{"title":"Vulnerability Detection Methodology for a Digital Signal Processor Micro-Controller at Edge Level Distributed Energy Resource Controller","authors":"P. Bhowmik, M. Starke, B. Dean, M. Chinthavali","doi":"10.1109/CyberPELS49534.2020.9311536","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311536","url":null,"abstract":"Integration of renewable energy and energy storage based Distributed Energy Resource (DER) assets to the grid has seen an upsurge over the past few decades. Traditionally, energy would be generated at a thermal or nuclear power plant and then transmitted over long distance through the transmission grid and then supply to the customers at the distribution grid. Modern renewable energy based DER assets have brought energy production at the edge of distribution grid, which has made the grid vulnerable to cyber intrusion as the power flow controllers for such DER assets are now distributed across the grid from distribution level to transmission level. This paper discusses the vulnerability posed by such power flow controllers of DER assets and demonstrates a detection methodology for unauthorized access and manipulation of system configuration for Digital Signal Processor based Microcontrollers. Experimental results proving efficacy of the methodology have been shown in paper.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Estefano Soria, Justin Jackson, H. Albunashee, C. Farnell, H. Mantooth
{"title":"Real-Time Simulation of a Cyber-Attack Scenario on a Power Distribution Substation","authors":"Estefano Soria, Justin Jackson, H. Albunashee, C. Farnell, H. Mantooth","doi":"10.1109/CyberPELS49534.2020.9311530","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311530","url":null,"abstract":"This paper will describe the real-time simulation of a virtual Denial-of-Service cyber-attack scenario to a power distribution system software model on OPAL-RT. This includes the evaluation of the system response to major power instabilities during the attack. Using the Modbus TCP communication protocol, a SCADA interface communicates and interacts with the real-time simulation power distribution system model in OPAL-RT. With this methodology, different cyber-attacks on a virtual system can be evaluated and verified with no threat to the physical system.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122781464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating Trusted Platform Modules in Power Electronics","authors":"Ammar Khan, N. Blair, C. Farnell, H. Mantooth","doi":"10.1109/CyberPELS49534.2020.9311532","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311532","url":null,"abstract":"Trusted Platform Modules (TPMs) are specialized chips that store RSA keys specific to the host system for hardware authentication. The RSA keys refer to an encryption technology developed by RSA Data Security. The RSA algorithm accounts for the fact that there is no efficient way to factor extremely large numbers. Each TPM chip contains an RSA Key pair known as the Endorsement Key that cannot be accessed by software. The TPM contains an additional key, called the Attestation Identity Key that protects the device itself against unauthorized firmware and software modification by implementing hash functions on critical sections of the software and firmware before execution. As a result, the TPM can be used as a chip for handling encryption for a larger system to offer an additional layer of security. Furthermore, the TPM can also be used for managing encryption keys, as a Storage Root Key is created when a user or administrator takes ownership of the system. However, merging the TPM into a system does come with additional costs along with potential benefits. This paper focuses on integrating a TPM into a system implemented on an ARM processor that engages with power electronics, and then presents the security benefits associated with a TPM.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131390439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Situation-aware Power Electronics in Resilient Distribution Systems with Reconfigurable Cyber-Physical Networks","authors":"Yuhua Du, Xiaonan Lu","doi":"10.1109/CyberPELS49534.2020.9311535","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311535","url":null,"abstract":"Modern power grids operate as reconfigurable cyber-physical systems (CPSs), which result in improved system resiliency but also complex operation status. Distributed generators (DGs) could identify system behavior by implementing situation awareness (SA) functionality and in turn provide flexible and autonomous responses to the system events. In this work, a control framework is developed for inverter interfaced DGs operation in distribution systems with reconfigurable cyber-physical networks. The DGs understudy are assumed to be equipped with SA capability. The DG operation modes in response to the system’s major events/states are defined, and the transitions between each mode are linked using formulated situation parameters. A set of distributed controllers are designed for DG operation under each mode. The proposed control framework along with the distributed controller designs have been validated by performing a requested network reconfiguration on a 12-bus test feeder using MATLAB/Simulink.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of False Data Injection Attacks on Smart Inverter Settings","authors":"T. Olowu, S. Dharmasena, H. Jafari, A. Sarwat","doi":"10.1109/CyberPELS49534.2020.9311541","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311541","url":null,"abstract":"With drive towards renewable-heavy smart grid, the use of smart inverters to provide grid support services is becoming more attractive. The dynamic operation of smart inverters (SI) are determined by their settings and operating curves. Though, it is generally believed that an attack on the SI settings could have a negative impact on the system, till date, no study has presented any findings. This paper presents an investigation of the potential impact of false data injection (FDI) on SI operation and their impacts on the distribution feeder using real word data from a 1.4 MW PV plant located on the Engineering campus in FIU. A case study of the IEEE 8500 node (which captures the characteristic of actual distribution feeder) with six PVs is investigated. Three SI functions (Volt-VAR, Volt-Watt and constant power factor) are used for FDI attack scenarios. The simulation results show the potential impacts of these attacks on the voltage profiles, overall system looses and the operations of other voltage control legacy devices in the network. The severity of the FDI attacks depends of the prvailing SI functions during the attack.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131672032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Using NDN to Vertically Secure Smart Power Distribution","authors":"Sanjeev Kaushik Ramani, A. Afanasyev","doi":"10.1109/CyberPELS49534.2020.9311544","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311544","url":null,"abstract":"Smart Grids is a modern adoption of power systems with the potential to revolutionize power distribution and management. In a general setting, a smart grid system is composed of multiple stakeholders who are involved in various operations including power generation, distribution and consumption. Effective, secure and trustworthy communication among these entities is crucial for the optimal operation of the system. Named Data Networking (NDN), the prominent Information Centric Networking (ICN) model provides a conducive architectural design to support the needs of this smart system. In this paper, we discuss data-centric security, data immutability and opportunistic in-network caching that are inherent features of NDN and enumerate the benefits and necessary accessories they provide for enhanced grid operation. We also see smart-grid as a viable system that can be built using NDN with the capability to provide the consumers with better quality of service (QoS), quality of experience (QoE) and most importantly vertical security.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Colin Ogilvie, Juan Ospina, Charalambos Konstantinou, T. Vu, M. Stanovich, K. Schoder, M. Steurer
{"title":"Modeling Communication Networks in a Real-Time Simulation Environment for Evaluating Controls of Shipboard Power Systems","authors":"Colin Ogilvie, Juan Ospina, Charalambos Konstantinou, T. Vu, M. Stanovich, K. Schoder, M. Steurer","doi":"10.1109/CyberPELS49534.2020.9311540","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311540","url":null,"abstract":"Interest by the U.S. Navy in the development and deployment of advanced controls in future shipboard platforms has motivated the development of the Controls Evaluation Framework (CEF) for use in investigating dynamics present in complex automated systems. This paper reports on the implementation and investigation of a communication network component within the CEF. This implementation is designed to augment the CEF’s available feature set, permitting the exploration of various communication conditions on advanced control performance. Results obtained from controller hardware-in-the-loop testing are presented and analyzed to demonstrate performance characteristics pertaining to the implemented module.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}