SciTransfer
SCISSOR · Project

Smart Security Monitoring That Protects Power Grids and Industrial Systems From Cyber Attacks

energyPilotedTRL 7

Imagine your power grid or water plant runs on a computer system that was designed in the 1990s — back when nobody worried about hackers because these systems weren't even connected to the internet. Now they are, and they're sitting ducks. SCISSOR built a multi-layered security guard for these industrial systems: smart cameras, network traffic analyzers, and an AI-powered alarm system that watches everything from physical break-ins to sophisticated cyber attacks — all presented on a single dashboard a human operator can actually understand. They tested it on a real, running smart grid to prove it works outside the lab.

By the numbers
EUR 3,534,850
EU funding for development
9
consortium partners
6
countries involved
4
security monitoring layers built
31
total project deliverables
3
validation and demonstration reports
The business problem

What needed solving

Power grids, water plants, and factories increasingly run on internet-connected control systems that were never designed with cybersecurity in mind. A single targeted attack can shut down critical services for thousands of people. Existing security tools built for office IT networks don't understand the specialized protocols and physical environments of industrial systems, leaving operators blind to threats.

The solution

What was built

SCISSOR built a 4-layer SCADA security monitoring system: network traffic probes analyzing up to layer 7, ultra-low-cost pervasive sensors with smart camera surveillance, an advanced alert engine correlating cyber and physical events, and a real-time operator dashboard. The system was validated in 31 deliverables including real-world deployment on an operational smart grid.

Audience

Who needs this

Power grid operators upgrading SCADA cybersecurity to meet NIS2 requirementsWater and wastewater utility companies with internet-connected control systemsIndustrial plant managers responsible for operational technology (OT) securitySmart grid technology integrators building next-generation energy infrastructureCritical infrastructure protection consultancies advising utilities and governments
Business applications

Who can put this to work

Energy & Utilities
enterprise
Target: Power grid operators and smart grid companies

If you are a power grid operator dealing with the growing threat of cyber attacks on your SCADA systems — this project developed a 4-layer security monitoring system that combines network traffic analysis, physical surveillance cameras, and an advanced alert engine. It was validated on a real operational smart grid across 9 partners in 6 countries, covering everything from remote sensor orchestration to encrypted data protection.

Water & Wastewater Management
enterprise
Target: Water utility companies running industrial control systems

If you are a water utility company worried about unauthorized access to your control systems — this project built monitoring tools that detect both cyber intrusions and physical tampering using smart cameras with automatic object classification. The system was designed with no single point of failure, meaning your operations stay protected even if one component goes down. It was tested in both controlled and real-world environments with 31 deliverables documenting the results.

Industrial Manufacturing
mid-size
Target: Manufacturers with networked production control systems

If you are a manufacturer whose production lines depend on SCADA or industrial control systems connected to the internet — this project created security monitoring that analyzes network traffic up to application layer 7 and uses attribute-based encryption to control who can access what. With 4 industry partners contributing to the build, the tools were designed for real industrial environments, not just academic labs.

Frequently asked

Quick answers

What would it cost to implement this kind of SCADA security monitoring?

The project received EUR 3,534,850 in EU funding across 9 partners to develop the full system. Deployment costs for your specific infrastructure would depend on the number of monitoring points and sensors needed. Based on available project data, no per-unit pricing was published.

Can this scale to protect a national-level grid or large industrial network?

The system was designed with cloud-based deployment and no single point of failure, which supports scalability. It was validated on a real operational smart grid, not just a lab setup. The 4-layer architecture allows you to add monitoring probes and sensors as your network grows.

Who owns the IP and can I license this technology?

The project involved 9 partners across 6 countries including 4 industry partners and 2 SMEs. IP ownership is typically shared among consortium members under Horizon 2020 rules. You would need to contact the coordinator (Assystem, France) to discuss licensing terms.

Does this comply with current critical infrastructure regulations like NIS2?

SCISSOR was built specifically for critical infrastructure protection with features like encrypted data handling and identity-based access control. While it predates NIS2 (the project ran 2015-2018), its multi-layer monitoring approach directly addresses the detection and response requirements that regulations now mandate.

How long would it take to deploy in our environment?

The project produced 31 deliverables including 3 validation and demonstration reports covering initial planning through final results. Based on available project data, deployment timelines were not published, but the cloud-based architecture was designed for easier integration with existing SCADA systems.

Can this integrate with our existing SCADA and control systems?

Yes — the system was specifically designed to work with existing industrial control systems using open standards and IP connectivity. The monitoring layer supports programmable traffic analysis and gathers data from heterogeneous sources through a uniform representation layer, meaning it can talk to different equipment types.

Is there ongoing support or has the project ended?

The project officially ended in February 2018. The coordinator Assystem is a major engineering services company (not a research-only organization), which increases the likelihood of continued commercial development. Contact them directly for current availability of the technology.

Consortium

Who built it

The SCISSOR consortium is well-balanced for taking research to market: 4 industry partners and 4 universities across 6 countries (Austria, Belgium, Switzerland, France, Italy, Poland), with a 44% industry ratio. The coordinator, Assystem, is a large French engineering services company — not an academic institution — which signals commercial intent. Two SMEs bring agility, while the university partners provide deep cybersecurity research. This mix of engineering muscle, startup agility, and academic rigor across 9 partners suggests the technology was built with real deployment in mind, not just publications.

How to reach the team

Assystem Engineering and Operation Services (France) — large engineering services company. Use Google AI Search to find the project coordinator's direct contact.

Next steps

Talk to the team behind this work.

Want to connect with the SCISSOR team about deploying their SCADA security monitoring in your infrastructure? SciTransfer can arrange an introduction and help assess fit for your specific setup.