Power System Communications & Cybersecurity Committee IEEE

IEEE PES GM 2017: Cybersecurity & Communications Talks, Tutorials, and Panels

Tutorial: Cybersecurity of the Electric Power Transmission and Distribution System

Date Thursday July 20, 8:00 am-5:00 pm
Price Early Bird $295, Regular $395; Student Early Bird $100, Student Regular $150
Instructors Dr. Murty V.V.S. Yalla, Beckwith Electric Co., Inc.; Steven A. Kunsman, ABB; Dr. Nathan Wallace, Ampirical; Scott R. Mix, NERC; J. Matt Cole, Sargent and Lundy

Cyber-attack on an Electric Power T&D communications system can have a devastating impact and cause widespread power outages as evident from the Dec 2015 cyber-attack on a Ukrainian Electric Power Distribution System. Securing Electric Power System from cyber-attacks is of national importance and in North America NERC is spearheading the effort in developing and enforcing Critical Infrastructure Protection (CIP) Standards for Bulk Electric System (BES). Local and state regulating agencies are also looking at cybersecurity of the Electric Power Distribution Systems. Substation protection, automation and control systems along with distribution field devices have changed significantly in the past decade. These systems have become more interconnected and provide end users with much more information to allow for higher reliability and greater levels of control. Interoperability between different vendor products and systems has been achieved using open standards. This change in technology has not only brought huge benefits from an operational point of view, it also permits to address cyber security issues similar to other traditional, enterprise systems which have been facing the same industry challenges for years.

The tutorial discusses cybersecurity basics including passwords & access management, authentication, encryption, network security monitoring, techniques in cyber alarming, logging, and auditing. The tutorial also covers NERC CIP requirements applicable to T&D systems along with brief overview of IEEE and IEC standards. Cybersecurity implementation examples of substation protection, automation and controls systems including devices inside as well as outside the substations are also discussed. Utility perspective on Cybersecurity and NERC CIP compliance will be included.

Poster Session

Monday, July 17th 5:00 PM – 8:00 PM   Power System Communications & Cyber Security Poster Session (Poster Session) (Power Systems Communications & Cyber Security) (Maria Proetto) ()            S-Riverwalk AB

15PESGM227-Data Integrity Attack on Consensus-based Distributed Energy Management Algorithm
15PESGM261-A Time Synchronization Method of Power Grid Based on TD – LTE Frame Synchronization
15PESGM290-Direct Cyber-Power Interdependency Study on Microgrid Control
15PESGM312-iPaCS: An integrative Power and Cyber Systems Co-simulation Framework for Smart Grid
15PESGM347-Realistic Measurement Protection Schemes Against False Data Injection Attacks on State Estimators
15PESGM560-False Data Injection Attacks Targeting DC Model-Based State Estimation
15PESGM565-Composite FDIA and Topology Attack on the Electricity Market
15PESGM592-An Active Security Defense Strategy for Wind Farm Based on Automated Decision
15PESGM609-Ontology-based Approach for Malicious Behaviour Detection in Synchrophasor Networks
15PESGM735-False Data Injection Attack in Smart Grid Topology Control: Vulnerability and Countermeasure
15PESGM757-Simulation of a RTU Cyber Attack on a Transformer Bank
15PESGM1021-On Detecting False Data Injection with Limited Network Information using Transformation based Statistical Techniques
15PESGM1215-OPNET based Simulation Modeling and Analysis of DoS Attack for Digital Substation
15PESGM1407-IEC 61850 Substation Configuration Language as a basis for Automated Security and SDN Configuration
15PESGM1410-Preventive Defensive Strategies for Power Systems under Persistent Malicious Cyberattacks
15PESGM1440-A Recursive State Estimation Approach to Mitigate False Data Injection Attacks in Power Systems
15PESGM1586-Modernizing Wide-Area Grid Communications for Distributed Energy Resource Applications using MQTT Publish-Subscribe Protocol
15PESGM1710-Model based Intrusion Detection System for Synchrophasor Applications in Smart Grid
15PESGM1870-An Integrated Anomaly Detection Method for Load Forecasting Data under Cyberattacks
15PESGM1915-A Framework for Modeling Load Redistribution Attacks Coordinating with Switching Attacks
15PESGM2209-Towards Attack-Resilient Communications for Smart Grids with Software-Defined Networking

Transactions Paper Session

Tuesday, July 18th, 8:00 AM-10:00 AM  Power System Communications & Cyber Security Transactions Paper Session, G-306 Tiered Classroom

17PESGM0282-Dependency Analysis and Improved Parameter Estimation for Dynamic Composite Load Modeling
17PESGM0297-Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation
17PESGM0334-Multidimensional Intrusion Detection System for IEC 61850 based SCADA Networks
17PESGM0406-Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks
17PESGM0486-A Novel Method for Phasor Measurement Unit Sampling Time Error Compensation
17PESGM1144-Overcoming Communication Delays in Distributed Frequency Regulation
17PESGM1218-Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes
17PESGM1845-Enabling Resilient Microgrid through Programmable Network
17PESGM2074-Actively Calibrated Line Mountable Capacitive Voltage Transducer For Power Systems Applications
17PESGM0520-Utilization of Chip-Scale Atomic Clock for Synchrophasor Measurements

Panel Session

Tuesday, July 18 1:00 PM-5:00 PM S-Sheraton II
Summary:      Cyber and Physical Security NERC requirements and standards for Cyber and Physical security in the Bulk Electric System. IEEE PES collaboration with DOE, NERC, and FERC in developing reliability standards and policy. Recent changes to cyber and physical security requirements. Best practices for cyber and physical security in electric power systems.
17PESGM3121-Perspectives from the Field – Practical Approaches to Security Operations in the Utility
17PESGM3122-Developing a Culture of Cyber Security
17PESGM3123-Understanding Design, Installation, and Testing Methods That Promote Substation IED Resiliency for High-Altitude Electromagnetic Pulse Events
17PESGM3124-Differences between “Hardware Defined Networks” (HDN) and “Software Defined Networks” (SDN) and the impacts to Securing SCADA Networks
17PESGM3125-Research initiatives in progress in the Cyber Resilient Energy Delivery Consortium (CREDC),
17PESGM3126-Critical Infrastructure Security: The convergence of cyber and physical security for OT risk reduction

 

Security Analysis and Control of Cyber-Physical Systems(CPS)
Time:  Thursday, July 20, 2017 1:00 PM-5:00 PM
Room: S-Chicago IX
Committee:    Power Systems Communications & Cyber Security
Summary:      The physical power system increasingly relies on the ICT infrastructure (the cyber system) for monitoring, control and optimal operation. Failures in the cyber system can have very large impact on the security and stability of physical power system. Security analysis and control of power systems should therefore incorporate such failures. The integrated cyber-physical system (CPS) is complex, featuring stochastic behavior and a mixture of discrete events and continuous processes. Currently, there is no comprehensive methodology to analyze the security status and generate control strategies for integrated cyber-physical power system, but novel analytical approaches are emerging. This panel will discuss the challenges involved in security analysis and control of CPSs. The panelists will share their experiences in security indices, security evaluation methods, control strategy decision-makings approaches, etc., for various cyber-physical sub-systems in the power grid.
17PESGM3118-Continuous Monitoring of Grid Structure With SCADA Voltages:Scientific Basis and Practical Implications
17PESGM3115-Cyber-resilient remedial action schemes to manage wind curtailment: Designing RAS control fault-tolerant using distributed computing
17PESGM3117-Assessing the impact of uncertainty on Demand Response Aggregation System
17PESGM3119-General State Estimation and Load Flow Hybrid Method for Power System Control Center
17PESGM3116-Cyber-Physical Power System Modeling and Security Assessment

Lessons Learned from Cyber Attack Incidents and How to Mitigate them?
Time: Thursday, July 20, 2017 3:00 PM-5:00 PM
Room: S-Arkansas
Committee: (AMPS) Computer Analytical Methods
Summary: The focus of this panel is to share knowledge and discuss the following issues in cyber security of the power grid: (i) growing number and sophistication of cyber attacks targeted towards energy delivery systems around the world; (ii) case studies of recent attacks on power systems and lessons learned from these incidents; (iii) R&D experiences and best practices to improve the security of the modern power grid. The panel will have experts drawn from academia, national lab, and industry.
17PESGM2427-Cyber security of energy delivery system: A research center experience
17PESGM2430-Cybersecurity lessons learned and best practices
17PESGM2431-Security and resiliency challenges for modern grid
17PESGM2432-Recent cyber incidents on energy infrastructure and potential mitigations
17PESGM2428-Cyber security testbed experimentations
17PESGM2429-Resiliency for smart grid