Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Technical requirements and reference architecture (opens in new window)

A detailed documentation of all business and technical needs and requirements including the overall system architecture, components and interfaces.

Quality Assurance Plan (QAP) (opens in new window)

This deliverable describes the internal management rules, technical organization and implementation, the versions of the latest official documents, and tables related management (deliverable lists, Gantt, etc.). Furthermore, the QAP will describe the internal processes to be followed for internal review of the deliverables before submission to the Commission.

Progress report 3 (opens in new window)

Summarizes the third year project activities and the achievements within the project for the respective project duration

Dissemination and Standardisation Plan (opens in new window)
Market Analysis and Exploitation Plan (opens in new window)
Dissemination and Standardisation Activities (opens in new window)
Key management component (opens in new window)

A detailed report on the design, implementation and evaluation of the key management component and subcomponents realized during Task 3.1.

Progress report 2 (opens in new window)

Summarizes the third year project activities and the achievements within the project for the respective project duration

Privacy protection component (opens in new window)

A detailed report on the design implementation and evaluation of the privacy protection component and subcomponents realized during Task 42

Authentication component (opens in new window)

A detailed report on the design, implementation and evaluation of the authentication component and subcomponents realized during Task 3.2.

Progress report 1 (opens in new window)

It summarizes the first year project activities and the achievements within the project for the respective project duration.

Dissemination and Standardisation Activities (final) (opens in new window)

Dissemination and Standardisation Activities

Trusted computing component (opens in new window)

A detailed report on the design, implementation and evaluation of trusted computing component and subcomponents realized during Task 4.1.

Final integrated system (opens in new window)

Report on the fully integrated SealedGRID platform including authentication key management authentication trust privacy authorization and security interoperability

First version of the authorization component (opens in new window)

This deliverable will present an initial stable version of the design and implementation of the hybrid access control mechanism based on RBAC and ABAC (Task 5.1).

Authorization and security interoperability component (opens in new window)

A detailed report on the design and implementation of all the mechanisms comprising the authorization and security interoperability component (Tasks 5.1 and 5.2).

Publications

P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements (opens in new window)

Author(s): Muñoz, A.; Farao, A.; Correia, J.R.C.; Xenakis, C
Published in: Information, 2021, ISSN 2078-2489
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info12090357

Blockchain-assisted access for federated Smart Grid domains: Coupling and features (opens in new window)

Author(s): Cristina Alcaraz, Juan E. Rubio, Javier Lopez
Published in: Journal of Parallel and Distributed Computing, 2020, ISSN 0743-7315
Publisher: Academic Press
DOI: 10.1016/j.jpdc.2020.05.012

[Preprint] A Survey of Voice and Communication Protection Solutions Against Wiretapping (opens in new window)

Author(s): Ntantogian Christoforos; Veroni Eleni; Karopoulos Georgios; Xenakis Christos
Published in: Computers & Electrical Engineering Volume 77, Issue 14, 2019, ISSN 0045-7906
Publisher: Pergamon Press Ltd.
DOI: 10.5281/zenodo.3237476

A trust model for popular smart home devices (opens in new window)

Author(s): Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago & Fadi El-Moussa
Published in: International Journal of Information Security, 2020, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-020-00519-2

SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform (opens in new window)

Author(s): George Suciu; Aristeidis Farao; Giorgio Bernardinetti; Ivan Palama; Mari-Anais Sachian; Alexandru Vulpe; Marius-Constantin Vochin; Pavel Muresan; Michail Bampatsikos; Antonio Muñoz; Christos Xenakis
Published in: SENSORS, 2022, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s22176527

Distributed Key Management in Microgrids (opens in new window)

Author(s): Vaios Bolgouras; Christoforos Ntantogian; Emmanouil Panaousis; Christos Xenakis
Published in: 1551-3203, Issue 9, 2020, ISSN 1551-3203
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tii.2019.2941586

Digital Twins for Intelligent Authorization in the B5G-Enabled Smart Grid (opens in new window)

Author(s): Javier Lopez; Juan E. Rubio; Cristina Alcaraz
Published in: IEEE Wireless Communications, 2021, ISSN 1536-1284
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/mwc.001.2000336

Covert Channels-Based Stealth Attacks in Industry 4.0 (opens in new window)

Author(s): Cristina Alcaraz; Giuseppe Bernieri; Federica Pascucci; Javier Lopez; Roberto Setola
Published in: IEEE Systems Journal, 2019, ISSN 1932-8184
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/jsyst.2019.2912308

P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go (opens in new window)

Author(s): Aristeidis Farao; Eleni Veroni; Christoforos Ntantogian; Christos Xenakis
Published in: MDPI Sensors, 2021, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21082686

SealedGRID: Secure and Interoperable Platform for Smart GRID Applications † (opens in new window)

Author(s): George Suciu ,Mari-Anais Sachian ,Alexandru Vulpe ,Marius Vochin ,Aristeidis Farao ,Nikolaos Koutroumpouchos and Christos Xenakis
Published in: SENSORS, 2021, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21165448

[Preprint] Evaluation of Password Hashing Schemes in Open Source Web Platforms (opens in new window)

Author(s): Ntantogian Christoforos; Malliaros Stefanos; Xenakis Christos
Published in: Computers & Security, Issue 13, 2019, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.03.011

A model-driven approach to ensure trust in the IoT (opens in new window)

Author(s): Davide Ferraris, Carmen Fernandez-Gago & Javier Lopez
Published in: Human-centric Computing and Information Sciences, 2020, ISSN 2192-1962
Publisher: Springer Science + Business Media
DOI: 10.1186/s13673-020-00257-3

Innovative Attack Detection Solutions for Wireless Networks With Application to Location Security (opens in new window)

Author(s): Danilo Orlando; Stefania Bartoletti; Ivan Palamà; Giuseppe Bianchi; Nicola Blefari Melazzi
Published in: IEEE Transactions on Wireless Communications, 2023, ISSN 1536-1276
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/twc.2022.3192225

Integration of a Threat Traceability Solution in the Industrial Internet of Things (opens in new window)

Author(s): Juan E. Rubio; Rodrigo Roman; Javier Lopez
Published in: IEEE Transactions on Industrial Informatics, 2020, ISSN 1551-3203
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tii.2020.2976747

Attribute-based Access Control for Secure and Resilient Smart Grids (opens in new window)

Author(s): George Suciu; Cristiana-Ioana Istrate; Alexandru Vulpe; Mari-Anais Sachian; Marius Vochin; Aristeidis Farao; Christos Xenakis
Published in: 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), 2019
Publisher: ScienceOpen
DOI: 10.14236/ewic/icscsr19.9

A forensic investigation of Android mobile applications (opens in new window)

Author(s): Theodoula-Ioanna Kitsaki, Anna Angelogianni,Christoforos Ntantogian,Christos Xenakis
Published in: PCI, 2018
Publisher: ACM
DOI: 10.1145/3291533.3291573

Securing the Smart Grid: A Blockchain-based Secure Smart Energy System (opens in new window)

Author(s): George Suciu; Mari-Anais Sachian; Marius Dobrea; Cristiana-Ioana Istrate; Ana Lavinia Petrache; Alexandru Vulpe; Marius Vochin
Published in: 2019 54th International Universities Power Engineering Conference (UPEC), 2019
Publisher: IEEE
DOI: 10.1109/upec.2019.8893484

Blockchain applicability using Smart Power Management: SealedGrid Architecture (opens in new window)

Author(s): George Suciu; Mari-Anais Sachian; Marius Vochin; Marius Dobrea; Cristian Beceanu; Raluca Iosu; Ana Petrache
Published in: 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 2019
Publisher: IEEE
DOI: 10.1109/isgteurope.2019.8905680

Novel Approaches for the Development of Trusted IoT Entities (opens in new window)

Author(s): Davide Ferraris, Carmen Fernandez-Gago & Javier Lopez
Published in: SEC 2022: ICT Systems Security and Privacy Protection, 2022
Publisher: Springer
DOI: 10.1007/978-3-031-06975-8_13

BRIDGE: BRIDGing the gap bEtween CTI production and consumption (opens in new window)

Author(s): Marios Karatisoglou; Aristeidis Farao; Vaios Bolgouras; Christos Xenakis
Published in: 2022 14th International Conference on Communications (COMM), 2022
Publisher: IEEE
DOI: 10.1109/comm54429.2022.9817359

Distributed Detection of APTs: Consensus vs. Clustering (opens in new window)

Author(s): Juan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman & Javier Lopez
Published in: ESORICS 2020: Computer Security – ESORICS 2020, 2020
Publisher: Springer
DOI: 10.1007/978-3-030-58951-6_9

FI-WARE authorization in a Smart Grid scenario (opens in new window)

Author(s): George Suciu; Cristiana Istrate; Mari-Anais Sachian; Alexandru Vulpe; Marius Vochin; Aristeidis Farao; Christos Xenakis
Published in: 2020 Global Internet of Things Summit (GIoTS), 2020
Publisher: IEEE
DOI: 10.1109/giots49054.2020.9119589

Disconnection Attacks Against LoRaWAN 1.0.X ABP Devices (opens in new window)

Author(s): Giorgio Bernardinetti; Francesco Mancini; Giuseppe Bianchi
Published in: 2020 Mediterranean Communication and Computer Networking Conference (MedComNet), 2020
Publisher: IEEE
DOI: 10.1109/medcomnet49392.2020.9191495

Collaborative Anomaly Detection System for Charging Stations (opens in new window)

Author(s): Jesus Cumplido, Cristina Alcaraz & Javier Lopez
Published in: ESORICS 2022: Computer Security – ESORICS 2022, 2022
Publisher: Springer
DOI: 10.1007/978-3-031-17146-8_35

Comparative Analysis of Distributed Ledger Technologies (opens in new window)

Author(s): George Suciu, Carmen Nadrag, Cristiana Istrate, Alexandru Vulpe, Maria-Cristina Ditu, Oana Subea
Published in: 2018 Global Wireless Summit (GWS), 2018, Page(s) 370-373, ISBN 978-1-5386-4288-7
Publisher: IEEE
DOI: 10.1109/gws.2018.8686563

Cloud-Based platform for enhancing energy consumption awareness and substantiating the adoption of energy efficiency measures within SMEs (opens in new window)

Author(s): George Suciu, Lucian Necula, Victor Suciu, Yasemin Curtmola
Published in: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), 2018, Page(s) 1018-1023, ISBN 978-1-5386-2070-0
Publisher: IEEE
DOI: 10.1109/iwcmc.2018.8450336

Android Malware Detection and Crypto-Mining Recognition Methodology with Machine Learning (opens in new window)

Author(s): Sorin Soviany, Andrei Scheianu, George Suciu, Alexandru Vulpe, Octavian Fratu, Cristiana Istrate
Published in: 2018 IEEE 16th International Conference on Embedded and Ubiquitous Computing (EUC), 2018, Page(s) 14-21, ISBN 978-1-5386-8296-8
Publisher: IEEE
DOI: 10.1109/euc.2018.00010

Big Data Technology for Scientific Applications (opens in new window)

Author(s): George Suciu, Muneeb Anwar, Ioana Rogojanu, Adrian Pasat, Alina Stanoiu
Published in: 2018 Conference Grid, Cloud & High Performance Computing in Science (ROLCG), 2018, Page(s) 1-4, ISBN 978-1-5386-7042-2
Publisher: IEEE
DOI: 10.1109/rolcg.2018.8572023

Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics (opens in new window)

Author(s): Juan E. Rubio, Mark Manulis, Cristina Alcaraz & Javier Lopez
Published in: ESORICS 2019: Computer Security – ESORICS 2019, 2019
Publisher: Springer
DOI: 10.1007/978-3-030-29962-0_13

SealedGRID: Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID (opens in new window)

Author(s): Aristeidis Farao; Christoforos Ntantogian; Cristiana Istrate; George Suciu; Christos Xenakis
Published in: 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), 2019
Publisher: ScienceOpen
DOI: 10.14236/ewic/icscsr19.10

Uncertainty Quantification of 5G Positioning as a Location Data Analytics Function (opens in new window)

Author(s): Bartoletti S, Bernini G, Palamà I, De Angelis M, Monteforte LM, Kennouche TE, Tsagkaris K, Bianchi G, Melazzi NB
Published in: 2022 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2022
Publisher: IEEE
DOI: 10.1109/eucnc/6gsummit54941.2022.9815708

ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM) (opens in new window)

Author(s): Antonio Muñoz, Aristeidis Farao, Jordy Ryan Casas Correia & Christos Xenakis
Published in: ESORICS 2020: Computer Security, 2020
Publisher: Springer
DOI: 10.1007/978-3-030-66504-3_9

Game Theory-Based Approach for Defense Against APTs (opens in new window)

Author(s): Juan E. Rubio, Cristina Alcaraz & Javier Lopez
Published in: ACNS 2020: Applied Cryptography and Network Security, 2020
Publisher: Sprigner
DOI: 10.1007/978-3-030-57878-7_15

POM: A Trust-based AHP-like Methodology to Solve Conflict Requirements for the IoT (opens in new window)

Author(s): Davide Ferraris, Carmen Fernandez-Gago, and Javier Lopez
Published in: Advanced Sciences and Technologies for Security Applications, 2023
Publisher: Springer
DOI: 10.1007/978-3-031-16088-2_7

SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications (opens in new window)

Author(s): Aristeidis Farao, Juan Enrique Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis, Javier Lopez
Published in: Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers, Issue 11777, 2020, Page(s) 169-175, ISBN 978-3-030-37669-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-37670-3_14

Secure Interconnection of IT-OT Networks in Industry 4.0 (opens in new window)

Author(s): Cristina Alcaraz
Published in: Critical Infrastructure Security and Resilience - Theories, Methods, Tools and Technologies, 2019, Page(s) 201-217, ISBN 978-3-030-00023-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-00024-0_11

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available