- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Smart Grid Energy Management
- Cryptography and Data Security
- Electricity Theft Detection Techniques
- Access Control and Trust
- Cloud Data Security Solutions
- Information and Cyber Security
- Smart Grid and Power Systems
- Power Systems Fault Detection
- Blockchain Technology Applications and Security
- Energy Load and Power Forecasting
- Advanced Data Storage Technologies
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Context-Aware Activity Recognition Systems
- Cryptographic Implementations and Security
- Green IT and Sustainability
- Data Visualization and Analytics
- User Authentication and Security Systems
- Infrastructure Resilience and Vulnerability Analysis
- Physical Unclonable Functions (PUFs) and Hardware Security
Advanced Digital Sciences Center
2016-2023
Singapore University of Technology and Design
2019-2023
ORCID
2022
National University of Singapore
2021
Digital Science (United States)
2020-2021
University of Illinois Urbana-Champaign
2021
KTH Royal Institute of Technology
2020
Fujitsu (United States)
2013-2016
Fujitsu (Japan)
2014
Georgia Institute of Technology
2008-2012
Increased connectivity is required to implement novel coordination and control schemes. IEC 61850-based communication solutions have become popular due many reasons—object-oriented modeling capability, interoperable strong protocols, name a few. However, infrastructure not well-equipped with cybersecurity mechanisms for secure operation. Unlike online banking systems that been running such security decades, smart grid an emerging field. To achieve at all levels, operational technology-based...
Cyber attacks pose a major threat to smart grid infrastructures where communication links bind physical devices provide critical measurement, protection, and control functionalities. Substation is an integral part of power system. Modern substations with intelligent electronic remote access interface are more prone cyber attacks. Hence, there urgent need consider cybersecurity at the electrical substation level. This paper makes systematic effort develop synthesized dataset focusing on IEC...
With the introduction of advanced monitoring and communication technologies, legacy power system is evolving toward fully digitalized smart grid. The IEC 61850 standards have emerged as popular for automation grid systems. However, modernization has an unintended consequence increased vulnerability to cyber-attacks. Among emerging cyber threats, in this article we focus on false data injection attacks against generators compliant systems since subject not yet intensively studied literature....
Electricity theft costs utility companies billions of dollars worldwide annually. The electricity consumption data recorded by consumers' smart meters, coupled with the aggregate energy supply master meters provide a new opportunity to pinpoint source theft. Existing works on pinpointing either assume linear attack modes which often limit their capability in identifying nonlinear behaviours, or incur extra cost for model training sensor installation. Our insight hinges upon fact that value...
Maps offer a familiar way to present geographic data (continents, countries), and additional information (topography, geology), can be displayed with the help of contours heat-map overlays. In this paper, we consider visualizing large-scale dynamic relational by taking advantage map metaphor. We describe map-based visualization system which uses animation convey dynamics in large sets, aims preserve viewer's mental while also offering readable views at all times. Our is fully functional has...
Electronic Health Record (EHR) and Personal (PHR) systems could allow patients to better manage their health information share it enhance the quality efficiency of healthcare. Unfortunately, misuse stored in EHR PHR will create new risks for patients, we need empower them safeguard avoid problems such as medical identity theft. In this paper, introduce notion accountable use update electronic records design a patient-centric monitoring system based on it. We develop architecture associated...
Electrical substations are crucial for power grids. A number of international standards, such as IEC 60870 and 61850, have emerged to enable remote automated control over substations. However, owing insufficient security consideration in their design implementation, the resulting systems could be vulnerable cyber attacks. As a result, modernization large dramatically increases scale potential damage successful attacks can cause on To counter risk, one promising direction is deploy an...
Electrical substations play a crucial role in power grids. A number of international standards, such as IEC 60870 and 61850, have emerged to modernize for efficient timely control. However, owing insufficient security consideration implementation, the digitization large connected could dramatically increase scale damage on grids caused by cyber attacks. In this paper, we discuss practical design, deployment active command mediation defense (A*CMD), distributed cybersecurity solution counter...
Programmable Logic Controllers (PLCs) are essential components for enabling remote monitoring and automated control in industrial systems. Recently PLCs often utilized a modernized power grid system implementing an additional layer of control, such as operation circuit breakers under specific conditions. Thus, order to create software-based smart testbed (or 'cyber range' cyber security experiments); emulation the PLC is imperative. OpenPLC software widely used emulating PLCs, but...
The state-of-the-art digital signatures incur undesirable delays, hence are impractical for time-stringent Industrial Control Systems (ICSs). recent revision to IEC 62351–6 standard stepped back from in favor of symmetric key based solutions, thereby sacrificing properties, e.g., scaling well multiple destinations, easy distribution and management, public verifiability, non-repudiation. Inspired by the Online/Offline signatures, this paper presents a new signature model provide properties...
OpenADR 2.0, an internationally-recognized standard for Automated Demand Response (ADR), defines the interaction between ADR server and client, but does not specify all possible multi-tier deployment architectures that are valid relative to standard's specification. In this paper, we analyze properties of a number OpenADR-based have been proposed by vendors, in terms interoperability (compliance with standard), scalability, complexity, security, goal helping utilities third party DR...
After a number of real-world cyber incidents targeting power grid systems in the recent years, early detection such attacks and analysis their attack vectors are urgent need. One technologies that serve purposes is honeypot. Although concept honeypot not new, its use smart context still nascent. Moreover, honeynet, network honeypots, yet systematically explored context. In this paper, we design implement honeynet system can emulate an entire field communication infrastructure including...
Successful attacks against smart grid systems often exploited the insufficiency of checking mechanisms - e.g., commands are largely executed without whether they issued by legitimate source and transmitted through right network path hence undergone all necessary mediations scrutinizes. While adding such enhanced security into will significantly raise bar for attackers, there two key challenges: 1) need real-time, 2) flexibility i.e., scheme needs to be applicable different deployment...
Synchrophasor measurements play an important role in smart grid wide area protection. Recently, IEC 61850-90-5 has also defined transmission of IEEE C37.118.1 synchrophasors over 61850 messages. Routable versions GOOSE and SV messages mapped to network transport layers called R-GOOSE R-SV have been proposed. In literature, many commercial open-source implementations for publishing reported. However, the available opensource are limited terms accessibility, scalability, configurability. To...
Assurance of cybersecurity is crucial to ensure dependability and resilience smart power grid systems. In order evaluate the impact potential cyber attacks, assess deployability effectiveness measures, enable hands-on exercise training personals, an interactive, virtual environment that emulates behaviour a system, namely range, has been demanded by industry players as well academia. A range typically implemented combination system emulation, which allows interactivity, physical (i.e., grid)...
Industrial control system networks in real world usually require a complex composition of many different devices, protocols, and services. Unfortunately, such practical setups are rarely documented publicly sufficient technical detail to allow third parties use the as reference for their research. As result, security researchers often have work with abstract simplified assumptions, which might not translate well practice. In this work, we provide comprehensive overview network services...
Electric substations play an important role in the proper functioning of power grid systems. Recent incidents such as Ukraine case have demonstrated high risk attacks against substations. A wealth existing and emerging cyber defense mechanisms been suggested for protecting substations, each with different objectives using a variety approaches that their own strength weakness. In this paper, we propose pragmatic framework reasoning about by allowing critical comparisons features planning...
Thanks to the roll-out of smart meters, availability fine-grained electricity usage data has rapidly grown. Such enabled utility companies perform robust and efficient grid operations. However, at same time, privacy concerns associated with sharing disclosure such have been raised. In this paper, we first demonstrate feasibility estimating privacy-sensitive household attributes based solely on energy residential customers. We then discuss a framework measure gain evaluate effectiveness...
While large-scale residential demand response (DR) has been considered promising because of the significant flexibility for controlling electricity demand, customer acquisition and engagement are major barriers hindering its penetration. To overcome challenges, we propose a comprehensive DR system framework both utilities to support multiple programs wide range controllable resources, i.e., variety Internet Things (IoT) devices, in households customers enjoy two-way, timely communication...
Fine-grained energy usage data made available by recent advancement of smart grid technologies benefit not only electricity utility companies but also customers. Nowadays customers can utilize various services sharing their own data. At the same time, such utilization and with a variety third party service providers may cause privacy concerns. In this paper, we discuss preserving mechanism for customers' parties using non-interactive zero-knowledge proof systems. Under our scheme, customer...
The recent advancements of IoT technologies, including broad penetration Internet-connected smart appliances such as remotely controllable LED lights, thermostats, have changed the way we interact with in our homes and perform daily activities. However, significant heterogeneity emerging devices has led to fragmented smart-home systems which each single appliance vendor provides proprietary solution for specific connectivity user experience. To address this challenge, present SPOT, a...