www.osti.gov Open in urlscan Pro
192.107.175.222  Public Scan

Submitted URL: https://www.osti.gov/servlets/purl/1763654
Effective URL: https://www.osti.gov/biblio/1763654
Submission: On October 25 via manual from PL — Scanned from DE

Form analysis 2 forms found in the DOM

POST /search

<form action="/search" id="search_form" class="pure-form" method="POST" autocomplete="off">
  <input type="hidden" id="index_search_act" name="act" value="act">
  <input type="hidden" id="index_search_rows" name="rows" value="">
  <input type="hidden" id="index_search_page" name="page" value="">
  <input type="hidden" id="index_search_sort" name="sort" value="">
  <input type="hidden" id="search_journal_type" name="journal_type" value="">
  <input type="hidden" id="search_data_type" name="data_type" value="">
  <input type="hidden" id="search_availability" name="availability" value="">
  <div style="padding: 0.7em 0 0.5em;">
    <div class="row">
      <div class="col-11">
        <div style="position:relative;">
          <label class="sr-only" for="search_search">Search terms:</label>
          <input class="pure-input-1" id="search_search" type="text" name="search" value="" placeholder="Search 3+ million Department of Energy research results">
          <button type="button" class="close-advformoptions" aria-hidden="true" title="Advanced search options"
            style="position: absolute; top: 7px; right: 5px; z-index: 2;cursor: pointer; background: transparent; border: 0; color:#7cb342; font-size: 1.3rem; margin-top: -0.15rem;"><span class="fa fa-caret-down"></span><span class="sr-only">Advanced
              search options</span></button>
          <div id="adv-search" style="background-color:#f9f9f9; border:1px solid #444; padding:20px; position:absolute; left:0; right: 0; top: 38px; display:none; z-index:2000;">
            <fieldset class="small" style="padding-bottom:0;">
              <legend style="padding:0px; margin-bottom:1em;">
                <div class="pull-right">
                </div> Advanced Search Options<small style="display:block;color:#999;">Advanced Search queries use a traditional Term Search. For more info, see our <a href="/faqs#faq-270584">FAQ</a>.</small>
              </legend>
              <div class="adv_search-row">
                <label for="search_term">All Fields: </label>
                <input class="pure-input-1" type="text" name="term" id="search_term" value="">
              </div>
              <div class="adv_search-row">
                <label for="search_title">Title: </label>
                <input class="pure-input-1" type="text" name="title" id="search_title" value="">
              </div>
              <div class="adv_search-row">
                <label for="search_creators">Author / Contributor: </label>
                <input class="pure-input-1" type="text" name="creators" id="search_creators" value="">
              </div>
              <div class="adv_search-row">
                <label for="search_doi">Digital Object Identifier (DOI): </label>
                <input class="pure-input-1" type="text" name="doi" id="search_doi" value="">
              </div>
              <div class="adv_search-row">
                <label for="search_idnos">Identifier Numbers: </label>
                <input class="pure-input-1" type="text" name="idnos" id="search_idnos" value="">
              </div>
              <div class="adv_search-row">
                <label for="search_pubd_from">Publication Date: </label>
                <div style="/* white-space: nowrap; */">
                  <input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_pubd_from" name="pubd_from" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
                    placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
                  <label for="search_pubd_until" style="margin-right:0.5rem; margin-left:0.5rem;">to</label>
                  <input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_pubd_until" name="pubd_until" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
                    placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
                </div>
              </div>
            </fieldset>
            <fieldset class="small" style="padding-bottom:0; margin-top:20px;">
              <legend style="padding:0px; margin-bottom:1em;"><a href="#" id="search_search-moreoptions"><span id="more-options-indicator" class="fa fa-plus-squared-alt"></span> More Options ...</a></legend>
              <div id="more-options-container" class="hidden">
                <div class="adv_search-row">
                  <label for="search_fulltext">Full Text: </label>
                  <input class="pure-input-1" type="text" name="fulltext" id="search_fulltext" value="">
                </div>
                <div class="adv_search-row">
                  <label for="search_product_type">Resource Type: </label>
                  <div style="position:relative;" data-jq-dropdown="#product_type_dropdown">
                    <input class="pure-input-1" type="text" name="product_type" id="search_product_type" value="" style="-webkit-user-select: none; -moz-user-select: none; -ms-user-select: none; user-select: none;">
                    <span style="position: absolute; top: 8px; right: 10px; z-index: 2;cursor: pointer; background: transparent; border: 0; color:#7cb342;"><span class="fa fa-caret-down"></span></span>
                  </div>
                  <div style="position:relative;">
                    <div id="product_type_dropdown" class="jq-dropdown jq-dropdown-tip jq-dropdown-relative" style="width:100%;">
                      <div class="jq-dropdown-panel">
                        <div class="row" style="display:flex;">
                          <div class="col-lg-6 col-md-12 jqd-col">
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Journal Article <input type="checkbox" name="product_type_option" title="Journal Article" value="Journal Article">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Technical Report <input type="checkbox" name="product_type_option" title="Technical Report" value="Technical Report">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox">Data <input type="checkbox" name="product_type_option" title="Data" value="Data">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox">Software <input type="checkbox" name="product_type_option" title="Software" value="Software">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox">Patent <input type="checkbox" name="product_type_option" title="Patent" value="Patent">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Conference / Event <input type="checkbox" name="product_type_option" title="Conference / Event" value="Conference">
                              <div class="control-indicator"></div>
                            </label>
                          </div>
                          <div class="col-lg-6 col-md-12 jqd-col">
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Book / Monograph <input type="checkbox" name="product_type_option" title="Book / Monograph" value="Book">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Program Document <input type="checkbox" name="product_type_option" title="Program Document" value="Program Document">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Thesis / Dissertation <input type="checkbox" name="product_type_option" title="Thesis / Dissertation" value="Thesis/Dissertation">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox">Video / Audio <input type="checkbox" name="product_type_option" title="Video / Audio" value="Multimedia">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox">Miscellaneous <input type="checkbox" name="product_type_option" title="Miscellaneous" value="Miscellaneous">
                              <div class="control-indicator"></div>
                            </label>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div>
                <div class="adv_search-row">
                  <label for="search_subject">Subject: </label>
                  <input class="pure-input-1" type="text" name="subject" id="search_subject" value="">
                </div>
                <div class="adv_search-row">
                  <label for="search_site_code">Site: </label>
                  <select class="pure-input-1" name="site_code" id="search_site_code">
                    <option value="">All</option>
                  </select>
                </div>
                <div class="adv_search-row">
                  <label for="search_research_org">Research Org: </label>
                  <input class="pure-input-1" type="text" name="research_org" id="search_research_org" value="">
                </div>
                <div class="adv_search-row">
                  <label for="search_sponsor_org">Sponsoring Org: </label>
                  <input class="pure-input-1" type="text" name="sponsor_org" id="search_sponsor_org" value="">
                </div>
                <div class="adv_search-row">
                  <label for="search_updd_from">Update Date: </label>
                  <div style="/* white-space: nowrap; */">
                    <input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_updd_from" name="updd_from" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
                      placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
                    <label for="search_updd_until" style="margin-right:0.5rem; margin-left:0.5rem;">to</label>
                    <input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_updd_until" name="updd_until" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
                      placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
                  </div>
                </div>
                <div class="adv_search-row">
                  <label class="control control-checkbox">Limit to INIS / NSA records only <input type="checkbox" id="search_inis_nsa" name="inis_nsa" title="Limit to INIS / NSA records only" value="true">
                    <div class="control-indicator"></div>
                  </label>
                </div>
                <div class="adv_search-row">
                  <label class="control control-checkbox">Limit to Nobel Prize winning researchers only <input type="checkbox" id="search_nobel" name="nobel" title="Limit to Nobel Prize winning researchers only" value="true">
                    <div class="control-indicator"></div>
                  </label>
                </div>
                <hr>
              </div>
            </fieldset>
            <div class="text-right">
              <button type="submit" class="pure-button button-success" style="margin: 1px; margin-left: 5px; padding:0.5em 0.9em;"><span class="fa fa-search"></span> Search</button>
            </div>
          </div>
        </div>
      </div>
      <div class="col-1">
        <button type="submit" class="pure-input-1 pure-button button-search" id="search_submit" aria-hidden="true" title="Submit"><span class="fa fa-search"></span><span class="sr-only">Submit</span></button>
      </div>
    </div>
  </div>
</form>

POST /search

<form action="/search" id="state_form" method="POST" autocomplete="off">
  <input type="hidden" id="state_act" name="act" value="act">
  <input type="hidden" id="state_rows" name="rows" value="10">
  <input type="hidden" id="state_page" name="page" value="">
  <input type="hidden" id="state_sort" name="sort" value="">
  <input type="hidden" id="state_return_type" name="return_type" value="">
  <input type="hidden" id="state_search" name="search" value="">
  <input type="hidden" id="state_term" name="term" value="">
  <input type="hidden" id="state_title" name="title" value="">
  <input type="hidden" id="state_creators" name="creators" value="">
  <input type="hidden" id="state_doi" name="doi" value="">
  <input type="hidden" id="state_idnos" name="idnos" value="">
  <input type="hidden" id="state_pubd_from" name="pubd_from" value="">
  <input type="hidden" id="state_pubd_until" name="pubd_until" value="">
  <input type="hidden" id="state_fulltext" name="fulltext" value="">
  <input type="hidden" id="state_doe_contract_number" name="doe_contract_number" value="">
  <input type="hidden" id="state_product_type" name="product_type" value="">
  <input type="hidden" id="state_journal_type" name="journal_type" value="">
  <input type="hidden" id="state_data_type" name="data_type" value="">
  <input type="hidden" id="state_software_type" name="software_type" value="">
  <input type="hidden" id="state_software_license" name="software_license" value="">
  <input type="hidden" id="state_subject" name="subject" value="">
  <input type="hidden" id="state_site_code" name="site_code" value="">
  <input type="hidden" id="state_research_org" name="research_org" value="">
  <input type="hidden" id="state_sponsor_org" name="sponsor_org" value="">
  <input type="hidden" id="state_updd_from" name="updd_from" value="">
  <input type="hidden" id="state_updd_until" name="updd_until" value="">
  <input type="hidden" id="state_availability" name="availability" value="">
  <input type="hidden" id="state_inis_nsa" name="inis_nsa" value="">
  <input type="hidden" id="state_nobel" name="nobel" value="">
  <button type="submit" style="display:none;" aria-hidden="true" title="Submit">
  </button>
</form>

Text Content

skip to main content
 * Sign In
 * Create Account

Show search Show menu
U.S. Department of Energy
Office of Scientific and Technical Information
Search terms: Advanced search options

Advanced Search OptionsAdvanced Search queries use a traditional Term Search.
For more info, see our FAQ.
All Fields:
Title:
Author / Contributor:
Digital Object Identifier (DOI):
Identifier Numbers:
Publication Date:
to
More Options ...
Full Text:
Resource Type:

Journal Article

Technical Report

Data

Software

Patent

Conference / Event

Book / Monograph

Program Document

Thesis / Dissertation

Video / Audio

Miscellaneous

Subject:
Site: All
Research Org:
Sponsoring Org:
Update Date:
to
Limit to INIS / NSA records only

Limit to Nobel Prize winning researchers only


--------------------------------------------------------------------------------

Search
Submit

 * Submit Research Results
 * Search Tools
 * Public Access Policy
 * PIDs Services & Dev Tools
 * About
 * FAQs
 * News
 * 75th Anniversary
 * Sign In
 * Create Account

OSTI.GOV Journal Article: Cybersecurity Attacks in Vehicular Sensors


TITLE: CYBERSECURITY ATTACKS IN VEHICULAR SENSORS

 * Full Record
 * Other Related Research

×

You are accessing a document from the Department of Energy's (DOE) OSTI.GOV.
This site is a product of DOE's Office of Scientific and Technical Information
(OSTI) and is provided as a public service.

Visit OSTI to utilize additional information resources in energy science and
technology.


ABSTRACT

Today's modern vehicles contain anywhere from sixty to one-hundred sensors and
exhibit the characteristics of Cyber-Physical-Systems (CPS). There is a high
degree of coupling, cohesiveness, and interactions among vehicle's CPS
components (e.g., sensors, devices, systems, systems-of-systems) across sensing,
communication, and control layers. Cyber-attacks in the sensing or communication
layers can compromise the security of the control layer. This paper provides a
detailed review of potential cyber threats related to the sensing layer.
Notably, the focus is mainly towards two categories of sensors: vehicle dynamics
sensors (e.g., Tire Pressure Monitoring Systems (TPMS), magnetic encoders, and
inertial sensors) and environment sensors (e.g., Light Detection and Ranging
(LiDAR), ultrasonic, camera, Radio Detection and Ranging (Radar) systems, and
Global Positioning System (GPS) units). Furthermore, the paper also offers
perspectives through existing countermeasures from literature and stresses the
need for data-driven cybersecurity solutions.


Authors: El-Rewini, Zeinab  [1];
 * Search OSTI.GOV for author "El-Rewini, Zeinab"
 * Search OSTI.GOV for ORCID "0000-0002-7090-465X"
 * Search orcid.org for ORCID "0000-0002-7090-465X"

Sadatsharan, Karthikeyan [2]; Sugunaraj, Niroop  [3];
 * Search OSTI.GOV for author "Sugunaraj, Niroop"
 * Search OSTI.GOV for ORCID "0000-0002-6165-0862"
 * Search orcid.org for ORCID "0000-0002-6165-0862"

Selvaraj, Daisy Flora [4]; Plathottam, Siby Jose [5]; Ranganathan, Prakash  [1]
 * Search OSTI.GOV for author "Ranganathan, Prakash"
 * Search OSTI.GOV for ORCID "0000-0001-8638-660X"
 * Search orcid.org for ORCID "0000-0001-8638-660X"

--------------------------------------------------------------------------------

+ Show Author Affiliations
 1. Univ. of North Dakota, Grand Forks, ND (United States). Data, Energy, Cyber,
    and Systems (DECS) Lab.
 2. Honda Research and Development Americas, Raymond, OH (United States)
 3. Univ. of North Dakota, Grand Forks, ND (United States)
 4. Univ. of North Dakota, Grand Forks, ND (United States). Energy and
    Environmental Research Center
 5. Argonne National Lab. (ANL), Lemont, IL (United States)

Publication Date: 2020-06-22 Research Org.: Argonne National Lab. (ANL),
Argonne, IL (United States) Sponsoring Org.: USDOE OSTI Identifier: 1763654
Grant/Contract Number:   AC02-06CH11357 Resource Type: Journal Article: Accepted
Manuscript Journal Name: IEEE Sensors Journal Additional Journal Information:
Journal Volume: 20; Journal Issue: 22; Journal ID: ISSN 1530-437X Publisher:
IEEE Country of Publication: United States Language: English Subject: 97
MATHEMATICS AND COMPUTING; Cyber-attacks; environment sensors; sensing layer;
vehicle dynamics sensors; CPS; cohesiveness; systems-of-systems; sensing
communication; vehicle dynamics systems; tire pressure monitoring systems;
inertial sensors

--------------------------------------------------------------------------------


CITATION FORMATS

 * MLA
 * APA
 * Chicago
 * BibTeX

El-Rewini, Zeinab, Sadatsharan, Karthikeyan, Sugunaraj, Niroop, Selvaraj, Daisy
Flora, Plathottam, Siby Jose, and Ranganathan, Prakash. Cybersecurity Attacks in
Vehicular Sensors. United States: N. p., 2020. Web.
doi:10.1109/jsen.2020.3004275.
Copy to clipboard
El-Rewini, Zeinab, Sadatsharan, Karthikeyan, Sugunaraj, Niroop, Selvaraj, Daisy
Flora, Plathottam, Siby Jose, & Ranganathan, Prakash. Cybersecurity Attacks in
Vehicular Sensors. United States. https://doi.org/10.1109/jsen.2020.3004275
Copy to clipboard
El-Rewini, Zeinab, Sadatsharan, Karthikeyan, Sugunaraj, Niroop, Selvaraj, Daisy
Flora, Plathottam, Siby Jose, and Ranganathan, Prakash. 2020. "Cybersecurity
Attacks in Vehicular Sensors". United States.
https://doi.org/10.1109/jsen.2020.3004275.
https://www.osti.gov/servlets/purl/1763654.
Copy to clipboard
@article{osti_1763654,
title = {Cybersecurity Attacks in Vehicular Sensors},
author = {El-Rewini, Zeinab and Sadatsharan, Karthikeyan and Sugunaraj, Niroop
and Selvaraj, Daisy Flora and Plathottam, Siby Jose and Ranganathan, Prakash},
abstractNote = {Today's modern vehicles contain anywhere from sixty to
one-hundred sensors and exhibit the characteristics of Cyber-Physical-Systems
(CPS). There is a high degree of coupling, cohesiveness, and interactions among
vehicle's CPS components (e.g., sensors, devices, systems, systems-of-systems)
across sensing, communication, and control layers. Cyber-attacks in the sensing
or communication layers can compromise the security of the control layer. This
paper provides a detailed review of potential cyber threats related to the
sensing layer. Notably, the focus is mainly towards two categories of sensors:
vehicle dynamics sensors (e.g., Tire Pressure Monitoring Systems (TPMS),
magnetic encoders, and inertial sensors) and environment sensors (e.g., Light
Detection and Ranging (LiDAR), ultrasonic, camera, Radio Detection and Ranging
(Radar) systems, and Global Positioning System (GPS) units). Furthermore, the
paper also offers perspectives through existing countermeasures from literature
and stresses the need for data-driven cybersecurity solutions.},
doi = {10.1109/jsen.2020.3004275},
url = {https://www.osti.gov/biblio/1763654}, journal = {IEEE Sensors Journal},
issn = {1530-437X},
number = 22,
volume = 20,
place = {United States},
year = {2020},
month = {6}
}
Copy to clipboard

--------------------------------------------------------------------------------

Journal Article:
Free Publicly Available Full Text
Accepted Manuscript (DOE)
Publisher's Version of Record
https://doi.org/10.1109/jsen.2020.3004275
Copyright Statement
Other availability
Search WorldCat to find libraries that may hold this journal

--------------------------------------------------------------------------------

Save / Share:
Export Metadata
 * Endnote
 * RIS
 * CSV / Excel
 * XML
 * JSON

Save to My Library
You must Sign In or Create an Account in order to save documents to your
library.
 * Facebook
 * Twitter
 * Email
 * Print
 * More share options
    * LinkedIn
    * Pinterest
    * Tumblr

Similar records in OSTI.GOV collections:


 * CYBERSECURITY CHALLENGES IN VEHICULAR COMMUNICATIONS
   
   Journal Article El-Rewini, Zeinab; Sadatsharan, Karthikeyan; Selvaraj, Daisy;
   ... - Vehicular Communications
   As modern vehicles are capable to connect to an external infrastructure and
   Vehicle-to-Everything (V2X) communication technologies mature, the necessity
   to secure communications becomes apparent. There is a very real risk that
   today’s vehicles are subjected to cyber-attacks that target vehicular
   communications. This paper proposes a three-layer framework (sensing,
   communication and control) through which automotive security threats can be
   better understood. The sensing layer is made up of vehicle dynamics and
   environmental sensors, which are vulnerable to eavesdropping, jamming, and
   spoofing attacks. The communication layer is comprised of both in-vehicle and
   V2X communications and is susceptible to eavesdropping, spoofing,
   man-in-the-middle, andmore » sybil attacks. At the top of the hierarchy is
   the control layer, which enables autonomous vehicular functionality,
   including the automation of a vehicle’s speed, braking, and steering. Attacks
   targeting the sensing and communication layers can propagate upward and
   affect the functionality and can compromise the security of the control
   layer. This paper provides the state-of-the-art review on attacks and threats
   relevant to the communication layer and presents countermeasures.« less
    * https://doi.org/10.1016/j.vehcom.2019.100214
    * Full Text Available
   
   


 * CYBERSECURITY FOR DISTANCE RELAY PROTECTION
   
   Technical Report McDermott, Thomas; Doty, Jeffrey; O'Brien, James; ...
   This project is a DOE follow-up effort on the CREDC workshop held on
   September 13, 2018 in Cambridge, MA to discuss cybersecurity of distance
   relays, which considered the benefits, vulnerabilities and risk mitigations
   for the use of communication systems in power system protection. The
   objectives of this project are to define the taxonomy of relay protection and
   associated communications; define use cases describing approaches to reduce
   the cyber-attack surface on those protective relays; and evaluate the loss of
   operational functional capability from changes to communication coverage.
   Mitigating controls will also be evaluated to understand if there are other
   approaches tomore » reduce attack surfaces while maintaining communications
   or partial communications. Distance relays are used to protect transmission
   lines of approximately 10 to 300 miles in length, by detecting short circuits
   (i.e., faults) on the lines and then tripping circuit breakers in the
   substation. Such protection systems are a subset of the power system and they
   incorporate sensing, logic and communication functions. Protection system
   exposure to cyberattack could be drastically limited by disconnecting relays
   from all vulnerable communication systems, but this may adversely impact
   overall power system performance in the absence of cyberattack. This project
   began with a use case analysis of protection systems with communications, as
   summarized in this report. It continued with modeling, testing and evaluation
   in a miniature power system (MPS), located in the Western Area Power
   Administration (WAPA) Electric Power Training Center (EPTC). The project also
   incorporated feedback from two industry meetings held in February and
   September 2019. The suggested next steps account for and complement the work
   already underway with DOE/CESER funding: 1. Study the performance of LCD and
   PC vs. PUTT, which is less reliant on communication system performance and
   GPS timing references. The PUTT scheme could prove to be more resilient to
   cyberattack or communications-related disruption. It could also be more
   tolerant of message re-routing with SDN/SDR communication systems. On the
   other hand, it will be more vulnerable to false tripping during dynamic
   events or to loss of the voltage signal. The optimum choice of scheme may
   depend on the specific power system and risk assessment. This study could
   provide a new template for evaluation based on business functions. 2.
   Research and develop new methods to detect and monitor distributed physical
   attacks, possibly using drones, video sensors, thermal sensors, machine
   learning and other advanced techniques. This will help mitigate the impact of
   cyberattack on the protection system, and will also help mitigate the impact
   of wild fires. 3. Implement a scalable PKI for use in electric utility
   protection systems. This will encourage widespread adoption of secure
   authentication methods that are already available, but not widely used at
   present. This will help secure engineering access to the relays. 4.
   Investigate the use of SDN in combination with SDR to achieve better
   cybersecurity and electromagnetic security of the network, incorporating path
   variability. This would help secure both engineering access and peer-to-peer
   GOOSE messaging. 5. Perform additional testing, with operator evaluation of
   “red button” scenarios, PUTT vs. LCD, relay mis-operations, and other
   cyberattacks in the EPTC. This is an important advantage of testing in the
   EPTC rather than by computer simulation or even hardware-in-the-loop
   simulation; the EPTC is already dedicated to managing the situational
   awareness, operator response times and other human impacts. One of the
   project objectives was to settle on a common nomenclature for this problem
   space. We have concluded that the OSI layer model, supplemented by ANSI
   device numbers and other IEEE standards, is already well-accepted by the
   industry. The IEEE PSRC knowledge base provides a great deal of public
   information« less
    * https://doi.org/10.2172/1602545
    * Full Text Available
   
   


 * CYBERSECURITY FOR ELECTRIC VEHICLE CHARGING INFRASTRUCTURE.
   
   Technical Report Johnson, Jay; Anderson, Benjamin; Wright, Brian; ...
   As the U . S . electrifies the transportation sector, cyberattacks targeting
   vehicle charging could impact several critical infrastructure sectors
   including power systems, manufacturing, medical se rvices, and agriculture.
   This is a growing area of concern as charging stations increase power
   delivery capabilities and must communicate to authorize charging, sequence
   the charging process, and manage load (grid operators, vehicles, OEM vendors,
   charging network operators, etc.). The research challenges are numerous and
   complicated because there are many end users, stakeholders, and software and
   equipment vendors interests involved. Poorly implemented electric vehicle
   supply equipment (EVSE), electric veh icle (EV), or grid operatormore »
   communication systems could be a significant risk to EV adoption because the
   political, social, and financial impact of cyberattacks ? or public
   perception of such ? would ripple across the industry and produce lasting
   effects. Unfo rtunately, there is currently no comprehensive EVSE
   cybersecurity approach and limited best practices have been adopted by the
   EV/EVSE industry. There is an incomplete industry understanding of the attack
   surface, interconnected assets, and unsecured inter faces. C omprehensive
   cybersecurity recommendations founded on sound research are necessary to
   secure EV charging infrastructure. This project provided the power, security,
   and automotive industry with a strong technical basis for securing this
   infrastructu re by developing threat models, determining technology gaps, and
   identifying or developing effective countermeasures. Specifically, the team
   created a cybersecurity threat model and performed a technical risk
   assessment of EVSE assets across multiple manuf acturers and vendors , so
   that automotive, charging, and utility stakeholders could better protect
   customers, vehicles, and power systems in the face of new cyber
   threats.« less
    * https://doi.org/10.2172/1877784
    * Full Text Available
   
   


 * SECURITY VULNERABILITIES OF CONNECTED VEHICLE STREAMS AND THEIR IMPACT ON
   COOPERATIVE DRIVING
   
   Journal Article Amoozadeh, Mani; Raghuramu, Arun; Chuah, Chen-nee; ... - IEEE
   Communications Magazine
   Autonomous vehicles capable of navigating unpredictable real-world
   environments with little human feedback are a reality today. Such systems
   rely heavily on onboard sensors such as cameras, radar/LIDAR, and GPS as well
   as capabilities such as 3G/4G connectivity and V2V/V2I communication to make
   real-time maneuvering decisions. Autonomous vehicle control imposes very
   strict requirements on the security of the communication channels used by the
   vehicle to exchange information as well as the control logic that performs
   complex driving tasks such as adapting vehicle velocity or changing lanes.
   This research presents a first look at the effects of security attacks on the
   communicationmore » channel as well as sensor tampering of a connected
   vehicle stream equipped to achieve CACC. Our simulation results show that an
   insider attack can cause significant instability in the CACC vehicle stream.
   We also outline how different countermeasures, such as downgrading to ACC
   mode, could potentially be used to improve the security and safety of the
   connected vehicle streams.« less
   Cited by 75
    * https://doi.org/10.1109/MCOM.2015.7120028
    * Full Text Available
   
   


 * FACILITY CYBERSECURITY FRAMEWORK BEST PRACTICES
   
   Technical Report Gourisetti, Sri Nikhil; Reeve, Hayden; Rotondo, Julia; ...
   Federal facilities are increasingly adopting automation and connecting to the
   Internet creating an energy-internet-of-things environment that converges
   operational technology (OT) and information technology (IT). Today's
   buildings increasingly weave together networked sensors and cyber and
   physical systems that enable data to be collected, aggregated, exchanged,
   stored and monetized in new ways. Building technological advances have
   created new energy technology, services, markets and value creation
   opportunities (e.g. transactive energy, two-way grid communications, machine
   learning, and increased use of renewable and distributed energy resources).
   But as larger data sets are being exchanged at faster speeds between an
   increasing number of OT systems, itmore » becomes more difficult to protect
   the security of the data lifecycle and the physical equipment it interacts
   with. These challenges are especially difficult to overcome because the
   economic and environmental gain (interoperability, big data, social networks
   and ubiquitous information sharing) are driving these prominent trends in the
   digital age. Often cybersecurity is an afterthought. The U.S. Department of
   Energy’s (DOE) Federal Energy Management Program (FEMP) funded the Pacific
   Northwest National Laboratory (PNNL) to develop various cybersecurity tools,
   trainings, and reports to aid federal facility managers – and other building
   owners and operators – in better applying frameworks and lessons learned from
   the National Institute of Standards and Technology (NIST) Cybersecurity
   Framework (CSF), risk management framework (RMF), DOE’s cybersecurity
   capability maturity model (C2M2), and a wide variety of industry best
   practices and guidance documents (i.e., NIST 800 series, Department of
   Defense United Facilities Criteria). This set of tools, collectively known as
   the FEMP Facility-Related Control System Cyber Toolkit (FRCS Cyber Toolkit)2,
   is focused on cybersecurity concerns from facility-related control systems
   and other operational technology (OT), such as industrial control systems
   (ICS). The FRCS Cyber Toolkit can be applied across six of the sixteen
   critical infrastructure sectors designated by the Department of Homeland
   Security, including government facilities, healthcare and public health,
   commercial facilities (e.g., public assembly, offices, lodging), financial
   services (e.g., banking and insurance), emergency services (e.g., fire and
   police stations), and information technology. With increasingly converged IT
   and OT systems, it is crucial to address OT cybersecurity considerations and
   assess how the seam of these two systems could impact the overall
   cybersecurity posture of a facility. The objective of this report is to
   provide an overview of the best possible method to use FRCS Cyber Toolkit
   (section 2.0) and distilled cybersecurity best practices for the federal
   facilities to address growing non-linear cyber threats (section 3.0).
   Recommendations in this document are aggregated from several NIST and other
   documents (see Appendix A for additional details).« less
    * https://doi.org/10.2172/1660771
    * Full Text Available
   
   

 * Similar Records

--------------------------------------------------------------------------------

 * 
 * 
 * 

 * Website Policies / Important Links
 * Contact Us
 * 
 * Vulnerability Disclosure Program
 * 
 * Facebook
 * Twitter
 * YouTube