• D2.3 CySiMS Cyber Event Exercise Handbook 

      Bernsmed, Karin; Borgaonkar, Ravishankar Bhaskarrao (SINTEF rapport;2021:00319, Research report, 2021)
      This document is a handbook for developing cyber event exercises relevant for the intended users of the CySiMS-SE secure communication solution. The document includes a selected set of scenarios that are relevant to ...
    • D4.3 Multi-modal communication - Securing future communication across different sectors and technologies 

      Bernsmed, Karin; Bour, Guillaume; Meland, Per Håkon; Borgaonkar, Ravishankar Bhaskarrao; Wille, Egil (SINTEF rapport;2021:00314, Research report, 2021)
      This document introduces the concept of multi-modal communication, using the coordination of a Search and Rescue (SAR) operation as an illustrating scenario, identifies challenges for secure information exchange and ...
    • Improving smart grid security through 5G enabled IoT and edge computing 

      Borgaonkar, Ravishankar Bhaskarrao; Tøndel, Inger Anne; Degefa, Merkebu Zenebe; JAATUN, Martin Gilje (Peer reviewed; Journal article, 2021)
      This article investigates and analyzes the security aspects of 5G specifications from the perspective of IoT-based smart grids. As the smart grid requires high-speed and reliable communication to enable real-time grid ...
    • On the Certificate Revocation Problem in the Maritime Sector 

      Bour, Guillaume; Bernsmed, Karin; Meland, Per Håkon; Borgaonkar, Ravishankar Bhaskarrao (Peer reviewed; Journal article, 2021)
      Maritime shipping is currently undergoing rapid digitalization, but with increasing exposure to cyber threats, there is a need to improve the security of the ship communication technology used during operations across ...
    • What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios 

      Tøndel, Inger Anne; Borgaonkar, Ravishankar Bhaskarrao; Jaatun, Martin Gilje; Frøystad, Christian (Chapter, 2020)
      The modernisation of the power grid is ongoing, and the level of digitalisation of the power grid in, say, ten years may be quite different than today. Cyber security needs will change correspondingly. In this paper we ...