Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Engineering
Development Of A Reference Design For A Cyber-Physical System, Nicholas Paul Blair
Development Of A Reference Design For A Cyber-Physical System, Nicholas Paul Blair
Graduate Theses and Dissertations
The purpose of this thesis is to develop a reference design to assist in the selection of security practices in power electronics design. A prototype will be developed from this reference design for evaluation. This evaluation will include a brief cost/benefit analysis to gauge the efficacy of implementing each layer of security throughout the power electronics design process. This thesis will also describe the obstacles and effectiveness of integrating a Trusted Platform Module (TPM) into a cyber-hardened grid-connected device. The TPM device is a secured crypto processor that assists in generating, storing, and restricting the use of cryptographic keys. The …
Cybersecurity Methods For Grid-Connected Power Electronics, Stephen Joe Moquin
Cybersecurity Methods For Grid-Connected Power Electronics, Stephen Joe Moquin
Graduate Theses and Dissertations
The present work shows a secure-by-design process, defense-in-depth method, and security techniques for a secure distributed energy resource. The distributed energy resource is a cybersecure, solar inverter and battery energy storage system prototype, collectively called the Cybersecure Power Router. Consideration is given to the use of the Smart Green Power Node for a foundation of the present work. Metrics for controller security are investigated to evaluate firmware security techniques. The prototype's ability to mitigate, respond to, and recover from firmware integrity degradation is examined. The prototype shows many working security techniques within the context of a grid-connected, distributed energy resource. …
Interoperability Of Ip-Based Cameras, Faythe C. Maston
Interoperability Of Ip-Based Cameras, Faythe C. Maston
Graduate Theses, Dissertations, and Problem Reports
In this day and age of advancing technology and increasing crime, more and more citizens are investing in technology to increase their personal security. One such technology is the use of home-based IP security systems. These systems are comprised of one or more IP-based security cameras with owners preferring to have a way to view all camera feeds at once. Since not all security cameras are made to interact with each other, it is necessary to find a program that allows a user to view all security cameras at once, regardless of what brand of cameras they use. After researching, …