Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Engineering

Supercomputers And Quantum Computing On The Axis Of Cyber Security, Haydar Yalcin, Tugrul Daim, Mahdieh Mokhtari Moughari, Alain Mermoud Jun 2024

Supercomputers And Quantum Computing On The Axis Of Cyber Security, Haydar Yalcin, Tugrul Daim, Mahdieh Mokhtari Moughari, Alain Mermoud

Engineering and Technology Management Faculty Publications and Presentations

Cybersecurity has become a very critical area to address for governments, industry and the academic community. Cyber attacks are on the rise so is research to address the challenges presented by these attacks. Research yields several technological advancements. This paper explores the development of quantum computing and supercomputers within the context of cybersecurity. As many governments and organizations are under the threat of cyber-attacks, it is critical and timely to explore the status of technological development. We use advanced scientometric techniques to disclose the development status and identify the centers of excellence. The research uses bibliometric data of published papers …


Implementation Profile: Egot Derms Server/Client System (Doe-Psu-0000922-2), Tylor Slay, Robert B. Bass Jan 2024

Implementation Profile: Egot Derms Server/Client System (Doe-Psu-0000922-2), Tylor Slay, Robert B. Bass

Electrical and Computer Engineering Faculty Publications and Presentations

This implementation profile (IP) provides the scope and requirements necessary to implement a distributed energy resource management system (DERMS), which networks large numbers of DER within an energy grid of things (EGoT). This document originated as part of a U.S. DOE-funded project to develop a DERMS based on a set of rules known as the Energy Services Interface (ESI). The ESI serves as an umbrella, ensuring the information exchange between an aggregator and DER owners conforms to expectations: protect privacy, provide security, develop trustworthiness, and ensure interoperability. DERMS developers use the ESI to ensure that information exchange meets these expectations. …


Product Specification: Distributed Control Module (Doe-Psu-0000922-5), Nicole Henderson, Kai Zeng, Robert B. Bass Jan 2024

Product Specification: Distributed Control Module (Doe-Psu-0000922-5), Nicole Henderson, Kai Zeng, Robert B. Bass

Electrical and Computer Engineering Faculty Publications and Presentations

This product specification describes the architecture, implementation, and hardware descriptions of a Distributed Control Module (DCM) prototype. A DCM is an enabling technology for distributed energy resources (DER). DERs are grid-enabled generation, storage, and load devices that are owned by utility customers. DCMs enable information exchange between a distributed energy resource management system (DERMS) and DERs for the purpose of networking large numbers of DERs. The DCM prototype described within this document enables DER participation in a service-oriented aggregation system. A DERMS server provides IEEE 2030.5 smart energy resource services to DCM clients using a request/response information exchange process. DCMs …


Implementation Profile: Modeling Environment (Doe-Psu-0000922-3), Sean Keene, Midrar Adham, Robert B. Bass Jan 2024

Implementation Profile: Modeling Environment (Doe-Psu-0000922-3), Sean Keene, Midrar Adham, Robert B. Bass

Electrical and Computer Engineering Faculty Publications and Presentations

This implementation profile provides the scope, background, and requirements necessary to implement a Modeling Environment (ME) to test a Distributed Energy Resource (DER) Management System (DERMS). A DERMS is used by an aggregator to dispatch large numbers of DERs in order to provide grid services to a Grid Operator. The ME addresses scalability issues inherent to Hardware-in-the-Loop DERMS simulation; a large number of assets are needed in order to observe effects on the grid from deployment and dispatch of DERs.


Product Specification: Distributed Trust Model System (Doe-Psu-0000922-4), Narmada Sonali Fernando, Abdullah Barghouti, Robert B. Bass, John M. Acken Jan 2024

Product Specification: Distributed Trust Model System (Doe-Psu-0000922-4), Narmada Sonali Fernando, Abdullah Barghouti, Robert B. Bass, John M. Acken

Electrical and Computer Engineering Faculty Publications and Presentations

A Distributed Trust Model (DTM) System is a supervisory component within an energy grid of things. The role of a DTM System is to implement the trust aspects of an energy services interface. The DTM System augments existing security measures by monitoring the communication between the various EGoT System actors and quantifying metrics of trust of each actor.


Energy Services Interface (Doe-Psu-0000922-1), Robert B. Bass Jan 2024

Energy Services Interface (Doe-Psu-0000922-1), Robert B. Bass

Electrical and Computer Engineering Faculty Publications and Presentations

This document defines a set of rules known as the Energy Services Interface (ESI), which “establish a bi-directional, service-oriented, logical interface to support secure, trustworthy information exchange between an aggregator and distributed energy resources (DERs). These exchanges facilitate energy interactions between the DERs and the aggregator, thereby allowing the aggregator to provide grid services through dispatch of the DERs.” The ESI serves as an umbrella, ensuring the information exchange between an aggregator and DER owners conforms to expectations: protect privacy, provide security, develop trustworthiness, and ensure interoperability. DERMS developers use the ESI to ensure that information exchange meets these expectations.


Psu Derms Operating Manual And Egot System Reference (Doe-Psu-0000922-7), Tylor Slay, Robert B. Bass Jan 2024

Psu Derms Operating Manual And Egot System Reference (Doe-Psu-0000922-7), Tylor Slay, Robert B. Bass

Electrical and Computer Engineering Faculty Publications and Presentations

This document guides the user of the Portland State University Distributed Energy Resource Management System in configuration and normal operation. For direct access to the underlying code and its usage see the accompanying PSU EGoT System Reference. The system reference outlines all classes and methods used through the Energy Grid of Things system including applications, models, interfaces and the entity component system.


Psu Esi Review (Doe-Psu-0000922-6), Tylor Slay, Jaime Kolln, Robert B. Bass Jan 2024

Psu Esi Review (Doe-Psu-0000922-6), Tylor Slay, Jaime Kolln, Robert B. Bass

Electrical and Computer Engineering Faculty Publications and Presentations

A guide to developing an Energy Service Interface (ESI) was created as part of the Grid Modernization Laboratory Consortium 2.5.2 ESI project. The approach applies device-agnostic and service-oriented ESI principles and leverages documents such as the Interoperability Maturity Model and Common Grid Service Definitions to provide a methodology to review, develop, and update standards and profiles to engage distributed energy resources to provide grid services. This document evaluates the ESI developed by Portland State University’s Power Engineering Group under the Electric Grid of Things project funded by the U.S. Department of Energy. The evaluation explores the compliance of this specific …


Trust Model System For The Energy Grid Of Things Network Communications, Narmada Sonali Fernando, Zhongkai Zheng, John M. Acken, Robert B. Bass Apr 2023

Trust Model System For The Energy Grid Of Things Network Communications, Narmada Sonali Fernando, Zhongkai Zheng, John M. Acken, Robert B. Bass

Electrical and Computer Engineering Faculty Publications and Presentations

Network communication is crucial in the Energy Grid of Things (EGoT). Without a network connection, the energy grid becomes just a power grid where the energy resources are available to the customer uni-directionally. A mechanism to analyze and optimize the energy usage of the grid can only happen through a medium, a communications network, that enables information exchange between the grid participants and the service provider. Security implementers of EGoT network communication take extraordinary measures to ensure the safety of the energy grid, a critical infrastructure, as well as the safety and privacy of the grid participants. With the dynamic …


The Distributed Trust Model Applied To The Energy Grid Of Things, Narmada Sonali Fernando Dec 2021

The Distributed Trust Model Applied To The Energy Grid Of Things, Narmada Sonali Fernando

Dissertations and Theses

Electric power system operators can manage distribution system utilization and usage by coordinating end customer usage of distributed energy resources. The end customers in this regard are Service Provisioning Customers, who provide their energy resources to a Grid Service Provider, which in turn dispatches large aggregations of distributed energy resources to provide reliable service to the power system. The security of this system relies upon information protection mechanisms, as described in IEEE 2030.5. However, in addition to preventive security measures, a monitoring function is required to ensure trustworthiness.

Trust models are a method to detect and respond to both expected …


Physical Layer Watermarking Of Direct Sequence Spread Spectrum Signals, Xiang Li Jan 2013

Physical Layer Watermarking Of Direct Sequence Spread Spectrum Signals, Xiang Li

ETD Archive

Security services and mechanisms in wireless networks have long been studied and developed. However, compared to upper network layers, physical layer security did not play a signicant role in the OSI security model. Thanks to the easier implementation and verication methods brought by the development of software dened radio (SDR) techniques, physical layer security mechanisms have recently drawn increasing interest from researchers. Digital watermarking is one of the popular security techniques that can fully utilize various exclusive characteristics of the physical layer. This thesis proposes a physical layer watermarking technique named Water-marked Direct Sequence Spread Spectrum (DSSS) or WDSSS technique, …


A Coding Enabled Anonymity Network, Saikrishna Gumudavally Jan 2012

A Coding Enabled Anonymity Network, Saikrishna Gumudavally

ETD Archive

An onion routing based anonymous communication system is developed to address timing analysis attacks, a common limitation of many contemporary anonymous systems including Tor. Timing analysis based attacks gained importance because simple payload check and packet inspection attacks are avoided by encrypting packets. Timing information gathered at one part of the network is correlated with information gathered at other parts to break the anonymity. Network coding, a recently developed packet forwarding technique, is used to disrupt timing attacks. The system uses a multicast tree of onion routers (OR) through which the packets are relayed to desired destinations. Packets from different …


The Next Generation Botnet Attacks And Defenses, Ping Wang Jan 2010

The Next Generation Botnet Attacks And Defenses, Ping Wang

Electronic Theses and Dissertations

A "botnet" is a network of compromised computers (bots) that are controlled by an attacker (botmasters). Botnets are one of the most serious threats to today’s Internet; they are the root cause of many current Internet attacks, such as email spam, distributed denial of service (DDoS) attacks , click fraud, etc. There have been many researches on how to detect, monitor, and defend against botnets that have appeared and their attack techniques. However, it is equally important for us to investigate possible attack techniques that could be used by the next generation botnets, and develop effective defense techniques accordingly in …


On Traffic Analysis Attacks To Encrypted Voip Calls, Yuanchao Lu Jan 2009

On Traffic Analysis Attacks To Encrypted Voip Calls, Yuanchao Lu

ETD Archive

The increasing popularity of VoIP telephony has brought a lot of attention and concern over security and privacy issues of VoIP communication. This thesis proposes a new class of traffic analysis attacks to encrypted VoIP calls. The goal of these attacks is to detect speaker or speech of encrypted VoIP calls. The proposed traffic analysis attacks exploit silent suppression, an essential feature of VoIP telephony. These attacks are based on application-level features so that the attacks can detect the same speech or the same speaker of different VoIP calls made with different VoIP codecs. We evaluate the proposed attacks by …