Home > Research > Publications & Outputs > Surveillance and Security

Electronic data

  • surveillance-security-protecting

    Accepted author manuscript, 234 KB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures. / Gouglidis, Antonios; Green, Benjamin; Hutchison, David et al.
In: Energy Informatics, Vol. 1, No. 1, 15, 12.2018.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Gouglidis A, Green B, Hutchison D, Alshawish A, de Meer H. Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures. Energy Informatics. 2018 Dec;1(1):15. doi: doi.org/10.1186/s42162-018-0019-1

Author

Bibtex

@article{bf391b093bf649b5a785587a2cbe2393,
title = "Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures",
abstract = "Critical infrastructures – such as electricity networks, power stations and Smart Grids – are increasingly monitored and controlled by computing and communication technologies. The need to address security and protection of electricity infrastructures with a high priority has broadly been recognized. This is driven by many factors, including the rapid evolution of threats and consistent technological advancements of malicious actors as well as potentially catastrophic consequences of disruptions of such systems. Surveillance and security technologies are traditionally used in these contexts as a protection mechanism that maintains situational awareness and provides appropriate alerts. Surveillance is a cumbersome process because of the need to monitor a diverse set of objects, but it is absolutely essential to detect promptly the occurrence of adverse events or conditions. The aims of this paper are twofold: First, we describe two surveillance architectures in which different technologies can be used jointly for boosting the safety and security of electricity utilities and other key resources and critical infrastructures. Second, we review the typical surveillance and security technologies and evaluate them in the context of critical infrastructures, which may help in making recommendations and improvements for the future. To accomplish these aims, we extracted and consolidated information from major survey papers. This led to identifying the surveillance and security technologies, their application areas, and challenges that they face. We also investigate the perceived performance of the identified technologies in critical infrastructures. The latter comes from interviewing experts who operate in critical infrastructures, and thus provide indications for protecting critical infrastructures, not least because of their increasing use of cyber-physical elements.",
keywords = "Critical infrastructures protection, cyber-physical systems, privacy, resilience, security, surveillance, utility networks",
author = "Antonios Gouglidis and Benjamin Green and David Hutchison and Ali Alshawish and {de Meer}, Hermann",
year = "2018",
month = dec,
doi = "doi.org/10.1186/s42162-018-0019-1",
language = "English",
volume = "1",
journal = "Energy Informatics",
issn = "2520-8942",
publisher = "Springer",
number = "1",

}

RIS

TY - JOUR

T1 - Surveillance and Security

T2 - Protecting Electricity Utilities and other Critical Infrastructures

AU - Gouglidis, Antonios

AU - Green, Benjamin

AU - Hutchison, David

AU - Alshawish, Ali

AU - de Meer, Hermann

PY - 2018/12

Y1 - 2018/12

N2 - Critical infrastructures – such as electricity networks, power stations and Smart Grids – are increasingly monitored and controlled by computing and communication technologies. The need to address security and protection of electricity infrastructures with a high priority has broadly been recognized. This is driven by many factors, including the rapid evolution of threats and consistent technological advancements of malicious actors as well as potentially catastrophic consequences of disruptions of such systems. Surveillance and security technologies are traditionally used in these contexts as a protection mechanism that maintains situational awareness and provides appropriate alerts. Surveillance is a cumbersome process because of the need to monitor a diverse set of objects, but it is absolutely essential to detect promptly the occurrence of adverse events or conditions. The aims of this paper are twofold: First, we describe two surveillance architectures in which different technologies can be used jointly for boosting the safety and security of electricity utilities and other key resources and critical infrastructures. Second, we review the typical surveillance and security technologies and evaluate them in the context of critical infrastructures, which may help in making recommendations and improvements for the future. To accomplish these aims, we extracted and consolidated information from major survey papers. This led to identifying the surveillance and security technologies, their application areas, and challenges that they face. We also investigate the perceived performance of the identified technologies in critical infrastructures. The latter comes from interviewing experts who operate in critical infrastructures, and thus provide indications for protecting critical infrastructures, not least because of their increasing use of cyber-physical elements.

AB - Critical infrastructures – such as electricity networks, power stations and Smart Grids – are increasingly monitored and controlled by computing and communication technologies. The need to address security and protection of electricity infrastructures with a high priority has broadly been recognized. This is driven by many factors, including the rapid evolution of threats and consistent technological advancements of malicious actors as well as potentially catastrophic consequences of disruptions of such systems. Surveillance and security technologies are traditionally used in these contexts as a protection mechanism that maintains situational awareness and provides appropriate alerts. Surveillance is a cumbersome process because of the need to monitor a diverse set of objects, but it is absolutely essential to detect promptly the occurrence of adverse events or conditions. The aims of this paper are twofold: First, we describe two surveillance architectures in which different technologies can be used jointly for boosting the safety and security of electricity utilities and other key resources and critical infrastructures. Second, we review the typical surveillance and security technologies and evaluate them in the context of critical infrastructures, which may help in making recommendations and improvements for the future. To accomplish these aims, we extracted and consolidated information from major survey papers. This led to identifying the surveillance and security technologies, their application areas, and challenges that they face. We also investigate the perceived performance of the identified technologies in critical infrastructures. The latter comes from interviewing experts who operate in critical infrastructures, and thus provide indications for protecting critical infrastructures, not least because of their increasing use of cyber-physical elements.

KW - Critical infrastructures protection

KW - cyber-physical systems

KW - privacy

KW - resilience

KW - security

KW - surveillance

KW - utility networks

U2 - doi.org/10.1186/s42162-018-0019-1

DO - doi.org/10.1186/s42162-018-0019-1

M3 - Journal article

VL - 1

JO - Energy Informatics

JF - Energy Informatics

SN - 2520-8942

IS - 1

M1 - 15

ER -