Israel Electric Corporation is the main supplier of electrical power in Israel.IEC builds, maintains and operates power generation stations, sub-stations, as well as the transmission and distribution networks.The company is the sole integrated electric utility in the State of Israel and generates, transmits and distributes substantially all the electricity used in the State of Israel. The State of Israel owns approximately 99.85% of the Company. Wikipedia.
Agency: Cordis | Branch: FP7 | Program: CP | Phase: ICT-2009.6.3 | Award Amount: 6.18M | Year: 2010
The main goal of the ENERsip project is to create an adaptive, customizable, and service-oriented ENERgy monitoring and control system for energy grids and decision makers. ENERsip is conceived on the idea that mixing energy, communications, control, computing and construction for the consumption and generation elements, must be active and proactively coordinated. To bring the idea into reality, ENERsip would provide an open Information platform that would allow optimising in near real-time generation and consumption matching in residential, commercial buildings and neighbourhoods.\nFor doing so, ENERsip will create an open service-oriented architectural platform to allow create positive energy buildings and neighbourhoods by coordinating the consumers and the generators, while creating smart energy grids that will self feed with real-time information. Using advanced and novel communication protocols the information will be constantly exchanged through the ENERsip system, between energy grids, decision makers and users, helping consumers save energy using intuitive interfaces while maintaining the desired comfort levels. ENERsip is targeted to allow the emergence of an open electricity market by using components from different suppliers, unifying their protocols and providing reliable data exchange services, thus helping reinforce European industrial and technological position in ICT-enabled energy efficiency technologies.\nThe ENERsip multinational well balanced consortium of industrial and research organizations, strengthened with the utility company, will focus on research, development and demonstration of ENERsip at field tests with concrete targets under real conditions, by introducing a managed positive-energy generation and consumption elements of the positive-energy buildings and neighbourhoods. The outcome of the adoption of ENERsip will allow setting new behavioural patters in the society and reduce overall intense economic dependence on energy.
Agency: Cordis | Branch: FP7 | Program: CP-FP | Phase: SEC-2011.2.5-1 | Award Amount: 4.34M | Year: 2012
The protection of the national infrastructures is one of the main issues for national and international security. While FP7 MICIE project has proved that increasing cooperation among infrastructures increases their level of service and predictive capability, it is not enough to effectively counteract threats such as cyber attacks. Such attacks could be performed blocking communication from central SCADA to local equipments or inserting fake commands/measurements in the SCADA-field equipment communications (as happened with STUXNET worm). The paradox is that critical infrastructures massively rely on the newest interconnected (and vulnerable) ICT technologies, while the control equipment is typically old, legacy software/hardware. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project aims on one hand to continue the work done in MICIE by refining and updating the on-line Risk Predictor deployed in the SCADA centre, on the other hand to provide some kind of intelligence to field equipment, allowing them to perform local decisions in order to self-identify and self-react to abnormal situations induced by cyber attacks. It is mandatory to operate both at SCADA control centre and at field equipment because it is very dangerous to let field components operate autonomously. To address this issue an hybrid validation system will be implemented: at the Control Centre level an Integrated On-line Risk Predictor will provide the operator with qualitative/quantitative measurements of near future level of risk integrating data coming from the field, from other infrastructures, and from smart detection agents monitoring possible cyber attacks; at field level, the system is complemented with a smart software layer for field equipment and a detection system for the TLC network. The system will be validated on real equipment and scenarios provided by Israel Electric Corp.
Agency: Cordis | Branch: FP7 | Program: CP-FP | Phase: NMP-2009-2.6-1 | Award Amount: 5.77M | Year: 2010
One of the major challenges of this century is the provision of safe drinking water for a growing population. The shortage in water resources in arid areas requires the availability of more efficient and cheaper drinking water production processes. For groundwater, it is often sufficient to aerate and disinfect to produce drinking water. However, in large parts of the world the use of groundwater from aquifers is not possible due to excessive use and global climate change that allow penetration of salt sea water into the aquifers. Population growth, not surprisingly, leads to more pollution of aquifers rendering the water quality unsuitable for drinking water purposes without excessive treatment. In contrast, there are always large quantities of water vapor present in air. The objective within CapWa is produce a commercially available membrane modular system suitable for industrial applications within 3-4 years. The produced demin water from this system should be competitive with existing demin water technologies. The starting point will be the water vapour selective composite membranes that are developed in the proof of principle project. At the same time fundamental research will also be done on other alternative water selecting coatings. For both of these membrane paths the upscale from lab to industrial scale membrane production will be developed in CapWa. In CapWa the modular membrane system will also be developed and tested in the flue gas duct of a gas and coal-fired power plant, a cooling tower (or geothermal well) and in a paper or board mill. To achieve this goal the selective membranes must be thermal/chemically stable under the existing environmental conditions (50-150 C) and resistant to fouling. To be competitive with existing demin production lines, the construction of the end system must be efficient and user friendly.
Agency: Cordis | Branch: FP7 | Program: CP | Phase: ICT-2009.6.5 | Award Amount: 5.15M | Year: 2010
Today, there are largely no communications infrastructure deployments in European medium and low voltage power distribution networks. Powerline communications has a large potential to enable new and intelligent applications to and from the last branch of the distribution grid. However, current powerline communication technologies cannot offer the reliability, quality of service and interoperability that is required for such applications.\n\nDLC\VIT4IP will develop, verify and test a high-speed narrow-band powerline communications infrastructure using the Internet Protocol (IP) which is capable of supporting existing and extending new and multiple communication applications. These shall include the existing power distribution network for novel services in smart electricity distribution networks such as demand side management, control of distributed generation and customer integration.\n\nFrom a communication perspective, the powerline network offers advantages in coverage, costs and availability. On the application side the Internet protocol (IP) suite is an increasingly used protocol stack in many supervisory and control application fields which include the energy sector.\n\nTo efficiently integrate both technologies and achieve the necessary performance and reliability DLC\VIT4IP will extend existing PLC technologies by developing:\n1.\tEfficient transport of the IP(v6) protocol\n2.\tAutomatic measurement, configuration and management\n3.\tSecurity\n4.\tReal-time capabilities\n5.\tChannel models and simulation tools for network planning and design\nModels and the developed system will be tested and verified in a field test.\n\nOutcomes of the project will include a prototype for a high performance communications infrastructure, simulation and planning tools. Testing and conformance rules for application developers and users to choose an appropriate technology for their needs are key driver for end use. Many of these outcomes will be transferred to standardisation.
Agency: Cordis | Branch: FP7 | Program: CP-FP | Phase: SEC-2012.2.5-1 | Award Amount: 5.41M | Year: 2013
SAWSOC aims at bringing a significant advancement in the convergence of physical and logical security, meaning effective cooperation (i.e. a coordinated and results-oriented effort to work together) among previously disjointed functions. Recently some achievements have been made (e.g. SEM and SIM have merged into SIEM, and LACS and PACS have merged into IM), Security Operations Center (SOC) technology has improved significantly, but much is yet to be done. SAWSOC holistic approach and enhanced awareness technology will allow dependable (i.e. accurate, timely, and trustworthy) detection and diagnosis of attacks. This will ultimately result in the achievement of two goals of paramount importance, and precisely: 1) Guaranteeing the protection of citizens and assets, and 2) Improving the perception of security by citizens. Goal 1 is in line with the objectives of the Security Work Programme in general, and goal 2 perfectly matches the expected impact as listed in the Work Programme for Topic SEC-2012.2.5-1. SAWSOCs design will be driven by three real use cases, with highly diverse requirements. Such use cases collectively form an experimental test-bed perfectly suited for driving the design as well as for validating the development of a platform such as SAWSOC that will support true convergence of physical and logical security technologies, and overcome the fragmentation of security approaches. The first use case deals with the protection of a Critical Infrastructure for Air Traffic Management. The second deals with the protection of a Critical Infrastructure for Energy Production and Distribution. The third deals with the protection of a public place, specifically a stadium, during an event. The project will take stock of associated initiatives, which have a direct or indirect link with the topic (e.g.: topic SEC-2011.2.5-1 Cyber attacks against critical infrastructures, ESRAB and ESRIF), and will benefit of an enhanced SME participation in the Consortium, with three hi-tech SMEs from three different countries, playing relevant as well as complementary roles.
Agency: Cordis | Branch: FP7 | Program: CP | Phase: ENERGY.2012.5.2.1 | Award Amount: 12.29M | Year: 2012
TRUST aims at conducting CO2 injection experiments at scales large enough so that the output can be extrapolated at industrial scales. It relies on four sites: the heavily instrumented sites of Heletz (Israel, main site) and Hontomin (Spain), access Miranga (Brazil) and the emerging site in the Baltic Sea region. The objectives are to: carry out CO2 injection with different strategies, displaying characteristics representative of the large scale storage and with injection volumes that will produce extrapolable reservoir responses; Develop, use and implement characterization and MMV technologies for maximized safety and minimized risks, including real time visualization of the CO2 containment and detection of possible failures; Develop optimal injection strategies that maintain realistic figures of injectivity, and capacity while simultaneously optimizing the use of energy; Detect and mitigate CO2 leakage at an abandoned well; Produce comprehensive datasets for model verification and validation; Improve the predictive capacity and performance of computational models, as well as their capability to handle uncertainty and thermo-hydro-mechanical and chemical phenomena at different scales (at the scale of the experiments) and upscaling (extrapolation to industrial scale) simulations; Address critical non-scientific issues of public acceptance, community participation, communication, dissemination, liabilities and prepare templates for the preparation and application of injection licenses and communication with regulators; Establish on-site facilities for analysis of monitoring and measurement, providing training and capacity building; Address the risk assessment in a meaningful way; Prepare a platform for the exploitation of project findings and for knowledge and information sharing with planned, large scale, CCS projects. Allow open access to sites, and seek cooperation with large scale CO2 injection projects both at the European and International levels.
Agency: Cordis | Branch: H2020 | Program: IA | Phase: DS-03-2015 | Award Amount: 8.11M | Year: 2016
Over recent years, Industrial and Automation Control Systems (IACS) adopted in Critical Infrastructures (CIs) have become more complex due to the increasing number of interconnected devices, and to the large amount of information exchanged among system components. With the emergence of such an Internet of Things generation of IACS, the boundaries to be protected have grown well beyond that of the single or aggregated-plant, typical of the mono-operator or silos vision. That poses new challenges, as more operators become involved in a scenario that naturally demands the introduction of multi-tenancy mechanisms. New ICT paradigms, where virtualization is playing an important role, provide innovative features for flexible and efficient management, monitoring and control of devices and data traffic. With the OT/IT convergence, OT (Operation Technologies) will benefit from IT innovation, but at the same time, they will also inherit new IT threats that can potentially impact CIs. ATENA project, with reference to the above-mentioned interdependent scenario, aims at achieving the desired level of Security and Resilience of the considered CIs, while preserving their efficient and flexible management. ATENA, leveraging the outcomes of previous European Research activities, particularly the CockpitCI and MICIE EU projects, will remarkably upgrade them by exploiting advanced features of ICT algorithms and components, and will bring them at operational industrial maturity level; in this last respect, ATENA outcomes will be tailored and validated in selected Use Cases. In particular, ATENA will develop a Software Defined Security paradigm combining new anomaly detection algorithms and risk assessment methodologies within a distributed environment, and will provide a suite of integrated market-ready ICT networked components and advanced tools embedding innovative algorithms both for correct static CI configuration and for fast dynamic CI reaction in presence of adverse events.
Agency: Cordis | Branch: FP7 | Program: CP-FP | Phase: SEC-2013.2.5-4 | Award Amount: 5.20M | Year: 2014
In recent years, we have witnessed an increase in the number and impact of cyber attacks. A successful attack might affect, or even endanger, daily human activities. Multiple countermeasures have been put in place to prevent Advanced Persistent Threat (APT) attacks, but they failed, allowing the latest generation of APT. The goal of PREEMPTIVE is to provide an innovative solution for enhancing existing methods and conceiving tools to prevent against cyber attacks, that target utility networks. PREEMPTIVE addresses the prevention of cyber attacks against hardware and software systems such as DCS, SCADA, PLC, networked electronic sensing, and monitoring and diagnostic systems used by the utilities networks. Moreover, the research aims to implement detection tools based on a dual approach comprising low direct detection and process misbehavior detection PREEMPTIVE proposes to: Enhance existing methodological security and prevention frameworks with the aim of harmonizing Risk and Vulnerability Assessment methods, standard policies, procedures and applicable regulations or recommendations to prevent cyber attacks. Design and develop prevention and detection tools complaint to the dual approach that takes into account both the industrial process misbehavior analysis (physical domain) and the communication & software anomalies (cyber domain): o Industrial process misbehavior detection tools. o communication & software related threats prevention and detection tools. Define a taxonomy for classifying the utilities networks taking into account: o The utility network type and communication technology used o The utility network exposure to Cyber threats o The impact to the citizens of services disruption caused by a cyber attack through the utility network. Define guidelines for improving Critical Infrastructure (CI) surveillance. Validate the PREEMPTIVE framework and innovative technologies in real scenarios with the support of the utility companies
Agency: Cordis | Branch: H2020 | Program: RIA | Phase: EUB-1-2015 | Award Amount: 2.29M | Year: 2016
SecureCloud addresses the confidentiality, integrity and availability of applications executed in the cloud. Data at rest or in transit on the network is already nowadays protected by encryption. The main problem that we face is how to ensure the confidentiality of data while being processed. Our approach is based on upcoming hardware extensions of commodity CPUs like Intels Secure Guard Extensions (SGX). By the help of these hardware extensions, we reduce the trusted computing base dramatically by excluding from it the millions of lines of source code of the cloud stack, operating systems and hypervisor. This permits us to ensure the confidentiality of computations even if the computers are under a different administrative control (like a cloud provider) or there is no physical security of the computers. Moreover, we ensure the confidentiality even if attackers would take control of the cloud stack, the hypervisor or the operating systems. As long as the hardware extensions of the CPU can be trusted, we can ensure the confidentiality of the computations. SecureCloud focuses on ensuring the confidential and dependable processing of Big Data. To keep the trusted computing base small, we use the concept of microservices: only the application logic that processes data (e.g., operators) is protected while all functionality that, e.g., shuffles and stores encrypted data is outside the trusted computing base. By monitoring the microservices, we can restart services that run on compromised hosts. We will evaluate and demonstrate our approach in the context of smart grids. In this use case context, we need to run across a physically distributed computing infrastructure with no or little physical security and partly untrusted administrators. We need to process large volumes of data and this big data processing would benefit by partial offloading into the cloud. In SecureCloud, we will show how to do this in a secure fashion even if clouds are untrusted.