Skip to main content

A Tool for Evolutionary Threat Analysis of Smart Grids

  • Conference paper
  • First Online:

Abstract

Cyber-security is becoming more and more relevant with the advent of large-scale systems made of independent and autonomous constituent systems that interoperate to achieve complex goals. Providing security in such cyber-physical systems means, among other features, identifying threats generated by novel detrimental behaviors. This paper presents a tool based on a methodology that is intended to support city evolution and energy planning with a focus on threats due to novel and existing interconnections among different components. More in detail, we report a tool demonstration which shows the application of a tool devised to (i) deal with security threats arising due to evolutions in a Smart City - intended as a complex cyber-physical system -, and (ii) consequently perform threat analysis.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Grid, NIST Smart. Guide for Conducting Risk Assessments. Special Publication 800-30, September 2012

    Google Scholar 

  2. Jung, O., et al.: Towards a collaborative framework to improve urban grid resilience. In: 2016 IEEE International Energy Conference (ENERGYCON), Leuven, pp. 1–6 (2016)

    Google Scholar 

  3. IRENE, D2.1 – Threat Identification and Ranking (2015). http://ireneproject.eu/public-deliverables/

  4. Mori, M., Ceccarelli, A., Zoppi, T., Bondavalli, A.: On the impact of emergent properties on SoS security. In: 2016 11th System of Systems Engineering Conference (SoSE), Kongsberg, pp. 1–6 (2016)

    Google Scholar 

  5. Ayewah, N., et al.: Using FindBugs on production software. In: Companion to the 22nd ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications Companion (2007)

    Google Scholar 

  6. ConExp. https://code.google.com/archive/p/colibri-java

  7. IRENE project, Improving the Robustness of Urban Electricity Networks. http://ireneproject.eu/

  8. Ganter, B., Wille, R., Wille, R.: Formal Concept Analysis. Springer, Heidelberg (1999)

    Google Scholar 

  9. Alexandr, V., et al.: Towards security requirements: iconicity as a feature of an informal modeling language. In: 3rd International Workshop on Requirements Engineering for Self- Adaptive and Cyber Physical Systems (RESACS) (2017, to appear)

    Google Scholar 

Download references

Acknowledgments

This work has been partially supported by the projects JPI Urban Europe IRENE, FP7-ICT-2013-10-610535 AMADEOS and FP7-IRSES DEVASSES.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tommaso Zoppi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Zoppi, T., Ceccarelli, A., Mori, M. (2017). A Tool for Evolutionary Threat Analysis of Smart Grids. In: Lau, E., et al. Smart Grid Inspired Future Technologies. SmartGift 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 203. Springer, Cham. https://doi.org/10.1007/978-3-319-61813-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61813-5_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61812-8

  • Online ISBN: 978-3-319-61813-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics