Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

A Flexible Ot Testbed For Evaluating On-Device Implementations Of Iec-61850 Goose, Matthew Boeding, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla Jun 2023

A Flexible Ot Testbed For Evaluating On-Device Implementations Of Iec-61850 Goose, Matthew Boeding, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla

Department of Electrical and Computer Engineering: Faculty Publications

The growing convergence of Information Technology and Operational Technology has enhanced communication and visibility across power grids. This, coupled with the growing use of Distributed Energy Resources in power grids, has enhanced the grid capabilities while also creating a larger attack surface for malicious actors. A common protocol vulnerable to these attacks is the IEC-61850 GOOSE protocol due to its low-latency requirements, multicast packet delivery method, and lack of encryption. In this paper, we evaluate the security implications of different hardware implementations of this protocol by contrasting device response and recovery of two commercial off-the-shelf Intelligent Electronic Devices from separate …


Analysis And Design Of Secure Sampled-Data Control Subject To Denial-Of-Service Attacks, Hira Sana, Ghulam Mustafa, Owais Khan, Nouman Ashraf, Abdul Qayyum Khan, Muhammad Abid, Haroom Ur Rashid Khan Jan 2023

Analysis And Design Of Secure Sampled-Data Control Subject To Denial-Of-Service Attacks, Hira Sana, Ghulam Mustafa, Owais Khan, Nouman Ashraf, Abdul Qayyum Khan, Muhammad Abid, Haroom Ur Rashid Khan

Articles

This study addresses the issue of secure control design for cyber-physical systems (CPS) against denial of service (DoS) attacks. We take into account a continuous-time linear system with a convex quadratic performance measure and a sampled linear state feedback control. DoS attacks impose constraints on the CPS, where packets may be jammed between the sensor and controller by a malicious entity, potentially resulting in system instability and performance degradation. We assume that the attacker can perform DoS attacks with a limited time and frequency due to energy restrictions. We devise an efficient procedure using the linear matrix inequality approach to …


Physical Layer Authentication Using Ensemble Learning Technique In Wireless Communications, Muhammad Waqas, Shehr Bano, Fatima Hassan, Shanshan Tu, Ghulam Abbas, Ziaul Haq Abbas Jan 2022

Physical Layer Authentication Using Ensemble Learning Technique In Wireless Communications, Muhammad Waqas, Shehr Bano, Fatima Hassan, Shanshan Tu, Ghulam Abbas, Ziaul Haq Abbas

Research outputs 2022 to 2026

Cyber-physical wireless systems have surfaced as an important data communication and networking research area. It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies. Due to their high reliability, sensitivity and connectivity, their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping, spoofing, botnets, man-in-the-middle attack, denial of service (DoS) and distributed denial of service (DDoS) and impersonation. Existing methods use physical layer authentication (PLA), the most promising solution to detect …


Towards Semantic Integration Of Machine Vision Systems To Aid Manufacturing Event Understanding, Kaishu Xia, Clint Saidy, Max Kirkpatrick, Noble Anumbe, Amit Sheth, Ramy Harik Jun 2021

Towards Semantic Integration Of Machine Vision Systems To Aid Manufacturing Event Understanding, Kaishu Xia, Clint Saidy, Max Kirkpatrick, Noble Anumbe, Amit Sheth, Ramy Harik

Publications

A manufacturing paradigm shift from conventional control pyramids to decentralized, service-oriented, and cyber-physical systems (CPSs) is taking place in today’s 4th industrial revolution. Generally accepted roles and implementation recipes of cyber systems are expected to be standardized in the future of manufacturing industry. The authors intend to develop a novel CPS-enabled control architecture that accommodates: (1) intelligent information systems involving domain knowledge, empirical model, and simulation; (2) fast and secured industrial communication networks; (3) cognitive automation by rapid signal analytics and machine learning (ML) based feature extraction; (4) interoperability between machine and human. Semantic integration of process indicators is fundamental …


See-Trend: Secure Traffic-Related Event Detection In Smart Communities, Stephan Olariu, Dimitrie C. Popescu Jan 2021

See-Trend: Secure Traffic-Related Event Detection In Smart Communities, Stephan Olariu, Dimitrie C. Popescu

Computer Science Faculty Publications

It has been widely recognized that one of the critical services provided by Smart Cities and Smart Communities is Smart Mobility. This paper lays the theoretical foundations of SEE-TREND, a system for Secure Early Traffic-Related EveNt Detection in Smart Cities and Smart Communities. SEE-TREND promotes Smart Mobility by implementing an anonymous, probabilistic collection of traffic-related data from passing vehicles. The collected data are then aggregated and used by its inference engine to build beliefs about the state of the traffic, to detect traffic trends, and to disseminate relevant traffic-related information along the roadway to help the driving public make informed …


Defense By Deception Against Stealthy Attacks In Power Grids, Md Hasan Shahriar Nov 2020

Defense By Deception Against Stealthy Attacks In Power Grids, Md Hasan Shahriar

FIU Electronic Theses and Dissertations

Cyber-physical Systems (CPSs) and the Internet of Things (IoT) are converging towards a hybrid platform that is becoming ubiquitous in all modern infrastructures. The integration of the complex and heterogeneous systems creates enormous space for the adversaries to get into the network and inject cleverly crafted false data into measurements, misleading the control center to make erroneous decisions. Besides, the attacker can make a critical part of the system unavailable by compromising the sensor data availability. To obfuscate and mislead the attackers, we propose DDAF, a deceptive data acquisition framework for CPSs' hierarchical communication network. Each switch in the hierarchical …


Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan Nov 2019

Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan

FIU Electronic Theses and Dissertations

Electric utilities have limited operational visibility and situation awareness over grid-tied distributed photovoltaic systems (PV). This will pose a risk to grid stability when the PV penetration into a given feeder exceeds 60% of its peak or minimum daytime load. Third-party service providers offer only real-time monitoring but not accurate insights into system performance and prediction of productions. PV systems also increase the attack surface of distribution networks since they are not under the direct supervision and control of the utility security analysts.

Six key objectives were successfully achieved to enhance PV operational visibility and situation awareness: (1) conceptual cybersecurity …


A Theoretical Model Of Underground Dipole Antennas For Communications In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran, Xin Dong, Christos Argyropoulos, Suat Irmak Feb 2019

A Theoretical Model Of Underground Dipole Antennas For Communications In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran, Xin Dong, Christos Argyropoulos, Suat Irmak

Faculty Publications

The realization of Internet of Underground Things (IOUT) relies on the establishment of reliable communication links, where the antenna becomes a major design component due to the significant impacts of soil. In this paper, a theoretical model is developed to capture the impacts of change of soil moisture on the return loss, resonant frequency, and bandwidth of a buried dipole antenna. Experiments are conducted in silty clay loam, sandy, and silt loam soil, to characterize the effects of soil, in an indoor testbed and field testbeds. It is shown that at subsurface burial depths (0.1-0.4m), change in soil moisture impacts …


Secure Control And Operation Of Energy Cyber-Physical Systems Through Intelligent Agents, Mohamad El Hariri Nov 2018

Secure Control And Operation Of Energy Cyber-Physical Systems Through Intelligent Agents, Mohamad El Hariri

FIU Electronic Theses and Dissertations

The operation of the smart grid is expected to be heavily reliant on microprocessor-based control. Thus, there is a strong need for interoperability standards to address the heterogeneous nature of the data in the smart grid. In this research, we analyzed in detail the security threats of the Generic Object Oriented Substation Events (GOOSE) and Sampled Measured Values (SMV) protocol mappings of the IEC 61850 data modeling standard, which is the most widely industry-accepted standard for power system automation and control. We found that there is a strong need for security solutions that are capable of defending the grid against …