CyNetPhy: Towards Pervasive Defense-in-Depth for Smart Grid Security
- 1.1k Downloads
Security is a major concern in the smart grid technology extensively relying on Information and Communication Technologies (ICT). New emerging attacks show the inadequacy of the conventional defense tools that provision isolated uncooperative services to individual grid components ignoring their real-time dependency and interaction. In this article, we present a smart grid layering model and a matching multi-layer security framework, CyNetPhy, towards enabling cross-layer security of the grid.CyNetPhy tightly integrates and coordinates between a set of interrelated, and highly cooperative real-time defense solutions designed to address the grid security concerns. We advance a high-level overview of CyNetPhy and present an attack scenario against the smart grid supported by a qualitative analysis of the resolution motivating the need to a cross-layer security framework such as CyNetPhy.
KeywordsSmart grid Smart grid security Pervasive monitoring and analysis Autonomic management Elastic computing Privacy-preserving
This work is supported by the SmartCI Research Center, Alex., Egypt.
- 1.Azab, M., Eltoweissy, M.: Defense as a service cloud for cyber-physical systems. In: 2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 392–401. IEEE (2011)Google Scholar
- 2.Azab, M., Eltoweissy, M.: Bio-inspired evolutionary sensory system for cyber-physical system security. In: Hassanien, A.E., Kim, T.-H., Kacprzyk, J., Awad, A.L. (eds.) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. ISRS, vol. 70, pp. 39–69. Springer, Heidelberg (2014)Google Scholar
- 4.Farag, M.M.: Architectural Enhancements to Increase Trust in Cyber-Physical Systems Containing Untrusted Software and Hardware. Ph.D. thesis, Virginia Polytechnic Institute and State University (2012)Google Scholar
- 8.Mokhtar, B., Eltoweissy, M.: Hybrid intelligence for semantics-enhanced networking operations. In: The Twenty-Seventh International Flairs Conference (2014)Google Scholar