, cryptography
implementation in the connections, deployment of a
Domain Controller, to change WEP by WPA,
passwords auditing in the APs, RAID
implementation for data redundancy and Heartbeat
(Hearbeat, 2007) for services.
5 CONCLUSIONS
The successful deployment of MBANs it depends on
the reliability of the systems that constitute them.
Warranty of this reliability can be obtained through
well formed criteria of information security. The
security metrics are tools that can accomplish such
objectives when properly developed and applied.
The metrics applications presented in this work
allow the visualization of security critical areas on
the MBAN of Pedreira. Security controls were
proposed, following the obtained results for this
network. It is important to note that for a complete
network analysis, a larger set of security metrics
must be developed and implemented.
Future work includes the development of new
security metrics for MBANs using the template
proposed here. Another topic is the development of a
framework for data analysis in security metrics.
ACKNOWLEDGEMENTS
The work presented here has been developed under
the umbrella of the projects “Municipal Infovia – An
Open Access Network for Cities” and “SIGM – An
Integrated e-Gov Environment for Cities”. These
projects have been supported in part by the
governments of the cities of São José do Rio Preto,
Pedreira, Penápolis, and Campinas, São Paulo State,
Brazil.
Bruno Bogaz Zarpelão’s work is supported by
the State of São Paulo Research Foundation
(FAPESP).
REFERENCES
AirSnort. 2004. [online] [Accessed 15th April 2008]
Available from World Wide Web
<http://airsnort.shmoo.com/>
Alexiou, A., Bouras, C., Primpas, D., 2006. Design
Aspects of open municipal broadband networks. In
Access Nets ’06, Proceedings of the 1st international
conference on Access networks. ACM Press.
Box, G., Hunter, W., Hunter, J., 1978. Statistcs for
Experimenters. Wiley Series in Probability and
Mathematical Statistics.
CERT. (Unpublished, 2006). Potential Vulnerabilities in
Municipal Communications Network. Report dated
May 2006.
Ford, G., Koutsky, T., 2005. Broadband and economic
development: a municipal case study from Florida.
Review of Urban & Regional Development Studies.
HeartBeat. 2008. [online] [Accessed 15th April 2008]
Available from World Wide Web http://www.linux-
ha.org/Heartbeat
Jaquith, A., 2007. Security Metrics – Replacing Fear,
Uncertainty and Doubt. Addison-Wesley.
Network Management Suite. 2008. [online] [Accessed 5th
April 2008] Available from World Wide Web:
<http://www.mishelpers.com/network_management/>
Patriciu, V., Priescu, I., Nicolaescu, S., 2006. Security
metrics for enterprise information systems. Journal of
Applied Quantitative Methods.
Payne, S., 2006. A Guide to Security Metrics. SANS
Security Essentials Version 1.2e.
Swanson, M., Bartol N., Sabato, J., Hash., J. Graffo, L.,
2003. Security Metrics Guide for Information
Technology Systems. NIST Special Publication 800-5.
Weiss, S., Weissmann, O., Dressler, F., 2005. A
Comprehensive and Comparative Metric for
Information Security. In ICTSM2005, Proceedings of
IFIP International Conference on Telecommunication
Systems, Modeling and Analysis
SECRYPT 2008 - International Conference on Security and Cryptography
476