Skip to main content

CyNetPhy: Towards Pervasive Defense-in-Depth for Smart Grid Security

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8985))

  • 1466 Accesses

Abstract

Security is a major concern in the smart grid technology extensively relying on Information and Communication Technologies (ICT). New emerging attacks show the inadequacy of the conventional defense tools that provision isolated uncooperative services to individual grid components ignoring their real-time dependency and interaction. In this article, we present a smart grid layering model and a matching multi-layer security framework, CyNetPhy, towards enabling cross-layer security of the grid.CyNetPhy tightly integrates and coordinates between a set of interrelated, and highly cooperative real-time defense solutions designed to address the grid security concerns. We advance a high-level overview of CyNetPhy and present an attack scenario against the smart grid supported by a qualitative analysis of the resolution motivating the need to a cross-layer security framework such as CyNetPhy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Azab, M., Eltoweissy, M.: Defense as a service cloud for cyber-physical systems. In: 2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 392–401. IEEE (2011)

    Google Scholar 

  2. Azab, M., Eltoweissy, M.: Bio-inspired evolutionary sensory system for cyber-physical system security. In: Hassanien, A.E., Kim, T.-H., Kacprzyk, J., Awad, A.L. (eds.) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. ISRS, vol. 70, pp. 39–69. Springer, Heidelberg (2014)

    Google Scholar 

  3. Chen, T.M., Abu-Nimeh, S.: Lessons from stuxnet. Computer 44(4), 91–93 (2011)

    Article  Google Scholar 

  4. Farag, M.M.: Architectural Enhancements to Increase Trust in Cyber-Physical Systems Containing Untrusted Software and Hardware. Ph.D. thesis, Virginia Polytechnic Institute and State University (2012)

    Google Scholar 

  5. Huang, Y.F., Werner, S., Huang, J., Kashyap, N., Gupta, V.: State estimation in electric power grids: Meeting new challenges presented by the requirements of the future grid. Signal Process. Mag. IEEE 29(5), 33–43 (2012)

    Article  Google Scholar 

  6. Kopetz, H.: Real-time systems: design principles for distributed embedded applications. Springer, Heidelberg (2011)

    Book  MATH  Google Scholar 

  7. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)

    Article  Google Scholar 

  8. Mokhtar, B., Eltoweissy, M.: Hybrid intelligence for semantics-enhanced networking operations. In: The Twenty-Seventh International Flairs Conference (2014)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the SmartCI Research Center, Alex., Egypt.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Azab .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Azab, M., Mokhtar, B., Farag, M.M. (2016). CyNetPhy: Towards Pervasive Defense-in-Depth for Smart Grid Security. In: Panayiotou, C., Ellinas, G., Kyriakides, E., Polycarpou, M. (eds) Critical Information Infrastructures Security. CRITIS 2014. Lecture Notes in Computer Science(), vol 8985. Springer, Cham. https://doi.org/10.1007/978-3-319-31664-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31664-2_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31663-5

  • Online ISBN: 978-3-319-31664-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics