If you are a power grid operator dealing with the growing threat of cyber attacks on your SCADA systems — this project developed a 4-layer security monitoring system that combines network traffic analysis, physical surveillance cameras, and an advanced alert engine. It was validated on a real operational smart grid across 9 partners in 6 countries, covering everything from remote sensor orchestration to encrypted data protection.
Smart Security Monitoring That Protects Power Grids and Industrial Systems From Cyber Attacks
Imagine your power grid or water plant runs on a computer system that was designed in the 1990s — back when nobody worried about hackers because these systems weren't even connected to the internet. Now they are, and they're sitting ducks. SCISSOR built a multi-layered security guard for these industrial systems: smart cameras, network traffic analyzers, and an AI-powered alarm system that watches everything from physical break-ins to sophisticated cyber attacks — all presented on a single dashboard a human operator can actually understand. They tested it on a real, running smart grid to prove it works outside the lab.
What needed solving
Power grids, water plants, and factories increasingly run on internet-connected control systems that were never designed with cybersecurity in mind. A single targeted attack can shut down critical services for thousands of people. Existing security tools built for office IT networks don't understand the specialized protocols and physical environments of industrial systems, leaving operators blind to threats.
What was built
SCISSOR built a 4-layer SCADA security monitoring system: network traffic probes analyzing up to layer 7, ultra-low-cost pervasive sensors with smart camera surveillance, an advanced alert engine correlating cyber and physical events, and a real-time operator dashboard. The system was validated in 31 deliverables including real-world deployment on an operational smart grid.
Who needs this
Who can put this to work
If you are a water utility company worried about unauthorized access to your control systems — this project built monitoring tools that detect both cyber intrusions and physical tampering using smart cameras with automatic object classification. The system was designed with no single point of failure, meaning your operations stay protected even if one component goes down. It was tested in both controlled and real-world environments with 31 deliverables documenting the results.
If you are a manufacturer whose production lines depend on SCADA or industrial control systems connected to the internet — this project created security monitoring that analyzes network traffic up to application layer 7 and uses attribute-based encryption to control who can access what. With 4 industry partners contributing to the build, the tools were designed for real industrial environments, not just academic labs.
Quick answers
What would it cost to implement this kind of SCADA security monitoring?
The project received EUR 3,534,850 in EU funding across 9 partners to develop the full system. Deployment costs for your specific infrastructure would depend on the number of monitoring points and sensors needed. Based on available project data, no per-unit pricing was published.
Can this scale to protect a national-level grid or large industrial network?
The system was designed with cloud-based deployment and no single point of failure, which supports scalability. It was validated on a real operational smart grid, not just a lab setup. The 4-layer architecture allows you to add monitoring probes and sensors as your network grows.
Who owns the IP and can I license this technology?
The project involved 9 partners across 6 countries including 4 industry partners and 2 SMEs. IP ownership is typically shared among consortium members under Horizon 2020 rules. You would need to contact the coordinator (Assystem, France) to discuss licensing terms.
Does this comply with current critical infrastructure regulations like NIS2?
SCISSOR was built specifically for critical infrastructure protection with features like encrypted data handling and identity-based access control. While it predates NIS2 (the project ran 2015-2018), its multi-layer monitoring approach directly addresses the detection and response requirements that regulations now mandate.
How long would it take to deploy in our environment?
The project produced 31 deliverables including 3 validation and demonstration reports covering initial planning through final results. Based on available project data, deployment timelines were not published, but the cloud-based architecture was designed for easier integration with existing SCADA systems.
Can this integrate with our existing SCADA and control systems?
Yes — the system was specifically designed to work with existing industrial control systems using open standards and IP connectivity. The monitoring layer supports programmable traffic analysis and gathers data from heterogeneous sources through a uniform representation layer, meaning it can talk to different equipment types.
Is there ongoing support or has the project ended?
The project officially ended in February 2018. The coordinator Assystem is a major engineering services company (not a research-only organization), which increases the likelihood of continued commercial development. Contact them directly for current availability of the technology.
Who built it
The SCISSOR consortium is well-balanced for taking research to market: 4 industry partners and 4 universities across 6 countries (Austria, Belgium, Switzerland, France, Italy, Poland), with a 44% industry ratio. The coordinator, Assystem, is a large French engineering services company — not an academic institution — which signals commercial intent. Two SMEs bring agility, while the university partners provide deep cybersecurity research. This mix of engineering muscle, startup agility, and academic rigor across 9 partners suggests the technology was built with real deployment in mind, not just publications.
- SIXSQ SAparticipant · CH
- AKADEMIA GORNICZO-HUTNICZA IM. STANISLAWA STASZICA W KRAKOWIEparticipant · PL
- SALZBURG RESEARCH FORSCHUNGSGESELLSCHAFT M.B.H.participant · AT
- CONSORZIO NAZIONALE INTERUNIVERSITARIO PER LE TELECOMUNICAZIONIparticipant · IT
- KATHOLIEKE UNIVERSITEIT LEUVENparticipant · BE
- SORBONNE UNIVERSITEparticipant · FR
Assystem Engineering and Operation Services (France) — large engineering services company. Use Google AI Search to find the project coordinator's direct contact.
Talk to the team behind this work.
Want to connect with the SCISSOR team about deploying their SCADA security monitoring in your infrastructure? SciTransfer can arrange an introduction and help assess fit for your specific setup.