Y 9 . ET 1 . 3 Implementation of Secure Energy Management against Cyber / physical Attacks for
نویسندگان
چکیده
1. Project Goals ● Develop a resilient cyber-physical control strategy for FREEDM system to secure the energy scheduling and physical operation: ○ Extending to cyber-physical security: Explore possible attacks on both energy scheduling and physical operation, analyze the impacts in terms of economic benefit and system stability. ○ Interaction between cyber/physical layer detection: Investigate the correlation between the cyber layer behavior and physical layer response, inconsistent behaviors in both layer are helpful to disclose the misconduct devices. ○ Collaborative cyber-physical countermeasures: Integrating the cyber layer resilience with physical layer secure algorithms to build a resilient cyber-physical control framework against possible attacks. ● Implement the resilient cyber-physical control framework in DGI platform and further test the algorithm in HIL and GEH testbeds.
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملSecure State Estimation of Cyber-Physical Systems under Switching Attacks
This paper deals with secure state estimation against switching mode and signal attacks on cyber-physical systems, possibly affected by adversarial extra fake measurement injection. A stochastic Bayesian approach is undertaken by exploiting Bernoulli and Poisson random sets for modeling the attack existence and, respectively, fake measurements, as well as multiple models for handling the variou...
متن کاملThreshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کامل