5 research outputs found

    Cybersecurity Risk Assessment Framework for Externally Exposed Energy Delivery Systems

    Get PDF
    Securing the energy delivery system (EDS) from complex, nonlinear, and evolving cyber threats requires a complex set of changing and interwoven classes of technologies, policies, relationships, and personnel. One key area in this technological milieu is assessment methodologies to compare information, gathered by a variety of means, about networked devices with publicly known possible threat information about said devices. This information is used to generate risk-based characterizations that allow for the adjudication and proper corresponding management action chains to be assigned. \color{blue}To address the current cybersecurity needs in the operational technology (OT) domain, we developed a novel relative-risk assessment framework and a software application called MEEDS that can detect exposed OT systems. This paper presents the detailed architecture of relative-risk assessment framework methodology and its integral role in the MEEDS software. The efficacy of the presented framework is demonstrated by testing with the real-world systems and vulnerabilities pertaining to the industrial control systems (ICS) in critical infrastructures

    SSI meets Metaverse for Industry 4.0 and Beyond

    No full text
    As the global industrial complex gears toward fulfilling the tenets of Industry 4.0 and beyond, technologies such as distributed ledger technologies, digital twins, and artificial intelligence become pivotal enablers. In the last decade, metaverse as a concept and technology found its place among crucial enablers for technology and digital advancement across several engineering domains. Metaverse has the potential to combine the elements from distributed computing platforms, the digital evolution of physical systems, and advanced learning systems to unearth a fully digitized world of comparative properties of the real world. We should ensure the privacy, integrity, and confidentiality of personal data. These requirements will lead to proper identity management in the metaverse. Given the complex nature of the metaverse, traditional centralized systems may not offer a viable identity management solution. Therefore, this study explores a decentralized identity management system called the Self-sovereign Identity (SSI) as a logical alternative to traditional centralized identity management systems. The proposed holistic framework aims to ignite new ideas and discussions related to the combined deployment of DLT, SSI, and metaverse to inspire new implementation areas within the Industry 4.0 environment. The paper also discusses various opportunities, enablers, technical \& privacy aspects, legislation requirements, and other barriers related to SSI implementation.</p

    Cybersecurity and Privacy Aspects of Smart Contracts in the Energy Domain

    No full text
    Smart contracts (SCs) are a set of logical procedures that can be run by individual peers participating within a Distributed Ledger Technology (DLT) network. By design, smart contracts inherit many of the benefits of DLT, including its immutability, scalability and  security properties. Nevertheless, they may introduce additional attack vectors, which can lead to cybersecurity explorations that could jeopardize the end-application's ability to operate as intended or result in data leaks, and privacy violations. In this work an exploration of known problems, and possible attack scenarios will be presented. This is followed by a set of proposed best practices and mitigation strategies that are intended to assist developers, researchers and other relevant stakeholders to develop secure SC implementations. </p
    corecore