Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID

Deliverables

Technical requirements and reference architecture

A detailed documentation of all business and technical needs and requirements including the overall system architecture, components and interfaces.

Quality Assurance Plan (QAP)

This deliverable describes the internal management rules, technical organization and implementation, the versions of the latest official documents, and tables related management (deliverable lists, Gantt, etc.). Furthermore, the QAP will describe the internal processes to be followed for internal review of the deliverables before submission to the Commission.

Progress report 3

Summarizes the third year project activities and the achievements within the project for the respective project duration

Dissemination and Standardisation Plan
Market Analysis and Exploitation Plan
Dissemination and Standardisation Activities
Key management component

A detailed report on the design, implementation and evaluation of the key management component and subcomponents realized during Task 3.1.

Progress report 2

Summarizes the third year project activities and the achievements within the project for the respective project duration

Privacy protection component

A detailed report on the design implementation and evaluation of the privacy protection component and subcomponents realized during Task 42

Authentication component

A detailed report on the design, implementation and evaluation of the authentication component and subcomponents realized during Task 3.2.

Progress report 1

It summarizes the first year project activities and the achievements within the project for the respective project duration.

Dissemination and Standardisation Activities (final)

Dissemination and Standardisation Activities

Trusted computing component

A detailed report on the design, implementation and evaluation of trusted computing component and subcomponents realized during Task 4.1.

Final integrated system

Report on the fully integrated SealedGRID platform including authentication key management authentication trust privacy authorization and security interoperability

First version of the authorization component

This deliverable will present an initial stable version of the design and implementation of the hybrid access control mechanism based on RBAC and ABAC (Task 5.1).

Authorization and security interoperability component

A detailed report on the design and implementation of all the mechanisms comprising the authorization and security interoperability component (Tasks 5.1 and 5.2).

Publications

P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements

Author(s): Muñoz, A.; Farao, A.; Correia, J.R.C.; Xenakis, C
Published in: Information, 2021, ISSN 2078-2489
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info12090357

Blockchain-assisted access for federated Smart Grid domains: Coupling and features

Author(s): Cristina Alcaraz, Juan E. Rubio, Javier Lopez
Published in: Journal of Parallel and Distributed Computing, 2020, ISSN 0743-7315
Publisher: Academic Press
DOI: 10.1016/j.jpdc.2020.05.012

[Preprint] A Survey of Voice and Communication Protection Solutions Against Wiretapping

Author(s): Ntantogian Christoforos; Veroni Eleni; Karopoulos Georgios; Xenakis Christos
Published in: Computers & Electrical Engineering Volume 77, Issue 14, 2019, ISSN 0045-7906
Publisher: Pergamon Press Ltd.
DOI: 10.5281/zenodo.3237476

A trust model for popular smart home devices

Author(s): Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago & Fadi El-Moussa
Published in: International Journal of Information Security, 2020, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-020-00519-2

SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform

Author(s): George Suciu; Aristeidis Farao; Giorgio Bernardinetti; Ivan Palama; Mari-Anais Sachian; Alexandru Vulpe; Marius-Constantin Vochin; Pavel Muresan; Michail Bampatsikos; Antonio Muñoz; Christos Xenakis
Published in: SENSORS, 2022, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s22176527

Distributed Key Management in Microgrids

Author(s): Vaios Bolgouras; Christoforos Ntantogian; Emmanouil Panaousis; Christos Xenakis
Published in: 1551-3203, Issue 9, 2020, ISSN 1551-3203
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tii.2019.2941586

Digital Twins for Intelligent Authorization in the B5G-Enabled Smart Grid

Author(s): Javier Lopez; Juan E. Rubio; Cristina Alcaraz
Published in: IEEE Wireless Communications, 2021, ISSN 1536-1284
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/mwc.001.2000336

Covert Channels-Based Stealth Attacks in Industry 4.0

Author(s): Cristina Alcaraz; Giuseppe Bernieri; Federica Pascucci; Javier Lopez; Roberto Setola
Published in: IEEE Systems Journal, 2019, ISSN 1932-8184
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/jsyst.2019.2912308

P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go

Author(s): Aristeidis Farao; Eleni Veroni; Christoforos Ntantogian; Christos Xenakis
Published in: MDPI Sensors, 2021, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21082686

SealedGRID: Secure and Interoperable Platform for Smart GRID Applications †

Author(s): George Suciu ,Mari-Anais Sachian ,Alexandru Vulpe ,Marius Vochin ,Aristeidis Farao ,Nikolaos Koutroumpouchos and Christos Xenakis
Published in: SENSORS, 2021, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21165448

[Preprint] Evaluation of Password Hashing Schemes in Open Source Web Platforms

Author(s): Ntantogian Christoforos; Malliaros Stefanos; Xenakis Christos
Published in: Computers & Security, Issue 13, 2019, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.03.011

A model-driven approach to ensure trust in the IoT

Author(s): Davide Ferraris, Carmen Fernandez-Gago & Javier Lopez
Published in: Human-centric Computing and Information Sciences, 2020, ISSN 2192-1962
Publisher: Springer Science + Business Media
DOI: 10.1186/s13673-020-00257-3

Innovative Attack Detection Solutions for Wireless Networks With Application to Location Security

Author(s): Danilo Orlando; Stefania Bartoletti; Ivan Palamà; Giuseppe Bianchi; Nicola Blefari Melazzi
Published in: IEEE Transactions on Wireless Communications, 2023, ISSN 1536-1276
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/twc.2022.3192225

Integration of a Threat Traceability Solution in the Industrial Internet of Things

Author(s): Juan E. Rubio; Rodrigo Roman; Javier Lopez
Published in: IEEE Transactions on Industrial Informatics, 2020, ISSN 1551-3203
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tii.2020.2976747

Attribute-based Access Control for Secure and Resilient Smart Grids

Author(s): George Suciu; Cristiana-Ioana Istrate; Alexandru Vulpe; Mari-Anais Sachian; Marius Vochin; Aristeidis Farao; Christos Xenakis
Published in: 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), 2019
Publisher: ScienceOpen
DOI: 10.14236/ewic/icscsr19.9

A forensic investigation of Android mobile applications

Author(s): Theodoula-Ioanna Kitsaki, Anna Angelogianni,Christoforos Ntantogian,Christos Xenakis
Published in: PCI, 2018
Publisher: ACM
DOI: 10.1145/3291533.3291573

Securing the Smart Grid: A Blockchain-based Secure Smart Energy System

Author(s): George Suciu; Mari-Anais Sachian; Marius Dobrea; Cristiana-Ioana Istrate; Ana Lavinia Petrache; Alexandru Vulpe; Marius Vochin
Published in: 2019 54th International Universities Power Engineering Conference (UPEC), 2019
Publisher: IEEE
DOI: 10.1109/upec.2019.8893484

Blockchain applicability using Smart Power Management: SealedGrid Architecture

Author(s): George Suciu; Mari-Anais Sachian; Marius Vochin; Marius Dobrea; Cristian Beceanu; Raluca Iosu; Ana Petrache
Published in: 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 2019
Publisher: IEEE
DOI: 10.1109/isgteurope.2019.8905680

Novel Approaches for the Development of Trusted IoT Entities

Author(s): Davide Ferraris, Carmen Fernandez-Gago & Javier Lopez
Published in: SEC 2022: ICT Systems Security and Privacy Protection, 2022
Publisher: Springer
DOI: 10.1007/978-3-031-06975-8_13

BRIDGE: BRIDGing the gap bEtween CTI production and consumption

Author(s): Marios Karatisoglou; Aristeidis Farao; Vaios Bolgouras; Christos Xenakis
Published in: 2022 14th International Conference on Communications (COMM), 2022
Publisher: IEEE
DOI: 10.1109/comm54429.2022.9817359

Distributed Detection of APTs: Consensus vs. Clustering

Author(s): Juan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman & Javier Lopez
Published in: ESORICS 2020: Computer Security – ESORICS 2020, 2020
Publisher: Springer
DOI: 10.1007/978-3-030-58951-6_9

FI-WARE authorization in a Smart Grid scenario

Author(s): George Suciu; Cristiana Istrate; Mari-Anais Sachian; Alexandru Vulpe; Marius Vochin; Aristeidis Farao; Christos Xenakis
Published in: 2020 Global Internet of Things Summit (GIoTS), 2020
Publisher: IEEE
DOI: 10.1109/giots49054.2020.9119589

Disconnection Attacks Against LoRaWAN 1.0.X ABP Devices

Author(s): Giorgio Bernardinetti; Francesco Mancini; Giuseppe Bianchi
Published in: 2020 Mediterranean Communication and Computer Networking Conference (MedComNet), 2020
Publisher: IEEE
DOI: 10.1109/medcomnet49392.2020.9191495

Collaborative Anomaly Detection System for Charging Stations

Author(s): Jesus Cumplido, Cristina Alcaraz & Javier Lopez
Published in: ESORICS 2022: Computer Security – ESORICS 2022, 2022
Publisher: Springer
DOI: 10.1007/978-3-031-17146-8_35

Comparative Analysis of Distributed Ledger Technologies

Author(s): George Suciu, Carmen Nadrag, Cristiana Istrate, Alexandru Vulpe, Maria-Cristina Ditu, Oana Subea
Published in: 2018 Global Wireless Summit (GWS), 2018, Page(s) 370-373, ISBN 978-1-5386-4288-7
Publisher: IEEE
DOI: 10.1109/gws.2018.8686563

Cloud-Based platform for enhancing energy consumption awareness and substantiating the adoption of energy efficiency measures within SMEs

Author(s): George Suciu, Lucian Necula, Victor Suciu, Yasemin Curtmola
Published in: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), 2018, Page(s) 1018-1023, ISBN 978-1-5386-2070-0
Publisher: IEEE
DOI: 10.1109/iwcmc.2018.8450336

Android Malware Detection and Crypto-Mining Recognition Methodology with Machine Learning

Author(s): Sorin Soviany, Andrei Scheianu, George Suciu, Alexandru Vulpe, Octavian Fratu, Cristiana Istrate
Published in: 2018 IEEE 16th International Conference on Embedded and Ubiquitous Computing (EUC), 2018, Page(s) 14-21, ISBN 978-1-5386-8296-8
Publisher: IEEE
DOI: 10.1109/euc.2018.00010

Big Data Technology for Scientific Applications

Author(s): George Suciu, Muneeb Anwar, Ioana Rogojanu, Adrian Pasat, Alina Stanoiu
Published in: 2018 Conference Grid, Cloud & High Performance Computing in Science (ROLCG), 2018, Page(s) 1-4, ISBN 978-1-5386-7042-2
Publisher: IEEE
DOI: 10.1109/rolcg.2018.8572023

Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics

Author(s): Juan E. Rubio, Mark Manulis, Cristina Alcaraz & Javier Lopez
Published in: ESORICS 2019: Computer Security – ESORICS 2019, 2019
Publisher: Springer
DOI: 10.1007/978-3-030-29962-0_13

SealedGRID: Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID

Author(s): Aristeidis Farao; Christoforos Ntantogian; Cristiana Istrate; George Suciu; Christos Xenakis
Published in: 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), 2019
Publisher: ScienceOpen
DOI: 10.14236/ewic/icscsr19.10

Uncertainty Quantification of 5G Positioning as a Location Data Analytics Function

Author(s): Bartoletti S, Bernini G, Palamà I, De Angelis M, Monteforte LM, Kennouche TE, Tsagkaris K, Bianchi G, Melazzi NB
Published in: 2022 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2022
Publisher: IEEE
DOI: 10.1109/eucnc/6gsummit54941.2022.9815708

ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM)

Author(s): Antonio Muñoz, Aristeidis Farao, Jordy Ryan Casas Correia & Christos Xenakis
Published in: ESORICS 2020: Computer Security, 2020
Publisher: Springer
DOI: 10.1007/978-3-030-66504-3_9

Game Theory-Based Approach for Defense Against APTs

Author(s): Juan E. Rubio, Cristina Alcaraz & Javier Lopez
Published in: ACNS 2020: Applied Cryptography and Network Security, 2020
Publisher: Sprigner
DOI: 10.1007/978-3-030-57878-7_15

POM: A Trust-based AHP-like Methodology to Solve Conflict Requirements for the IoT

Author(s): Davide Ferraris, Carmen Fernandez-Gago, and Javier Lopez
Published in: Advanced Sciences and Technologies for Security Applications, 2023
Publisher: Springer
DOI: 10.1007/978-3-031-16088-2_7

SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications

Author(s): Aristeidis Farao, Juan Enrique Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis, Javier Lopez
Published in: Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers, Issue 11777, 2020, Page(s) 169-175, ISBN 978-3-030-37669-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-37670-3_14

Secure Interconnection of IT-OT Networks in Industry 4.0

Author(s): Cristina Alcaraz
Published in: Critical Infrastructure Security and Resilience - Theories, Methods, Tools and Technologies, 2019, Page(s) 201-217, ISBN 978-3-030-00023-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-00024-0_11

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available