Scroll Top

PERSIST

Security Services Platform for Smart Grid Infrastructures

Project Overview: 

Due to the use of SCADA systems in public networks for long range monitoring, and their adaptation to new technologies, such as cloud computing, the number of risks, vulnerabilities and data leakage are dramatically increasing. For this reason, the expansion towards Smart Grids requires solving important security problems ranging from the control systems (SCADA systems) to substations and AMIs, and it in addition makes necessary to consider a wide number of security issues at a low cost. These issues can easily range from very elementary problems, such as availability and data integrity of the energy consumption data, to the most advanced ones, such as stealth attacks to substations. Also, topics of protection against non-authorised access to digital resources (information belonging to the SCADA — alarms, measurements or commands — or consumer’s data) that are part of the Smart Grid likewise have to be considered.

Given this, it is clear that the PERSIST project focuses on the provision of a secure interconnection platform based on a set of “Security Services“, specifically designed for protecting the interconnection of, at least, the critical infrastructures that are part of a Smart Grid, such as the central monitoring systems, substations and AMIs.

For the development of this platform, NICS is in charge of the specification, design and development of the required security services including prevention, warning, and response to threats services through communication networks to the substations, as well as services that prevent from misuse of privileged information at the AMIs by the field operators and the unsuitable explotation of the power grid. NICS is completely convinced that the PERSIST platform will guarantee economical savings as well as it will avoid potential problems that might arise in the case that such services were directly integrated into the already installed systems, and which configuration is complex. Last but not least, the results of the PERSIST project, which have been very varied in terms of protection[1][2][3][4][5][6][7][8][9][10]detection[11][12][13][14][15][16][17][18][19][20][21]resilience[22][23][24][25][26]trust[27][28][29] and privacy[30][31][32][33][34][35][36][37][38], as also indicated below in the references section.

References

  1. Ana Nieto and Ruben Rios and Javier Lopez (2018): IoT-Forensics meets Privacy: Towards Cooperative Digital Investigations. In: Sensors, vol. 18, no. 492, 2018, ISSN: 1424-8220.
  2. Rodrigo Roman and Javier Lopez and Masahiro Mambo (2018): Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. In: Future Generation Computer Systems, vol. 78, pp. 680-698, 2018, ISSN: 0167-739X.
  3. Ana Nieto and Ruben Rios and Javier Lopez (2017): A Methodology for Privacy-Aware IoT-Forensics. In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017), pp. 626-633, IEEE IEEE, Sydney (Australia), 2017, ISSN: 2324-9013.
  4. Gerardo Fernandez and Ana Nieto (2017): Configuración de honeypots adaptativos para análisis de malware. In: III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), pp. 91-98, Servicio de Publicaciones de la URJC Servicio de Publicaciones de la URJC, Madrid (Spain), 2017, ISBN: 978-84-608-4659-8.
  5. Ana Nieto and Nikolaos Nomikos and Javier Lopez and Charalambos Skianis (2017): Dynamic Knowledge-based Analysis in non-Secure 5G Green Environments using Contextual Data. In: IEEE Systems Journal, vol. 11, no. 99, pp. 2479-2489, 2017, ISSN: 1932-8184.
  6. David Nuñez and Isaac Agudo and Javier Lopez (2017): Proxy Re-Encryption: Analysis of Constructions and its Application to Secure Access Delegation. In: Journal of Network and Computer Applications, vol. 87, pp. 193-209, 2017, ISSN: 1084-8045.
  7. Cristina Alcaraz and Javier Lopez (2017): Secure Interoperability in Cyber-Physical Systems. In: Security Solutions and Applied Cryptography in Smart Grid Communications, IGI Global, USA, pp. 137-158, IGI Global, USA, 2017, ISBN: 9781522518297.
  8. Ana Nieto and Rodrigo Roman and Javier Lopez (2016): Arquitectura funcional para la cadena de custodia digital en objetos de la IoT. In: XIV Reunión Española sobre Criptología y Seguridad de la Información, pp. 168-173, 2016, ISBN: 978-84-608-9470-4.
  9. Ana Nieto and Rodrigo Roman and Javier Lopez (2016): Testigo digital: delegación vinculante de evidencias electrónicas para escenarios IoT. In: II Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2016), pp. 109-116, 2016, ISBN: 978-84-608-8070-7.
  10. Ana Nieto and Javier Lopez (2015): Contextualising Heterogeneous Information in Unified Communications with Security Restrictions. In: Computer Communications, vol. 68, pp. 33-46, 2015, ISSN: 0140-3664.
  11. Lorena Cazorla and Cristina Alcaraz and Javier Lopez (2018): Cyber Stealth Attacks in Critical Information Infrastructures. In: IEEE Systems Journal, vol. 12, pp. 1778-1792, 2018, ISSN: 1932-8184.
  12. Juan E. Rubio and Cristina Alcaraz and Rodrigo Roman and Javier Lopez (2017): Analysis of Intrusion Detection Systems in Industrial Ecosystems. In: 14th International Conference on Security and Cryptography (SECRYPT 2017), pp. 116-128, SciTePress SciTePress, 2017, ISBN: 978-989-758-259-2.
  13. Cristina Alcaraz and Jesús Rodriguez and Rodrigo Roman and Juan E. Rubio (2017): Estado y Evolución de la Detección de Intrusiones en los Sistemas Industriales. In: III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), 2017.
  14. Cristina Alcaraz and Lorena Cazorla and Javier Lopez (2017): Cyber-Physical Systems for Wide-Area Situational Awareness. In: Cyber-Physical Systems: Foundations, Principles and Applications, pp. 305 - 317, Academic Press, Boston, 2017, ISBN: 978-0-12-803801-7.
  15. Cristina Alcaraz and Javier Lopez and Stephen Wolthusen (2017): OCPP Protocol: Security Threats and Challenges. In: IEEE Transactions on Smart Grid, vol. 8, pp. 2452 - 2459, 2017, ISSN: 1949-3053.
  16. David Nuñez and Isaac Agudo and Javier Lopez (2017): The fallout of key compromise in a proxy-mediated key agreement protocol. In: 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’17), pp. 453-472, Springer Springer, Philadelphia, USA, 2017, ISBN: 978-3-319-61176-1.
  17. David Nuñez and Isaac Agudo and Javier Lopez (2016): Nuevas nociones de seguridad y transformaciones genéricas para criptosistemas de recifrado delegado. In: XIV Reunión Española sobre Criptología y Seguridad de la Información, pp. 174-179, Mahón, Menorca, Islas Baleares, 2016, ISBN: 978-84-608-9470-4.
  18. David Nuñez and Isaac Agudo and Javier Lopez (2016): On the Application of Generic CCA-Secure Transformations to Proxy Re-Encryption. In: Security and Communication Networks, vol. 9, pp. 1769-1785, 2016, ISSN: 1939-0114.
  19. Cristina Alcaraz and Javier Lopez and Stephen Wolthusen (2016): Policy Enforcement System for Secure Interoperable Control in Distributed Smart Grid Systems. In: Journal of Network and Computer Applications, vol. 59, pp. 301–314, 2016, ISSN: 1084-8045.
  20. Lorena Cazorla and Cristina Alcaraz and Javier Lopez (2015): Awareness and Reaction Strategies for Critical Infrastructure Protection. In: Computers and Electrical Engineering, vol. 47, pp. 299-317, 2015, ISSN: 0045-7906.
  21. David Nuñez and Isaac Agudo and Javier Lopez (2015): NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU. In: 10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), pp. 179-189, 2015, ISBN: 978-1-4503-3245-3.
  22. Cristina Alcaraz and Javier Lopez (2018): A Cyber-Physical Systems-Based Checkpoint Model for Structural Controllability. In: IEEE Systems Journal, vol. 12, pp. 3543-3554, 2018, ISSN: 1932-8184.
  23. Cristina Alcaraz (2017): Resilient Industrial Control Systems based on Multiple Redundancy. In: International Journal of Critical Infrastructures (IJCIS), vol. 13, no. 2/3, pp. 278 - 295, 2017, ISSN: 1741-8038.
  24. Cristina Alcaraz and Javier Lopez and Kim-Kwang Raymond Choo (2017): Resilient Interconnection in Cyber-Physical Control Systems. In: Computers & Security, vol. 71, pp. 2-14, 2017, ISSN: 0167-4048.
  25. Cristina Alcaraz and Javier Lopez and Kim-Kwang Raymond Choo (2016): Dynamic Restoration in Interconnected RBAC-based Cyber-Physical Control Systems. In: Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (SECRYPT 2016), pp. 19-27, Lisboa, 2016, ISBN: 978-989-758-196-0.
  26. Cristina Alcaraz and Javier Lopez (2016): Safeguarding Structural Controllability in Cyber-Physical Control Systems. In: The 21st European Symposium on Research in Computer Security (ESORICS 2016), pp. 471-489, Springer Springer, Crete, Greece, 2016, ISBN: 978-3-319-45741-3.
  27. Carmen Fernandez-Gago and Francisco Moyano and Javier Lopez (2017): Modelling Trust Dynamics in the Internet of Things. In: Information Sciences, vol. 396, pp. 72-82, 2017, ISSN: 0020-0255.
  28. Francisco Moyano and Carmen Fernandez-Gago and Javier Lopez (2016): A Model-driven Approach for Engineering Trust and Reputation into Software Services. In: Journal of Network and Computer Applications, vol. 69, pp. 134-151, 2016, ISSN: 1084-8045.
  29. Francisco Moyano and Carmen Fernandez-Gago and Kristian Beckers and Maritta Heisel (2015): Engineering Trust- and Reputation-based Security Controls for Future Internet Systems. In: The 30th ACM/SIGAPP Symposium On Applied Computing (SAC 2015), pp. 1344-1349, Salamanca, Spain, 2015, ISBN: 978-1-4503-3196-8.
  30. Ana Nieto and Ruben Rios and Javier Lopez (2017): Digital Witness and Privacy in IoT: Anonymous Witnessing Approach. In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017), pp. 642-649, IEEE IEEE, Sydney (Australia), 2017, ISSN: 2324-9013.
  31. Javier Lopez and Ruben Rios and Feng Bao and Guilin Wang (2017): Evolving privacy: From sensors to the Internet of Things. In: Future Generation Computer Systems, vol. 75, pp. 46–57, 2017, ISSN: 0167-739X.
  32. Ruben Rios and David Nuñez and Javier Lopez (2017): Query Privacy in Sensing-as-a-Service Platforms. In: Vimercati, Sabrina De Capitani; Martinelli, Fabio (Ed.): 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), pp. 141–154, Springer Springer, Roma, Italy, 2017.
  33. Juan E. Rubio and Cristina Alcaraz and Javier Lopez (2017): Recommender System for Privacy-Preserving Solutions in Smart Metering. In: Pervasive and Mobile Computing, vol. 41, pp. 205-218, 2017, ISSN: 1574-1192.
  34. Ana Nieto and Ruben Rios (2017): Requisitos y soluciones de privacidad para la testificación digital. In: III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), pp. 51-58, Servicio de Publicaciones de la URJC Servicio de Publicaciones de la URJC, Madrid (Spain), 2017, ISBN: 978-84-608-4659-8.
  35. Juan E. Rubio and Cristina Alcaraz and Javier Lopez (2017): Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems. In: The 11th International Conference on Critical Information Infrastructures Security, pp. 176-188, 2017.
  36. Ruben Rios and Javier Lopez (2016): Evolución y nuevos desafios de privacidad en la Internet de las Cosas. In: XIV Reunión Española sobre Criptología y Seguridad de la Información, pp. 209-213, Mahón, Menorca, Islas Baleares, 2016.
  37. Ruben Rios and Carmen Fernandez-Gago and Javier Lopez (2016): Privacy-Aware Trust Negotiation. In: 12th International Workshop on Security and Trust Management (STM), pp. 98-105, Springer Springer, Heraklion, Crete, Greece, 2016, ISSN: 0302-9743.
  38. Ruben Rios and Jorge Cuellar and Javier Lopez (2015): Probabilistic receiver-location privacy protection in wireless sensor networks. In: Information Sciences, vol. 321, pp. 205 - 223, 2015, ISSN: 0020-0255.