2020 IEEE CyberPELS (CyberPELS)最新文献

筛选
英文 中文
Vulnerability Detection Methodology for a Digital Signal Processor Micro-Controller at Edge Level Distributed Energy Resource Controller 边缘级分布式能源控制器中数字信号处理器微控制器漏洞检测方法
2020 IEEE CyberPELS (CyberPELS) Pub Date : 2020-10-13 DOI: 10.1109/CyberPELS49534.2020.9311536
P. Bhowmik, M. Starke, B. Dean, M. Chinthavali
{"title":"Vulnerability Detection Methodology for a Digital Signal Processor Micro-Controller at Edge Level Distributed Energy Resource Controller","authors":"P. Bhowmik, M. Starke, B. Dean, M. Chinthavali","doi":"10.1109/CyberPELS49534.2020.9311536","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311536","url":null,"abstract":"Integration of renewable energy and energy storage based Distributed Energy Resource (DER) assets to the grid has seen an upsurge over the past few decades. Traditionally, energy would be generated at a thermal or nuclear power plant and then transmitted over long distance through the transmission grid and then supply to the customers at the distribution grid. Modern renewable energy based DER assets have brought energy production at the edge of distribution grid, which has made the grid vulnerable to cyber intrusion as the power flow controllers for such DER assets are now distributed across the grid from distribution level to transmission level. This paper discusses the vulnerability posed by such power flow controllers of DER assets and demonstrates a detection methodology for unauthorized access and manipulation of system configuration for Digital Signal Processor based Microcontrollers. Experimental results proving efficacy of the methodology have been shown in paper.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Simulation of a Cyber-Attack Scenario on a Power Distribution Substation 变电站网络攻击场景的实时仿真研究
2020 IEEE CyberPELS (CyberPELS) Pub Date : 2020-10-13 DOI: 10.1109/CyberPELS49534.2020.9311530
Estefano Soria, Justin Jackson, H. Albunashee, C. Farnell, H. Mantooth
{"title":"Real-Time Simulation of a Cyber-Attack Scenario on a Power Distribution Substation","authors":"Estefano Soria, Justin Jackson, H. Albunashee, C. Farnell, H. Mantooth","doi":"10.1109/CyberPELS49534.2020.9311530","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311530","url":null,"abstract":"This paper will describe the real-time simulation of a virtual Denial-of-Service cyber-attack scenario to a power distribution system software model on OPAL-RT. This includes the evaluation of the system response to major power instabilities during the attack. Using the Modbus TCP communication protocol, a SCADA interface communicates and interacts with the real-time simulation power distribution system model in OPAL-RT. With this methodology, different cyber-attacks on a virtual system can be evaluated and verified with no threat to the physical system.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122781464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrating Trusted Platform Modules in Power Electronics 在电力电子中集成可信平台模块
2020 IEEE CyberPELS (CyberPELS) Pub Date : 2020-10-13 DOI: 10.1109/CyberPELS49534.2020.9311532
Ammar Khan, N. Blair, C. Farnell, H. Mantooth
{"title":"Integrating Trusted Platform Modules in Power Electronics","authors":"Ammar Khan, N. Blair, C. Farnell, H. Mantooth","doi":"10.1109/CyberPELS49534.2020.9311532","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311532","url":null,"abstract":"Trusted Platform Modules (TPMs) are specialized chips that store RSA keys specific to the host system for hardware authentication. The RSA keys refer to an encryption technology developed by RSA Data Security. The RSA algorithm accounts for the fact that there is no efficient way to factor extremely large numbers. Each TPM chip contains an RSA Key pair known as the Endorsement Key that cannot be accessed by software. The TPM contains an additional key, called the Attestation Identity Key that protects the device itself against unauthorized firmware and software modification by implementing hash functions on critical sections of the software and firmware before execution. As a result, the TPM can be used as a chip for handling encryption for a larger system to offer an additional layer of security. Furthermore, the TPM can also be used for managing encryption keys, as a Storage Root Key is created when a user or administrator takes ownership of the system. However, merging the TPM into a system does come with additional costs along with potential benefits. This paper focuses on integrating a TPM into a system implemented on an ARM processor that engages with power electronics, and then presents the security benefits associated with a TPM.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131390439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Situation-aware Power Electronics in Resilient Distribution Systems with Reconfigurable Cyber-Physical Networks 具有可重构信息物理网络的弹性配电系统中的态势感知电力电子技术
2020 IEEE CyberPELS (CyberPELS) Pub Date : 2020-10-13 DOI: 10.1109/CyberPELS49534.2020.9311535
Yuhua Du, Xiaonan Lu
{"title":"Situation-aware Power Electronics in Resilient Distribution Systems with Reconfigurable Cyber-Physical Networks","authors":"Yuhua Du, Xiaonan Lu","doi":"10.1109/CyberPELS49534.2020.9311535","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311535","url":null,"abstract":"Modern power grids operate as reconfigurable cyber-physical systems (CPSs), which result in improved system resiliency but also complex operation status. Distributed generators (DGs) could identify system behavior by implementing situation awareness (SA) functionality and in turn provide flexible and autonomous responses to the system events. In this work, a control framework is developed for inverter interfaced DGs operation in distribution systems with reconfigurable cyber-physical networks. The DGs understudy are assumed to be equipped with SA capability. The DG operation modes in response to the system’s major events/states are defined, and the transitions between each mode are linked using formulated situation parameters. A set of distributed controllers are designed for DG operation under each mode. The proposed control framework along with the distributed controller designs have been validated by performing a requested network reconfiguration on a 12-bus test feeder using MATLAB/Simulink.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of False Data Injection Attacks on Smart Inverter Settings 智能逆变器设置的虚假数据注入攻击研究
2020 IEEE CyberPELS (CyberPELS) Pub Date : 2020-10-13 DOI: 10.1109/CyberPELS49534.2020.9311541
T. Olowu, S. Dharmasena, H. Jafari, A. Sarwat
{"title":"Investigation of False Data Injection Attacks on Smart Inverter Settings","authors":"T. Olowu, S. Dharmasena, H. Jafari, A. Sarwat","doi":"10.1109/CyberPELS49534.2020.9311541","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311541","url":null,"abstract":"With drive towards renewable-heavy smart grid, the use of smart inverters to provide grid support services is becoming more attractive. The dynamic operation of smart inverters (SI) are determined by their settings and operating curves. Though, it is generally believed that an attack on the SI settings could have a negative impact on the system, till date, no study has presented any findings. This paper presents an investigation of the potential impact of false data injection (FDI) on SI operation and their impacts on the distribution feeder using real word data from a 1.4 MW PV plant located on the Engineering campus in FIU. A case study of the IEEE 8500 node (which captures the characteristic of actual distribution feeder) with six PVs is investigated. Three SI functions (Volt-VAR, Volt-Watt and constant power factor) are used for FDI attack scenarios. The simulation results show the potential impacts of these attacks on the voltage profiles, overall system looses and the operations of other voltage control legacy devices in the network. The severity of the FDI attacks depends of the prvailing SI functions during the attack.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131672032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On Using NDN to Vertically Secure Smart Power Distribution 利用NDN实现垂直安全智能配电
2020 IEEE CyberPELS (CyberPELS) Pub Date : 2020-10-13 DOI: 10.1109/CyberPELS49534.2020.9311544
Sanjeev Kaushik Ramani, A. Afanasyev
{"title":"On Using NDN to Vertically Secure Smart Power Distribution","authors":"Sanjeev Kaushik Ramani, A. Afanasyev","doi":"10.1109/CyberPELS49534.2020.9311544","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311544","url":null,"abstract":"Smart Grids is a modern adoption of power systems with the potential to revolutionize power distribution and management. In a general setting, a smart grid system is composed of multiple stakeholders who are involved in various operations including power generation, distribution and consumption. Effective, secure and trustworthy communication among these entities is crucial for the optimal operation of the system. Named Data Networking (NDN), the prominent Information Centric Networking (ICN) model provides a conducive architectural design to support the needs of this smart system. In this paper, we discuss data-centric security, data immutability and opportunistic in-network caching that are inherent features of NDN and enumerate the benefits and necessary accessories they provide for enhanced grid operation. We also see smart-grid as a viable system that can be built using NDN with the capability to provide the consumers with better quality of service (QoS), quality of experience (QoE) and most importantly vertical security.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Communication Networks in a Real-Time Simulation Environment for Evaluating Controls of Shipboard Power Systems 舰船电力系统控制评估实时仿真环境下的通信网络建模
2020 IEEE CyberPELS (CyberPELS) Pub Date : 2020-08-15 DOI: 10.1109/CyberPELS49534.2020.9311540
Colin Ogilvie, Juan Ospina, Charalambos Konstantinou, T. Vu, M. Stanovich, K. Schoder, M. Steurer
{"title":"Modeling Communication Networks in a Real-Time Simulation Environment for Evaluating Controls of Shipboard Power Systems","authors":"Colin Ogilvie, Juan Ospina, Charalambos Konstantinou, T. Vu, M. Stanovich, K. Schoder, M. Steurer","doi":"10.1109/CyberPELS49534.2020.9311540","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311540","url":null,"abstract":"Interest by the U.S. Navy in the development and deployment of advanced controls in future shipboard platforms has motivated the development of the Controls Evaluation Framework (CEF) for use in investigating dynamics present in complex automated systems. This paper reports on the implementation and investigation of a communication network component within the CEF. This implementation is designed to augment the CEF’s available feature set, permitting the exploration of various communication conditions on advanced control performance. Results obtained from controller hardware-in-the-loop testing are presented and analyzed to demonstrate performance characteristics pertaining to the implemented module.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信