Results: 5
(searched for: doi:10.1007/s11277-021-09124-5)
Published: 9 October 2022
Conference: 2022 North American Power Symposium (NAPS), 2022-10-9 - 2022-10-11, Salt Lake City, United States
Abstract:
Supply chain cyberattacks that exploit insecure third-party software are a growing concern for the security of the electric power grid. These attacks seek to deploy malicious software in grid control devices during the fabrication, shipment, installation, and maintenance stages, or as part of routine software updates. Malicious software on grid control devices may inject bad data or execute bad commands, which can cause blackouts and damage power equipment. This paper describes an experimental setup to simulate the software update process of a commercial power relay as part of a hardware-in-the-loop simulation for grid supply chain cyber-security assessment. The laboratory setup was successfully utilized to study three supply chain cyber-security use cases.
Published: 3 October 2022
Abstract:
With the development of social economy, Internet of things(IOT) communication technology has been widely used in smart home, industrial control, smart city, smart agriculture and other aspects. This technology also provides a lot of convenience for our daily life. In this paper, we designed a multi-point data acquisition system by using embedded system and Internet of things communication technology. It can use the AD converter of embedded system to collect multi-point experimental data in real time, and then send it to the control terminal through the Internet of things, which is convenient for users to view the test data in real time and eliminate the security risks when the system is working, The experimental results show that the multi-point data acquisition system we designed can monitor the changes of multi-point data in real time, and the acquisition system has good stability.
Published: 8 September 2022
Journal: IEEE Access
IEEE Access, Volume 10, pp 97197-97216; https://doi.org/10.1109/access.2022.3205351
Abstract:
Communication systems and networks are evolving as an integral part of not only of our everyday life but also as a part of the industry, fundamental infrastructures, companies, etc. Current directions and concepts, such as the Internet of Things (IoT), promise the enhanced quality of life, greater business opportunities, cost-effective manufacturing, and efficient operation management through ubiquitous connectivity and deployment of smart physical objects. IoT networks can collect, preprocess, and transmit vast amounts of data. A considerable portion of this data is security- and privacy-critical data, which makes IoT networks a tempting option for attackers. Given that these networks deal with the actual aspects of our lives and fundamental infrastructures (e.g. smart grids), security in such networks is crucial. The large scale of these networks and their unique characteristics and complexity bring further vulnerabilities. In this study, we focus on the IoT application layer, security requirements, threats, and countermeasures in this layer, and some of the open issues and future research lines.
Wireless Personal Communications, Volume 124, pp 3603-3634; https://doi.org/10.1007/s11277-022-09528-x
The publisher has not yet granted permission to display this abstract.
Wireless Personal Communications, Volume 124, pp 2735-2770; https://doi.org/10.1007/s11277-022-09487-3
The publisher has not yet granted permission to display this abstract.