www.osti.gov
Open in
urlscan Pro
192.107.175.222
Public Scan
Submitted URL: https://www.osti.gov/servlets/purl/1763654
Effective URL: https://www.osti.gov/biblio/1763654
Submission: On October 25 via manual from PL — Scanned from DE
Effective URL: https://www.osti.gov/biblio/1763654
Submission: On October 25 via manual from PL — Scanned from DE
Form analysis
2 forms found in the DOMPOST /search
<form action="/search" id="search_form" class="pure-form" method="POST" autocomplete="off">
<input type="hidden" id="index_search_act" name="act" value="act">
<input type="hidden" id="index_search_rows" name="rows" value="">
<input type="hidden" id="index_search_page" name="page" value="">
<input type="hidden" id="index_search_sort" name="sort" value="">
<input type="hidden" id="search_journal_type" name="journal_type" value="">
<input type="hidden" id="search_data_type" name="data_type" value="">
<input type="hidden" id="search_availability" name="availability" value="">
<div style="padding: 0.7em 0 0.5em;">
<div class="row">
<div class="col-11">
<div style="position:relative;">
<label class="sr-only" for="search_search">Search terms:</label>
<input class="pure-input-1" id="search_search" type="text" name="search" value="" placeholder="Search 3+ million Department of Energy research results">
<button type="button" class="close-advformoptions" aria-hidden="true" title="Advanced search options"
style="position: absolute; top: 7px; right: 5px; z-index: 2;cursor: pointer; background: transparent; border: 0; color:#7cb342; font-size: 1.3rem; margin-top: -0.15rem;"><span class="fa fa-caret-down"></span><span class="sr-only">Advanced
search options</span></button>
<div id="adv-search" style="background-color:#f9f9f9; border:1px solid #444; padding:20px; position:absolute; left:0; right: 0; top: 38px; display:none; z-index:2000;">
<fieldset class="small" style="padding-bottom:0;">
<legend style="padding:0px; margin-bottom:1em;">
<div class="pull-right">
</div> Advanced Search Options<small style="display:block;color:#999;">Advanced Search queries use a traditional Term Search. For more info, see our <a href="/faqs#faq-270584">FAQ</a>.</small>
</legend>
<div class="adv_search-row">
<label for="search_term">All Fields: </label>
<input class="pure-input-1" type="text" name="term" id="search_term" value="">
</div>
<div class="adv_search-row">
<label for="search_title">Title: </label>
<input class="pure-input-1" type="text" name="title" id="search_title" value="">
</div>
<div class="adv_search-row">
<label for="search_creators">Author / Contributor: </label>
<input class="pure-input-1" type="text" name="creators" id="search_creators" value="">
</div>
<div class="adv_search-row">
<label for="search_doi">Digital Object Identifier (DOI): </label>
<input class="pure-input-1" type="text" name="doi" id="search_doi" value="">
</div>
<div class="adv_search-row">
<label for="search_idnos">Identifier Numbers: </label>
<input class="pure-input-1" type="text" name="idnos" id="search_idnos" value="">
</div>
<div class="adv_search-row">
<label for="search_pubd_from">Publication Date: </label>
<div style="/* white-space: nowrap; */">
<input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_pubd_from" name="pubd_from" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
<label for="search_pubd_until" style="margin-right:0.5rem; margin-left:0.5rem;">to</label>
<input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_pubd_until" name="pubd_until" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
</div>
</div>
</fieldset>
<fieldset class="small" style="padding-bottom:0; margin-top:20px;">
<legend style="padding:0px; margin-bottom:1em;"><a href="#" id="search_search-moreoptions"><span id="more-options-indicator" class="fa fa-plus-squared-alt"></span> More Options ...</a></legend>
<div id="more-options-container" class="hidden">
<div class="adv_search-row">
<label for="search_fulltext">Full Text: </label>
<input class="pure-input-1" type="text" name="fulltext" id="search_fulltext" value="">
</div>
<div class="adv_search-row">
<label for="search_product_type">Resource Type: </label>
<div style="position:relative;" data-jq-dropdown="#product_type_dropdown">
<input class="pure-input-1" type="text" name="product_type" id="search_product_type" value="" style="-webkit-user-select: none; -moz-user-select: none; -ms-user-select: none; user-select: none;">
<span style="position: absolute; top: 8px; right: 10px; z-index: 2;cursor: pointer; background: transparent; border: 0; color:#7cb342;"><span class="fa fa-caret-down"></span></span>
</div>
<div style="position:relative;">
<div id="product_type_dropdown" class="jq-dropdown jq-dropdown-tip jq-dropdown-relative" style="width:100%;">
<div class="jq-dropdown-panel">
<div class="row" style="display:flex;">
<div class="col-lg-6 col-md-12 jqd-col">
<label class="facet-item control control-checkbox" style="white-space: nowrap;">Journal Article <input type="checkbox" name="product_type_option" title="Journal Article" value="Journal Article">
<div class="control-indicator"></div>
</label>
<label class="facet-item control control-checkbox" style="white-space: nowrap;">Technical Report <input type="checkbox" name="product_type_option" title="Technical Report" value="Technical Report">
<div class="control-indicator"></div>
</label>
<label class="facet-item control control-checkbox">Data <input type="checkbox" name="product_type_option" title="Data" value="Data">
<div class="control-indicator"></div>
</label>
<label class="facet-item control control-checkbox">Software <input type="checkbox" name="product_type_option" title="Software" value="Software">
<div class="control-indicator"></div>
</label>
<label class="facet-item control control-checkbox">Patent <input type="checkbox" name="product_type_option" title="Patent" value="Patent">
<div class="control-indicator"></div>
</label>
<label class="facet-item control control-checkbox" style="white-space: nowrap;">Conference / Event <input type="checkbox" name="product_type_option" title="Conference / Event" value="Conference">
<div class="control-indicator"></div>
</label>
</div>
<div class="col-lg-6 col-md-12 jqd-col">
<label class="facet-item control control-checkbox" style="white-space: nowrap;">Book / Monograph <input type="checkbox" name="product_type_option" title="Book / Monograph" value="Book">
<div class="control-indicator"></div>
</label>
<label class="facet-item control control-checkbox" style="white-space: nowrap;">Program Document <input type="checkbox" name="product_type_option" title="Program Document" value="Program Document">
<div class="control-indicator"></div>
</label>
<label class="facet-item control control-checkbox" style="white-space: nowrap;">Thesis / Dissertation <input type="checkbox" name="product_type_option" title="Thesis / Dissertation" value="Thesis/Dissertation">
<div class="control-indicator"></div>
</label>
<label class="facet-item control control-checkbox">Video / Audio <input type="checkbox" name="product_type_option" title="Video / Audio" value="Multimedia">
<div class="control-indicator"></div>
</label>
<label class="facet-item control control-checkbox">Miscellaneous <input type="checkbox" name="product_type_option" title="Miscellaneous" value="Miscellaneous">
<div class="control-indicator"></div>
</label>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="adv_search-row">
<label for="search_subject">Subject: </label>
<input class="pure-input-1" type="text" name="subject" id="search_subject" value="">
</div>
<div class="adv_search-row">
<label for="search_site_code">Site: </label>
<select class="pure-input-1" name="site_code" id="search_site_code">
<option value="">All</option>
</select>
</div>
<div class="adv_search-row">
<label for="search_research_org">Research Org: </label>
<input class="pure-input-1" type="text" name="research_org" id="search_research_org" value="">
</div>
<div class="adv_search-row">
<label for="search_sponsor_org">Sponsoring Org: </label>
<input class="pure-input-1" type="text" name="sponsor_org" id="search_sponsor_org" value="">
</div>
<div class="adv_search-row">
<label for="search_updd_from">Update Date: </label>
<div style="/* white-space: nowrap; */">
<input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_updd_from" name="updd_from" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
<label for="search_updd_until" style="margin-right:0.5rem; margin-left:0.5rem;">to</label>
<input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_updd_until" name="updd_until" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
</div>
</div>
<div class="adv_search-row">
<label class="control control-checkbox">Limit to INIS / NSA records only <input type="checkbox" id="search_inis_nsa" name="inis_nsa" title="Limit to INIS / NSA records only" value="true">
<div class="control-indicator"></div>
</label>
</div>
<div class="adv_search-row">
<label class="control control-checkbox">Limit to Nobel Prize winning researchers only <input type="checkbox" id="search_nobel" name="nobel" title="Limit to Nobel Prize winning researchers only" value="true">
<div class="control-indicator"></div>
</label>
</div>
<hr>
</div>
</fieldset>
<div class="text-right">
<button type="submit" class="pure-button button-success" style="margin: 1px; margin-left: 5px; padding:0.5em 0.9em;"><span class="fa fa-search"></span> Search</button>
</div>
</div>
</div>
</div>
<div class="col-1">
<button type="submit" class="pure-input-1 pure-button button-search" id="search_submit" aria-hidden="true" title="Submit"><span class="fa fa-search"></span><span class="sr-only">Submit</span></button>
</div>
</div>
</div>
</form>
POST /search
<form action="/search" id="state_form" method="POST" autocomplete="off">
<input type="hidden" id="state_act" name="act" value="act">
<input type="hidden" id="state_rows" name="rows" value="10">
<input type="hidden" id="state_page" name="page" value="">
<input type="hidden" id="state_sort" name="sort" value="">
<input type="hidden" id="state_return_type" name="return_type" value="">
<input type="hidden" id="state_search" name="search" value="">
<input type="hidden" id="state_term" name="term" value="">
<input type="hidden" id="state_title" name="title" value="">
<input type="hidden" id="state_creators" name="creators" value="">
<input type="hidden" id="state_doi" name="doi" value="">
<input type="hidden" id="state_idnos" name="idnos" value="">
<input type="hidden" id="state_pubd_from" name="pubd_from" value="">
<input type="hidden" id="state_pubd_until" name="pubd_until" value="">
<input type="hidden" id="state_fulltext" name="fulltext" value="">
<input type="hidden" id="state_doe_contract_number" name="doe_contract_number" value="">
<input type="hidden" id="state_product_type" name="product_type" value="">
<input type="hidden" id="state_journal_type" name="journal_type" value="">
<input type="hidden" id="state_data_type" name="data_type" value="">
<input type="hidden" id="state_software_type" name="software_type" value="">
<input type="hidden" id="state_software_license" name="software_license" value="">
<input type="hidden" id="state_subject" name="subject" value="">
<input type="hidden" id="state_site_code" name="site_code" value="">
<input type="hidden" id="state_research_org" name="research_org" value="">
<input type="hidden" id="state_sponsor_org" name="sponsor_org" value="">
<input type="hidden" id="state_updd_from" name="updd_from" value="">
<input type="hidden" id="state_updd_until" name="updd_until" value="">
<input type="hidden" id="state_availability" name="availability" value="">
<input type="hidden" id="state_inis_nsa" name="inis_nsa" value="">
<input type="hidden" id="state_nobel" name="nobel" value="">
<button type="submit" style="display:none;" aria-hidden="true" title="Submit">
</button>
</form>
Text Content
skip to main content * Sign In * Create Account Show search Show menu U.S. Department of Energy Office of Scientific and Technical Information Search terms: Advanced search options Advanced Search OptionsAdvanced Search queries use a traditional Term Search. For more info, see our FAQ. All Fields: Title: Author / Contributor: Digital Object Identifier (DOI): Identifier Numbers: Publication Date: to More Options ... Full Text: Resource Type: Journal Article Technical Report Data Software Patent Conference / Event Book / Monograph Program Document Thesis / Dissertation Video / Audio Miscellaneous Subject: Site: All Research Org: Sponsoring Org: Update Date: to Limit to INIS / NSA records only Limit to Nobel Prize winning researchers only -------------------------------------------------------------------------------- Search Submit * Submit Research Results * Search Tools * Public Access Policy * PIDs Services & Dev Tools * About * FAQs * News * 75th Anniversary * Sign In * Create Account OSTI.GOV Journal Article: Cybersecurity Attacks in Vehicular Sensors TITLE: CYBERSECURITY ATTACKS IN VEHICULAR SENSORS * Full Record * Other Related Research × You are accessing a document from the Department of Energy's (DOE) OSTI.GOV. This site is a product of DOE's Office of Scientific and Technical Information (OSTI) and is provided as a public service. Visit OSTI to utilize additional information resources in energy science and technology. ABSTRACT Today's modern vehicles contain anywhere from sixty to one-hundred sensors and exhibit the characteristics of Cyber-Physical-Systems (CPS). There is a high degree of coupling, cohesiveness, and interactions among vehicle's CPS components (e.g., sensors, devices, systems, systems-of-systems) across sensing, communication, and control layers. Cyber-attacks in the sensing or communication layers can compromise the security of the control layer. This paper provides a detailed review of potential cyber threats related to the sensing layer. Notably, the focus is mainly towards two categories of sensors: vehicle dynamics sensors (e.g., Tire Pressure Monitoring Systems (TPMS), magnetic encoders, and inertial sensors) and environment sensors (e.g., Light Detection and Ranging (LiDAR), ultrasonic, camera, Radio Detection and Ranging (Radar) systems, and Global Positioning System (GPS) units). Furthermore, the paper also offers perspectives through existing countermeasures from literature and stresses the need for data-driven cybersecurity solutions. Authors: El-Rewini, Zeinab [1]; * Search OSTI.GOV for author "El-Rewini, Zeinab" * Search OSTI.GOV for ORCID "0000-0002-7090-465X" * Search orcid.org for ORCID "0000-0002-7090-465X" Sadatsharan, Karthikeyan [2]; Sugunaraj, Niroop [3]; * Search OSTI.GOV for author "Sugunaraj, Niroop" * Search OSTI.GOV for ORCID "0000-0002-6165-0862" * Search orcid.org for ORCID "0000-0002-6165-0862" Selvaraj, Daisy Flora [4]; Plathottam, Siby Jose [5]; Ranganathan, Prakash [1] * Search OSTI.GOV for author "Ranganathan, Prakash" * Search OSTI.GOV for ORCID "0000-0001-8638-660X" * Search orcid.org for ORCID "0000-0001-8638-660X" -------------------------------------------------------------------------------- + Show Author Affiliations 1. Univ. of North Dakota, Grand Forks, ND (United States). Data, Energy, Cyber, and Systems (DECS) Lab. 2. Honda Research and Development Americas, Raymond, OH (United States) 3. Univ. of North Dakota, Grand Forks, ND (United States) 4. Univ. of North Dakota, Grand Forks, ND (United States). Energy and Environmental Research Center 5. Argonne National Lab. (ANL), Lemont, IL (United States) Publication Date: 2020-06-22 Research Org.: Argonne National Lab. (ANL), Argonne, IL (United States) Sponsoring Org.: USDOE OSTI Identifier: 1763654 Grant/Contract Number: AC02-06CH11357 Resource Type: Journal Article: Accepted Manuscript Journal Name: IEEE Sensors Journal Additional Journal Information: Journal Volume: 20; Journal Issue: 22; Journal ID: ISSN 1530-437X Publisher: IEEE Country of Publication: United States Language: English Subject: 97 MATHEMATICS AND COMPUTING; Cyber-attacks; environment sensors; sensing layer; vehicle dynamics sensors; CPS; cohesiveness; systems-of-systems; sensing communication; vehicle dynamics systems; tire pressure monitoring systems; inertial sensors -------------------------------------------------------------------------------- CITATION FORMATS * MLA * APA * Chicago * BibTeX El-Rewini, Zeinab, Sadatsharan, Karthikeyan, Sugunaraj, Niroop, Selvaraj, Daisy Flora, Plathottam, Siby Jose, and Ranganathan, Prakash. Cybersecurity Attacks in Vehicular Sensors. United States: N. p., 2020. Web. doi:10.1109/jsen.2020.3004275. Copy to clipboard El-Rewini, Zeinab, Sadatsharan, Karthikeyan, Sugunaraj, Niroop, Selvaraj, Daisy Flora, Plathottam, Siby Jose, & Ranganathan, Prakash. Cybersecurity Attacks in Vehicular Sensors. United States. https://doi.org/10.1109/jsen.2020.3004275 Copy to clipboard El-Rewini, Zeinab, Sadatsharan, Karthikeyan, Sugunaraj, Niroop, Selvaraj, Daisy Flora, Plathottam, Siby Jose, and Ranganathan, Prakash. 2020. "Cybersecurity Attacks in Vehicular Sensors". United States. https://doi.org/10.1109/jsen.2020.3004275. https://www.osti.gov/servlets/purl/1763654. Copy to clipboard @article{osti_1763654, title = {Cybersecurity Attacks in Vehicular Sensors}, author = {El-Rewini, Zeinab and Sadatsharan, Karthikeyan and Sugunaraj, Niroop and Selvaraj, Daisy Flora and Plathottam, Siby Jose and Ranganathan, Prakash}, abstractNote = {Today's modern vehicles contain anywhere from sixty to one-hundred sensors and exhibit the characteristics of Cyber-Physical-Systems (CPS). There is a high degree of coupling, cohesiveness, and interactions among vehicle's CPS components (e.g., sensors, devices, systems, systems-of-systems) across sensing, communication, and control layers. Cyber-attacks in the sensing or communication layers can compromise the security of the control layer. This paper provides a detailed review of potential cyber threats related to the sensing layer. Notably, the focus is mainly towards two categories of sensors: vehicle dynamics sensors (e.g., Tire Pressure Monitoring Systems (TPMS), magnetic encoders, and inertial sensors) and environment sensors (e.g., Light Detection and Ranging (LiDAR), ultrasonic, camera, Radio Detection and Ranging (Radar) systems, and Global Positioning System (GPS) units). Furthermore, the paper also offers perspectives through existing countermeasures from literature and stresses the need for data-driven cybersecurity solutions.}, doi = {10.1109/jsen.2020.3004275}, url = {https://www.osti.gov/biblio/1763654}, journal = {IEEE Sensors Journal}, issn = {1530-437X}, number = 22, volume = 20, place = {United States}, year = {2020}, month = {6} } Copy to clipboard -------------------------------------------------------------------------------- Journal Article: Free Publicly Available Full Text Accepted Manuscript (DOE) Publisher's Version of Record https://doi.org/10.1109/jsen.2020.3004275 Copyright Statement Other availability Search WorldCat to find libraries that may hold this journal -------------------------------------------------------------------------------- Save / Share: Export Metadata * Endnote * RIS * CSV / Excel * XML * JSON Save to My Library You must Sign In or Create an Account in order to save documents to your library. * Facebook * Twitter * Email * Print * More share options * LinkedIn * Pinterest * Tumblr Similar records in OSTI.GOV collections: * CYBERSECURITY CHALLENGES IN VEHICULAR COMMUNICATIONS Journal Article El-Rewini, Zeinab; Sadatsharan, Karthikeyan; Selvaraj, Daisy; ... - Vehicular Communications As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-Everything (V2X) communication technologies mature, the necessity to secure communications becomes apparent. There is a very real risk that today’s vehicles are subjected to cyber-attacks that target vehicular communications. This paper proposes a three-layer framework (sensing, communication and control) through which automotive security threats can be better understood. The sensing layer is made up of vehicle dynamics and environmental sensors, which are vulnerable to eavesdropping, jamming, and spoofing attacks. The communication layer is comprised of both in-vehicle and V2X communications and is susceptible to eavesdropping, spoofing, man-in-the-middle, andmore » sybil attacks. At the top of the hierarchy is the control layer, which enables autonomous vehicular functionality, including the automation of a vehicle’s speed, braking, and steering. Attacks targeting the sensing and communication layers can propagate upward and affect the functionality and can compromise the security of the control layer. This paper provides the state-of-the-art review on attacks and threats relevant to the communication layer and presents countermeasures.« less * https://doi.org/10.1016/j.vehcom.2019.100214 * Full Text Available * CYBERSECURITY FOR DISTANCE RELAY PROTECTION Technical Report McDermott, Thomas; Doty, Jeffrey; O'Brien, James; ... This project is a DOE follow-up effort on the CREDC workshop held on September 13, 2018 in Cambridge, MA to discuss cybersecurity of distance relays, which considered the benefits, vulnerabilities and risk mitigations for the use of communication systems in power system protection. The objectives of this project are to define the taxonomy of relay protection and associated communications; define use cases describing approaches to reduce the cyber-attack surface on those protective relays; and evaluate the loss of operational functional capability from changes to communication coverage. Mitigating controls will also be evaluated to understand if there are other approaches tomore » reduce attack surfaces while maintaining communications or partial communications. Distance relays are used to protect transmission lines of approximately 10 to 300 miles in length, by detecting short circuits (i.e., faults) on the lines and then tripping circuit breakers in the substation. Such protection systems are a subset of the power system and they incorporate sensing, logic and communication functions. Protection system exposure to cyberattack could be drastically limited by disconnecting relays from all vulnerable communication systems, but this may adversely impact overall power system performance in the absence of cyberattack. This project began with a use case analysis of protection systems with communications, as summarized in this report. It continued with modeling, testing and evaluation in a miniature power system (MPS), located in the Western Area Power Administration (WAPA) Electric Power Training Center (EPTC). The project also incorporated feedback from two industry meetings held in February and September 2019. The suggested next steps account for and complement the work already underway with DOE/CESER funding: 1. Study the performance of LCD and PC vs. PUTT, which is less reliant on communication system performance and GPS timing references. The PUTT scheme could prove to be more resilient to cyberattack or communications-related disruption. It could also be more tolerant of message re-routing with SDN/SDR communication systems. On the other hand, it will be more vulnerable to false tripping during dynamic events or to loss of the voltage signal. The optimum choice of scheme may depend on the specific power system and risk assessment. This study could provide a new template for evaluation based on business functions. 2. Research and develop new methods to detect and monitor distributed physical attacks, possibly using drones, video sensors, thermal sensors, machine learning and other advanced techniques. This will help mitigate the impact of cyberattack on the protection system, and will also help mitigate the impact of wild fires. 3. Implement a scalable PKI for use in electric utility protection systems. This will encourage widespread adoption of secure authentication methods that are already available, but not widely used at present. This will help secure engineering access to the relays. 4. Investigate the use of SDN in combination with SDR to achieve better cybersecurity and electromagnetic security of the network, incorporating path variability. This would help secure both engineering access and peer-to-peer GOOSE messaging. 5. Perform additional testing, with operator evaluation of “red button” scenarios, PUTT vs. LCD, relay mis-operations, and other cyberattacks in the EPTC. This is an important advantage of testing in the EPTC rather than by computer simulation or even hardware-in-the-loop simulation; the EPTC is already dedicated to managing the situational awareness, operator response times and other human impacts. One of the project objectives was to settle on a common nomenclature for this problem space. We have concluded that the OSI layer model, supplemented by ANSI device numbers and other IEEE standards, is already well-accepted by the industry. The IEEE PSRC knowledge base provides a great deal of public information« less * https://doi.org/10.2172/1602545 * Full Text Available * CYBERSECURITY FOR ELECTRIC VEHICLE CHARGING INFRASTRUCTURE. Technical Report Johnson, Jay; Anderson, Benjamin; Wright, Brian; ... As the U . S . electrifies the transportation sector, cyberattacks targeting vehicle charging could impact several critical infrastructure sectors including power systems, manufacturing, medical se rvices, and agriculture. This is a growing area of concern as charging stations increase power delivery capabilities and must communicate to authorize charging, sequence the charging process, and manage load (grid operators, vehicles, OEM vendors, charging network operators, etc.). The research challenges are numerous and complicated because there are many end users, stakeholders, and software and equipment vendors interests involved. Poorly implemented electric vehicle supply equipment (EVSE), electric veh icle (EV), or grid operatormore » communication systems could be a significant risk to EV adoption because the political, social, and financial impact of cyberattacks ? or public perception of such ? would ripple across the industry and produce lasting effects. Unfo rtunately, there is currently no comprehensive EVSE cybersecurity approach and limited best practices have been adopted by the EV/EVSE industry. There is an incomplete industry understanding of the attack surface, interconnected assets, and unsecured inter faces. C omprehensive cybersecurity recommendations founded on sound research are necessary to secure EV charging infrastructure. This project provided the power, security, and automotive industry with a strong technical basis for securing this infrastructu re by developing threat models, determining technology gaps, and identifying or developing effective countermeasures. Specifically, the team created a cybersecurity threat model and performed a technical risk assessment of EVSE assets across multiple manuf acturers and vendors , so that automotive, charging, and utility stakeholders could better protect customers, vehicles, and power systems in the face of new cyber threats.« less * https://doi.org/10.2172/1877784 * Full Text Available * SECURITY VULNERABILITIES OF CONNECTED VEHICLE STREAMS AND THEIR IMPACT ON COOPERATIVE DRIVING Journal Article Amoozadeh, Mani; Raghuramu, Arun; Chuah, Chen-nee; ... - IEEE Communications Magazine Autonomous vehicles capable of navigating unpredictable real-world environments with little human feedback are a reality today. Such systems rely heavily on onboard sensors such as cameras, radar/LIDAR, and GPS as well as capabilities such as 3G/4G connectivity and V2V/V2I communication to make real-time maneuvering decisions. Autonomous vehicle control imposes very strict requirements on the security of the communication channels used by the vehicle to exchange information as well as the control logic that performs complex driving tasks such as adapting vehicle velocity or changing lanes. This research presents a first look at the effects of security attacks on the communicationmore » channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC. Our simulation results show that an insider attack can cause significant instability in the CACC vehicle stream. We also outline how different countermeasures, such as downgrading to ACC mode, could potentially be used to improve the security and safety of the connected vehicle streams.« less Cited by 75 * https://doi.org/10.1109/MCOM.2015.7120028 * Full Text Available * FACILITY CYBERSECURITY FRAMEWORK BEST PRACTICES Technical Report Gourisetti, Sri Nikhil; Reeve, Hayden; Rotondo, Julia; ... Federal facilities are increasingly adopting automation and connecting to the Internet creating an energy-internet-of-things environment that converges operational technology (OT) and information technology (IT). Today's buildings increasingly weave together networked sensors and cyber and physical systems that enable data to be collected, aggregated, exchanged, stored and monetized in new ways. Building technological advances have created new energy technology, services, markets and value creation opportunities (e.g. transactive energy, two-way grid communications, machine learning, and increased use of renewable and distributed energy resources). But as larger data sets are being exchanged at faster speeds between an increasing number of OT systems, itmore » becomes more difficult to protect the security of the data lifecycle and the physical equipment it interacts with. These challenges are especially difficult to overcome because the economic and environmental gain (interoperability, big data, social networks and ubiquitous information sharing) are driving these prominent trends in the digital age. Often cybersecurity is an afterthought. The U.S. Department of Energy’s (DOE) Federal Energy Management Program (FEMP) funded the Pacific Northwest National Laboratory (PNNL) to develop various cybersecurity tools, trainings, and reports to aid federal facility managers – and other building owners and operators – in better applying frameworks and lessons learned from the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), risk management framework (RMF), DOE’s cybersecurity capability maturity model (C2M2), and a wide variety of industry best practices and guidance documents (i.e., NIST 800 series, Department of Defense United Facilities Criteria). This set of tools, collectively known as the FEMP Facility-Related Control System Cyber Toolkit (FRCS Cyber Toolkit)2, is focused on cybersecurity concerns from facility-related control systems and other operational technology (OT), such as industrial control systems (ICS). The FRCS Cyber Toolkit can be applied across six of the sixteen critical infrastructure sectors designated by the Department of Homeland Security, including government facilities, healthcare and public health, commercial facilities (e.g., public assembly, offices, lodging), financial services (e.g., banking and insurance), emergency services (e.g., fire and police stations), and information technology. With increasingly converged IT and OT systems, it is crucial to address OT cybersecurity considerations and assess how the seam of these two systems could impact the overall cybersecurity posture of a facility. The objective of this report is to provide an overview of the best possible method to use FRCS Cyber Toolkit (section 2.0) and distilled cybersecurity best practices for the federal facilities to address growing non-linear cyber threats (section 3.0). Recommendations in this document are aggregated from several NIST and other documents (see Appendix A for additional details).« less * https://doi.org/10.2172/1660771 * Full Text Available * Similar Records -------------------------------------------------------------------------------- * * * * Website Policies / Important Links * Contact Us * * Vulnerability Disclosure Program * * Facebook * Twitter * YouTube