Publications

13 Results

Search results

Jump to search filters

Named Data Networking for DER Cybersecurity

Chavez, Adrian R.; Cordeiro, Patricia G.; Huang, Gary H.; Kitsos, Panayioti C.; La Pay, Trevor L.; Short, Austin S.; Summers, Adam

We present our research findings on the novel NDN protocol. In this work, we defined key attack scenarios for possible exploitation and detail software security testing procedures to evaluate the security of the NDN software. This work was done in the context of distributed energy resources (DER). The software security testing included an execution of unit tests and static code analyses to better understand the software rigor and the security that has been implemented. The results from the penetration testing are presented. Recommendations are discussed to provide additional defense for secure end-to-end NDN communications.

More Details

Module OT PNM Field Demonstration Test Procedure

Cordeiro, Patricia G.; Onunkwo, Ifeoma O.; Jose, Deepu J.; Hossain-McKenzie, Shamina S.

This document will detail a field demonstration test procedure for the Module OT device developed for the joint NREL-SNL DOE CEDS project titled "Modular Security Apparatus for Managing Distributed Cryptography for Command & Control Messages on Operational Technology (OT) Networks." The aim of this document is to create the testing and evaluation procedure for field demonstration of the device; this includes primarily functional testing and implementation testing at Public Service Company of New Mexico's (PNM's) Prosperity solar site environment. Specifically, the Module OT devices will be integrated into the Prosperity solar site system; traffic will be encrypted between several points of interest at the site (e.g., inverter micrologger and switch). The tests described in this document will be performed to assess the impact and effectiveness of the encryption capabilities provided by the Module OT device.

More Details

Analysis of System and Interoperability Impact from Securing Communications for Distributed Energy Resources

2019 IEEE Power and Energy Conference at Illinois, PECI 2019

Jacobs, Nicholas J.; Hossain-McKenzie, Shamina S.; Jose, Deepu J.; Saleem, Danish; Lai, Christine F.; Cordeiro, Patricia G.; Hasandka, Adarsh; Martin, Maurice; Howerter, Christopher M.

As the power grid incorporates increasing amounts of distributed energy resources (DER) that provide new generation sources, new opportunities are created for improving operation of the grid while large challenges also arise for preserving grid reliability and security. To improve grid performance, DERs can be utilized to provide important support functionality, such as supporting frequency and voltage levels, especially if they are assisted by communication schemes as part of an advanced distribution management system (ADMS). Unfortunately, such connectivity and grid support functionality also creates additional cyber security risk with the potential for degradation of grid services, especially under conditions with high amounts of distributed generation. This paper will first discuss the communications needed by DERs to support system and interoperability objectives, as well as the security requirements and impact of securing these communications. Some common security mechanisms are discussed in relation to DERs, and a simulated 15-bus model of a distribution feeder is used to demonstrate aspects of the DER communications and impact to grid performance. These results help to advance understanding of the benefits, requirements, and mechanisms for securely implementing DER communications while ensuring that grid reliability is maintained.

More Details

Module OT Laboratory Test Procedure

Cordeiro, Patricia G.; Onunkwo, Ifeoma O.; Jacobs, Nicholas J.; Jose, Deepu J.; Wright, Brian J.; Hossain-McKenzie, Shamina S.

This document will detail a test procedure, involving bench and emulation testing, for the Module OT device developed for the joint NREL-SNL DOE CEDS project titled "Modular Security Apparatus for Managing Distributed Cryptography for Command & Control Messages on Operational Technology (OT) Networks." The aim of this document is to create the testing and evaluation protocol for the module for lab-level testing; this includes checklists and experiments for information gathering, functional testing, cryptographic implementation, public key infrastructure, key exchange/authentication, encryption, and implementation testing in the emulation environment.

More Details

Review of Authentication Strategies and Trends for Distributed Energy Resources (DERs)

Lai, Christine F.; Cordeiro, Patricia G.

More Details

General Requirements for Designing and Implementing a Cryptography Module for Distributed Energy Resource (DER) Systems

Baker, Roger J.; Cordeiro, Patricia G.; Hossain-McKenzie, Shamina S.; Howerter, Christopher M.; Jacobs, Nicholas J.; Jose, Deepu J.; Lai, Christine F.; Zhao, Jeffrey Z.

Penetration of distributed energy resources (DERs) is rapidly increasing in the bulk power system (BPS); they are growing to be a significant portion of generation. As such, grid-support capabilities are being developed and implemented. However, as their presence increases, the impact of DERs on the BPS also increases. Therefore, if a disturbance occurs in the DER system, its effects could propagate throughout the BPS. These disturbances could range from equipment malfunctions to resource variability to cyber attacks.

More Details

General Requirements for Designing and Implementing a Cryptography Module for Distributed Energy Resource (DER) Systems

Hossain-McKenzie, Shamina S.; Cordeiro, Patricia G.; Howerter, Christopher M.; Jacobs, Nicholas J.; Jose, Deepu J.; Lai, Christine F.; Zhao, Jeffrey Z.

Penetration of distributed energy resources (DERs) is rapidly increasing in the bulk power system (BPS); they are growing to be a significant portion of generation. As such, grid-support capabilities are being developed and implemented; IEEE Std. 1547 mandates new interconnection and interoperability standards to achieve these capabilities and allow remote users to change behaviors to many devices. However, as their presence increases, the impact of DERs on the BPS also increases. Therefore, if a disturbance occurs in the DER system, its effects could propagate throughout the BPS. These disturbances could range from equipment malfunctions to resource variability to cyber attacks. This document will discuss general requirements needed for developing a distributed cryptography module for implementation in DER systems. First, we will examine the composition of DER systems in Section 2. Procedures to identify critical assets and the security of DERs is discussed in Section 3. Section 4 introduces cryptography concepts and Section 5 discusses implementation needs and options. Finally, practical considerations are provided in Section 6 and conclusions are provided in Section 7.

More Details
13 Results
13 Results