Surveillance and Security : Protecting Electricity Utilities and other Critical Infrastructures

Gouglidis, Antonios and Green, Benjamin and Hutchison, David and Alshawish, Ali and de Meer, Hermann (2018) Surveillance and Security : Protecting Electricity Utilities and other Critical Infrastructures. Energy Informatics, 1 (1): 15. ISSN 2520-8942

[thumbnail of surveillance-security-protecting]
PDF (surveillance-security-protecting)
surveillance_security_protecting.pdf - Accepted Version
Available under License Creative Commons Attribution.

Download (239kB)


Critical infrastructures – such as electricity networks, power stations and Smart Grids – are increasingly monitored and controlled by computing and communication technologies. The need to address security and protection of electricity infrastructures with a high priority has broadly been recognized. This is driven by many factors, including the rapid evolution of threats and consistent technological advancements of malicious actors as well as potentially catastrophic consequences of disruptions of such systems. Surveillance and security technologies are traditionally used in these contexts as a protection mechanism that maintains situational awareness and provides appropriate alerts. Surveillance is a cumbersome process because of the need to monitor a diverse set of objects, but it is absolutely essential to detect promptly the occurrence of adverse events or conditions. The aims of this paper are twofold: First, we describe two surveillance architectures in which different technologies can be used jointly for boosting the safety and security of electricity utilities and other key resources and critical infrastructures. Second, we review the typical surveillance and security technologies and evaluate them in the context of critical infrastructures, which may help in making recommendations and improvements for the future. To accomplish these aims, we extracted and consolidated information from major survey papers. This led to identifying the surveillance and security technologies, their application areas, and challenges that they face. We also investigate the perceived performance of the identified technologies in critical infrastructures. The latter comes from interviewing experts who operate in critical infrastructures, and thus provide indications for protecting critical infrastructures, not least because of their increasing use of cyber-physical elements.

Item Type:
Journal Article
Journal or Publication Title:
Energy Informatics
?? critical infrastructures protectioncyber-physical systemsprivacyresiliencesecuritysurveillanceutility networks ??
ID Code:
Deposited By:
Deposited On:
10 Aug 2018 10:38
Last Modified:
20 Jul 2024 00:35