Adrian Chavez
YOU?
Author Swipe
View article: Design Principles and Experimental Analysis of Secure Data Exchange Approaches for Distributed Cyber-Physical Sensors in Electric Grid Systems
Design Principles and Experimental Analysis of Secure Data Exchange Approaches for Distributed Cyber-Physical Sensors in Electric Grid Systems Open
Critical infrastructure systems such as the electric grid are increasingly cyber-physical, where communication and control are tightly intertwined with the physics-based processes of power flow. To ensure safe and resilient operation of th…
View article: Design for Secure and Resilient Data Exchange Across DistributedCyber-Physical Sensors and Analytics in Decentralized Energy Systems
Design for Secure and Resilient Data Exchange Across DistributedCyber-Physical Sensors and Analytics in Decentralized Energy Systems Open
Resilience of power systems requires mutualistically supported survivability characteristics of their cyber, physical, and cyber-physical networks. These networks of electrical and communication exchange, and their successful and reliable …
View article: Cyber and Physical Security Analysis of GSI and Noventum Application for IoT Communications
Cyber and Physical Security Analysis of GSI and Noventum Application for IoT Communications Open
We present our findings of the red team exercise conducted on the device and application developed by Guardian Sensors, Inc. (GSI) and Noventum. The app is used for situational awareness and control of photovoltaics (PV) and microgrid ener…
View article: Active High Assurance Authentication Protocol (AHAAP)
Active High Assurance Authentication Protocol (AHAAP) Open
The AHAAP Maturation Project involves maturation and evaluation of a patented zero-trust tamper-resistant high-assurance session-less dynamic and active device authentication protocol that simultaneously authenticates identity and provides…
View article: Considerations for Secure Data Exchange to Achieve Cyber-Physical Situational Awareness in the Electric Grid
Considerations for Secure Data Exchange to Achieve Cyber-Physical Situational Awareness in the Electric Grid Open
Cyber-physical situational awareness (CPSA) is crucial for understanding the intricacies and relationships within the interconnected electric grid, especially with increasing distributed energy resource penetration. However, beyond develop…
View article: Dynamic defense and network randomization for computer systems
Dynamic defense and network randomization for computer systems Open
The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning al…
View article: Real-time software upgrade
Real-time software upgrade Open
The various technologies presented herein relate to upgrading industrial control software in real-time. During utilization of a first software to control an industrial process, a determination can be made that the first software needs to b…
View article: Noise-Immune Machine Learning and Autonomous Grid Control
Noise-Immune Machine Learning and Autonomous Grid Control Open
Most recently, stochastic control methods such as deep reinforcement learning (DRL) have proven to be efficient and quick converging methods in providing localized grid voltage control. Because of the random dynamical characteristics of gr…
View article: Networked Microgrid Cybersecurity Architecture Design Guide: A New Jersey TRANSITGRID Use Case
Networked Microgrid Cybersecurity Architecture Design Guide: A New Jersey TRANSITGRID Use Case Open
Microgrids require reliable communication systems for equipment control, power delivery optimization, and operational visibility. To maintain secure communications, Microgrid Operational Technology (OT) networks must be defensible and cybe…
View article: Efficient DER Voltage Control Using Ensemble Deep Reinforcement Learning
Efficient DER Voltage Control Using Ensemble Deep Reinforcement Learning Open
To meet the challenges oflow-carbon power generation, distributed energy resources (DERs) such as solar and wind power generators are now widely integrated into the power grid. Because of the autonomous nature of DERs, ensuring properly re…
View article: Securing Inverter Communication: Proactive Intrusion Detection and Mitigation System to Tap, Analyze, and Act
Securing Inverter Communication: Proactive Intrusion Detection and Mitigation System to Tap, Analyze, and Act Open
The electric grid has undergone rapid, revolutionary changes in recent years; from the addition of advanced smart technologies to the growing penetration of distributed energy resources (DERs) to increased interconnectivity and communicati…
View article: Software-defined Networking for Energy Delivery Systems (SDN4EDS): An Architectural Blueprint (Final Report)
Software-defined Networking for Energy Delivery Systems (SDN4EDS): An Architectural Blueprint (Final Report) Open
This is the initial version of a reference for suppliers and energy companies of all sizes to deploy networks based on software-defined networking technology (SDN) to improve reliability, reduce cyber security attack surface, and facilitat…
View article: Software-defined Networking for Energy Delivery Systems (SDN4EDS): An Architectural Blueprint (Final Summary Report)
Software-defined Networking for Energy Delivery Systems (SDN4EDS): An Architectural Blueprint (Final Summary Report) Open
This is the initial version of a reference for suppliers and energy companies of all sizes to deploy networks based on software-defined networking technology (SDN) to improve reliability, reduce cyber security attack surface, and facilitat…
View article: Design Considerations for Distributed Energy Resource Honeypots and Canaries
Design Considerations for Distributed Energy Resource Honeypots and Canaries Open
There are now over 2.5 million Distributed Energy Resource (DER) installations connected to the U.S. power system. These installations represent a major portion of American electricity critical infrastructure and a cyberattack on these ass…
View article: Named Data Networking for DER Cybersecurity
Named Data Networking for DER Cybersecurity Open
We present our research findings on the novel NDN protocol. In this work, we defined key attack scenarios for possible exploitation and detail software security testing procedures to evaluate the security of the NDN software. This work was…
View article: Unsupervised Online Anomaly Detection to Identify Cyber-Attacks on Internet Connected Photovoltaic System Inverters
Unsupervised Online Anomaly Detection to Identify Cyber-Attacks on Internet Connected Photovoltaic System Inverters Open
Often machine learning applications rely on batch learning for training, but a complete set of network communications data may not be readily available. Therefore, this work evaluates the potential for an online learning and detection meth…
View article: Proactive Intrusion Detection and Mitigation System: Case Study on Packet Replay Attacks in Distributed Energy Resource Systems
Proactive Intrusion Detection and Mitigation System: Case Study on Packet Replay Attacks in Distributed Energy Resource Systems Open
The electric grid is rapidly being modernized with novel technologies, adaptive and automated grid-support functions, and added connectivity with internet-based communications and remote interfaces. These advancements render the grid incre…
View article: Review of Intrusion Detection Methods and Tools for Distributed Energy Resources
Review of Intrusion Detection Methods and Tools for Distributed Energy Resources Open
Recent trends in the growth of distributed energy resources (DER) in the electric grid and newfound malware frameworks that target internet of things (IoT) devices is driving an urgent need for more reliable and effective methods for intru…
View article: Cybersecurity of Networked Microgrids: Challenges Potential Solutions and Future Directions
Cybersecurity of Networked Microgrids: Challenges Potential Solutions and Future Directions Open
Networked microgrids are clusters of geographically-close, islanded microgrids that can function as a single, aggregate island. This flexibility enables customer-level resilience and reliability improvements during extreme event outages an…
View article: Implementation of Intrusion Detection Methods for Distributed Photovoltaic Inverters at the Grid-Edge
Implementation of Intrusion Detection Methods for Distributed Photovoltaic Inverters at the Grid-Edge Open
Reducing the risk of cyber-attacks that affect the confidentiality, integrity, and availability of distributed Photovoltaic (PV) inverters requires the implementation of an Intrusion Detection System (IDS) at the grid-edge. Often, IDSs use…
View article: Cyber-Physical Observability for the Electric Grid
Cyber-Physical Observability for the Electric Grid Open
The penetration of Internet-of-Things (IoT) devices in the electric grid is growing at a rapid pace; from smart meters at residential homes to distributed energy resource (DER) system technologies such as smart inverters, various devices a…
View article: Alliance Project: Secure Control Systems for the Energy Sector
Alliance Project: Secure Control Systems for the Energy Sector Open
The Alliance Project addresses Area of Interest 4: Secure Remote Access for the Energy Sector, by combining physical and cyber access under one cybersecurity access system. The Alliance Project built on the successful completion of the Lem…