A Tool for Evolutionary Threat Analysis of Smart Grids
- 626 Downloads
Cyber-security is becoming more and more relevant with the advent of large-scale systems made of independent and autonomous constituent systems that interoperate to achieve complex goals. Providing security in such cyber-physical systems means, among other features, identifying threats generated by novel detrimental behaviors. This paper presents a tool based on a methodology that is intended to support city evolution and energy planning with a focus on threats due to novel and existing interconnections among different components. More in detail, we report a tool demonstration which shows the application of a tool devised to (i) deal with security threats arising due to evolutions in a Smart City - intended as a complex cyber-physical system -, and (ii) consequently perform threat analysis.
KeywordsThreat analysis Smart Grids Evolution IRENE
This work has been partially supported by the projects JPI Urban Europe IRENE, FP7-ICT-2013-10-610535 AMADEOS and FP7-IRSES DEVASSES.
- 1.Grid, NIST Smart. Guide for Conducting Risk Assessments. Special Publication 800-30, September 2012Google Scholar
- 2.Jung, O., et al.: Towards a collaborative framework to improve urban grid resilience. In: 2016 IEEE International Energy Conference (ENERGYCON), Leuven, pp. 1–6 (2016)Google Scholar
- 3.IRENE, D2.1 – Threat Identification and Ranking (2015). http://ireneproject.eu/public-deliverables/
- 4.Mori, M., Ceccarelli, A., Zoppi, T., Bondavalli, A.: On the impact of emergent properties on SoS security. In: 2016 11th System of Systems Engineering Conference (SoSE), Kongsberg, pp. 1–6 (2016)Google Scholar
- 5.Ayewah, N., et al.: Using FindBugs on production software. In: Companion to the 22nd ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications Companion (2007)Google Scholar
- 7.IRENE project, Improving the Robustness of Urban Electricity Networks. http://ireneproject.eu/
- 8.Ganter, B., Wille, R., Wille, R.: Formal Concept Analysis. Springer, Heidelberg (1999)Google Scholar
- 9.Alexandr, V., et al.: Towards security requirements: iconicity as a feature of an informal modeling language. In: 3rd International Workshop on Requirements Engineering for Self- Adaptive and Cyber Physical Systems (RESACS) (2017, to appear)Google Scholar