Abstract

Modern critical infrastructures (e.g. Critical Energy Infrastructures) are increasingly evolving into complex and distributed networks of Cyber-Physical Systems. Although the cyber systems provide great flexibility in the operation of critical infrastructure, it also introduces additional security threats that need to be properly addressed during the design and development phase. In this landscape, resilience and robustness by design are becoming fundamental requirements. In order to achieve that, new approaches and technological solutions have to be developed that guarantee i) the fast incident/attack detection; and ii) the adoption of proper mitigation strategies that ensure the continuity of service from the infrastructure. The “Double Virtualization” emerged recently as a potential strategy/approach to ensure the robust and resilient design and management of critical energy infrastructures based on Cyber-Physical Systems. The presented approach exploits the separation of the virtual capabilities/functionalities of a device from the physical system and/or platform used to run/execute them while allowing to dynamically (re-) configure the system in the presence of predicted and unpredicted incidents/accidents. Internet-based technologies are used for developing and deploying the envisioned approach.

Highlights

  • The evolution of critical infrastructures into complex distributed networks of Cyber-Physical Systems (CPSs) has posed several challenges on how to monitor and control these systems [1]

  • As stated in[3], smart grid incorporates several technical initiatives such as Advanced Metering Infrastructure (AMI), Wide-Area Monitoring, Protection and Control (WAMPAC) systems based on Phasor Measurement Units (PMUs) that are aiming to provide the guidelines and guidance on how to collect, transport, use and present data generated by the grid assets

  • The main purpose of this paper is to present a specific strategy, approach and technological development – the so called “Double Virtualization” (DV) – to enable resilience and robustness of WAMPAC against cyber and physical attacks

Read more

Summary

Introduction

The evolution of critical infrastructures into complex distributed networks of Cyber-Physical Systems (CPSs) has posed several challenges on how to monitor and control these systems [1]. The physical dimension of hardware components, and the cyber dimension of computations and communications are both susceptible to attacks that could potentially bring down the entire system [2] This is true in the Critical Energy Infrastructure (CEI) domain, characterized by vast, dispersed and heterogenous infrastructure of assets forming a multifaceted operational environment. As stated in[3], smart grid incorporates several technical initiatives such as Advanced Metering Infrastructure (AMI), Wide-Area Monitoring, Protection and Control (WAMPAC) systems based on Phasor Measurement Units (PMUs) that are aiming to provide the guidelines and guidance on how to collect, transport, use and present data generated by the grid assets Since these initiatives heavily rely on Information & Communication Technology (ICT) systems and, they are exposing the smart grid to a wide range of security threats and more in general to vulnerabilities that need to be managed to keep the system secure [5]. All these aspects together make it nearly impossible to design and develop a “one-size fits all” approach that guarantees the security for every asset within the infrastructure

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.