Energy Cyber-Physical Systems and their Communication and Control Challenges for Operational Security in Industrial Systems
Room: UA1140, Bldg: UA, 2000 Simcoe Street North, Oshawa, Ontario, Canada, L1G7K4The development of innovative cybersecurity technologies, tools, and methodologies that advance the energy system’s ability to survive cyber-attacks and incidents while sustaining critical functions is needed for the secure operation of utility and industrial systems. It is essential to verify and validate the ability of the developed solutions and methodologies so that they can be effectively used in practice. Developing solutions to mitigate cyber vulnerabilities throughout the energy delivery system is essential to protect hardware assets. It will also make systems less susceptible to cyber threats and provide reliable delivery of electricity if a cyber incident <a href="http://occurs.This" target="_blank" title="occurs.This">occurs.This talk will describe how the developed solution can protect the power grid and industrial infrastructure from cyber-attacks and build cybersecurity protection into emerging power grid components and services. This includes microgrid and demand-side management components and protecting the network (substations and productivity lines) and data infrastructure (SCADA) to increase the resilience of the energy delivery systems against cyber-attacks. These developments will also help utility security systems manage large amounts of cybersecurity risk data and cybersecurity operations. For these developments to succeed, cybersecurity testbeds and testing methodologies are necessary to evaluate the effectiveness of any proposed security <a href="http://technologies.The" target="_blank" title="technologies.The">technologies.The focus on developing cybersecurity capabilities in energy systems should span over multiple strategies: in the near term, midterm, and long term. Continuous security state monitoring across cyber-physical domains is the goal in the near term. The development of continually defending interoperable components that continue operating in degraded conditions is required in the midterm. Developing methodologies to mitigate cyber incidents to return to normal operations quickly is necessary for all system components in the long term. We will discuss R&D efforts in these areas centered on developing operational frameworks related to communication and interoperability, control, and <a href="http://protection.The" target="_blank" title="protection.The">protection.The importance of interoperability between smart grid applications and multi-vendor devices must be considered. The current grid comprises multi-vendor devices and multi-lingual applications that add to the complexity of integrating and securing the smart grid components. Standards development entities have been working with utilities, vendors, and regulatory bodies to develop standards that address smart grid interoperability. These include IEEE, IEC, NIST, ANSI, NERC, and others. In this presentation, we will conceptualize a comprehensive cyber-physical platform that involves the communication and power network sides integrating the cyber information flow, physical information flow, and the interaction between them. A data-centric communication middleware provides a common-data bus to orchestrate the system’s components, leading to an expandable multi-lingual system. We will present a hardware protocol gateway that was developed as a protocol translator capable of mapping IEC 61850 generic object-oriented substation event (GOOSE) and sampled measured value (SMV) messages into the data-centric Data Distribution Service (DDS) global data bus. This is necessary for integrating the widely used IEC 61850-based devices into an exhaustive microgrid control and security <a href="http://framework.We" target="_blank" title="framework.We">framework.We will also discuss a scalable cloud-based Multi-Agent System for controlling large-scale penetration of Electric Vehicles (EVs) and their infrastructure into the power grid. This is a system that can survive cyber-attacks while sustaining critical functions. This framework’s network will be assessed by applying contingencies and identifying the resulting signatures for detection in real-time operation. As a result, protective measures can be taken to address the dynamic threats in the foreseen grid-integrated EV parks where the developed system will have an automated response to a <a href="http://cyber-attack.In" target="_blank" title="cyber-attack.In">cyber-attack.In distributed energy management systems, the protection system must be adaptive. Communication networks assist in reacting to dynamic changes in the microgrid configurations. This presentation will also describe a newly developed protection scheme with extensive communication provided by the IEC 61850 standard for power networks to monitor the microgrid during these dynamic changes. The robustness and availability of the communication infrastructure are required for the success of protection measures. This adaptive protection scheme for AC microgrids can survive communication failures through energy storage <a href="http://systems.Co-sponsored" target="_blank" title="systems.Co-sponsored">systems.Co-sponsored by: Power Electronics/Industrial ElectronicsSpeaker(s): Osama, Room: UA1140, Bldg: UA, 2000 Simcoe Street North, Oshawa, Ontario, Canada, L1G7K4
The Sketches of Infinite Data and Algorithms for Real-Time Data Insights
Virtual: https://events.vtools.ieee.org/m/482936Free Registration (with a Zoom account; you can get one for free if you don't already have it. This requirement is to avoid Zoom bombing. Please sign in using the email address tied to your Zoom account — not necessarily the one you used to register for the <a href="http://event.):https://sjsu.zoom.us/webinar/register/WN_DIDfdbkgRFeEd3JbzURIUQSynopsis:How" target="_blank" title="event.):https://sjsu.zoom.us/webinar/register/WN_DIDfdbkgRFeEd3JbzURIUQSynopsis:How">event.):https://sjsu.zoom.us/webinar/register/WN_DIDfdbkgRFeEd3JbzURIUQSynopsis:How are machine learning algorithms able to answer questions from any nook and corner of the World Wide Web? How are trending hashtags from the near infinite microblog posts, unique visitors and other distinct counts in the near infinite website traffic determined? How do blogging websites avoid recommending articles a user has previously read? In general, how can we answer complex queries about enormous data streams without storing them entirely, in real-time? The answer often lies in clever approximation algorithms and data "sketches" that capture essential properties using vastly reduced space. The relentless flow of data in modern systems indeed presents significant challenges. These data streams are often too large to store and too fast to process exhaustively with traditional methods. This talk introduces key sketching and approximation techniques that help generate real-time data insights by processing data <a href="http://streams.---------------------------------------------------------------By" target="_blank" title="streams.---------------------------------------------------------------By">streams.---------------------------------------------------------------By registering for this event, you agree that IEEE and the organizers are not liable to you for any loss, damage, injury, or any incidental, indirect, special, consequential, or economic loss or damage (including loss of opportunity, exemplary or punitive damages). The event will be recorded and will be made available for public <a href="http://viewing.Speaker(s):" target="_blank" title="viewing.Speaker(s):">viewing.Speaker(s): Dr. Vishnu S. PendyalaVirtual: https://events.vtools.ieee.org/m/482936