Electrical power systems are becoming increasingly dependent on data networking and computer control. This opens the electrical power grid to high-risk cyber-security threats that attack the integrity and availability of the system. This project is developing secure platforms for advanced power meters and secure communication techniques for control system networks as part of the TCIP Center. The project has provided strategies for remote attestation on power meters, ways to use TV bands for wireless communication to power meters, ways to meet substation timing guarantees with IPsec security protection, and ways to monitor home energy usage without assuming that appliances are trustworthy.
Blogs
- Integrity Aware Architectures
- Assuring Robustness of Radio Spectrum Telemetry
- Secure Multicast for Power Grid Communications
- Non-Intrusive Load Shed Verification
Related Resources
- TCIPG Center Home Page
- Introduction to IEC 61850
- Attested Metering Page
- Integrity-Aware Computing Page
Publications
AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance,
Tianyuan Liu, Avesta Hojjati, Adam Bates, and Klara Nahrstedt.
IEEE ICDCS 2018, 38th IEEE International Conference on Distributed Computing Systems, July 2018, Vienna, Austria.
Evaluating Detectors on Optimal Attack Vectors that Enable Electricity Theft and DER Fraud,
Varun Badrinath Krishna, Carl A. Gunter, and William H. Sanders.
IEEE Journal of Selected Topics in Signal Processing, August 2018.
Inferring Properties of Neural Networks with Intelligent Designs,
Karan Ganju.
Master of Science Thesis, University of Illinois at Urbana-Champaign, May 2018.
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets.
Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward J. Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne S. Winslett, Carl A. Gunter, and William P. King.
ACM Computer and Communications Security (CCS ’16), October, 2016.
Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems,
Yong Yang, Lu Su, Mohammad Khan, Michael LeMay, Tarek Abdelzaher, and Jiawei Han.
ACM Transactions on Sensor Networks, Vol. 11, No. 2, December 2014.
Privacy-Preserving Vehicle Miles Traveled (PPVMT) Tax
Gaurav Lahoti
Master of Science Thesis, University of Illinois at Urbana-Champaign, August 2014.
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware,
Michael LeMay and Carl A. Gunter.
arXiv:1404.3465 [cs.CR], April 2014.
Cumulative Attestation Kernels for Embedded Systems
Michael LeMay and Carl A. Gunter
IEEE Transactions on Smart Grid, June 2012. [BIB]
Reliable Telemetry in White Spaces using Remote Attestation
Omid Fatemieh, Michael LeMay, and Carl A. Gunter
Annual Computer Security Applications Conference (ACSAC ’11), Orlando, FL, December 2011. [PPT][BIB][Related]
Compact Integrity-Aware Architectures
Michael LeMay
Doctoral Thesis, University of Illinois at Urbana-Champaign, August 2011. [BIB][Related]
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
Michael LeMay and Carl A. Gunter
International Conference on Trust and Trustworthy Computing (TRUST ’11), Pittsburgh, PA, June 2011. [PPT][BIB][Related]
The original publication is available at www.springerlink.com.
Assuring Robustness of Radio Spectrum Telemetry Against Vandalism and Exploitation
Omid Fatemieh
Doctoral Thesis, University of Illinois at Urbana-Champaign, February 2011. [BIB]
Distributed Non-Intrusive Load Monitoring
David C. Bergman, Dong Jin, Joshua P. Juen, Naoki Tanaka, Carl A. Gunter and Andrew Wright
IEEE/PES Conference on Innovative Smart Grid Technologies (ISGT ’11), Anaheim, CA, January 2011. [BIB][Related]
Application-Aware Secure Multicast for Power Grid Communications
Jianqing Zhang and Carl A. Gunter
International Journal of Security and Networks (IJSN), volume 6, number 1, 2011. [BIB][Related]
Nonintrusive Load-Shed Verification
David C. Bergman, Dong Jin, Joshua P. Juen, Naoki Tanaka, Carl A. Gunter and Andrew K. Wright
IEEE Pervasive Computing, Special Issue on Smart Energy Systems, volume 10, number 1, pages 49-57, 2011. [BIB][Related]
Application-Aware Secure Multicast for Power Grid Communications
Jianqing Zhang and Carl A. Gunter
IEEE International Conference on Smart Grid Communications (SmartGridComm ’10), Gaithersburg, MD, October 2010. [PPT][BIB][Related]
Secure Multicast for Power Grid Communications
Jianqing Zhang
Doctoral Thesis, University of Illinois at Urbana-Champaign, September 2010. [Related]
Low Cost and Secure Smart Meter Communications using the TV White Spaces
Omid Fatemieh, Ranveer Chandra and Carl A. Gunter
IEEE International Symposium on Resilient Control Systems (ISRCS ’10), Idaho Falls, ID, August 2010. [PPT][BIB][Related]
Diagnostic Powertracing for Sensor Node Failure Analysis
Mohammad Maifi Hasan Khan, Hieu K. Le, Michael LeMay, Parya Moinzadeh, Lili Wang, Yong Yang, Dong K. Noh, Tarek Abdelzaher, Carl A. Gunter, Jiawei Han and Xin Jin
ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN ’10), Stockholm, Sweden, April 2010. [Related]
A Conceptual Framework for the Vehicle-to-Grid (V2G) Implementation
Christophe Guille and George Gross
Energy Policy, volume 37, issue 11, pages 4379-4390, November 2009. [Related]
Cumulative Attestation Kernels for Embedded Systems
Michael LeMay and Carl A. Gunter
European Symposium on Research in Computer Security (ESORICS ’09), Saint Malo, France, September 2009. The original publication is available at www.springerlink.com [PPT][Related]
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
Carl A. Gunter
IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY ’09), London, UK, July 2009. [PPT][Related]
PBES: A Policy Based Encryption System with Application to Data Sharing in the Power Grid
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, and Farhana Ashraf
ACM Symposium on Information, Computer and Communication Security (ASIACCS ’09), Sydney Australia, March 2009. [Related]
Collaborative Recommender Systems for Building Automation
Michael LeMay, Jason J. Haas and Carl A. Gunter
IEEE Hawaii International Conference on System Sciences (HICSS ’09), Waikoloa, HI, January 2009. [PPT][BIB][Related]
Dependable Emergency-Response Networking Based on Retaskable Network Infrastructures
Michael LeMay
Master of Science Thesis, University of Illinois at Urbana-Champaign, April 2008. [BIB]
An Integrated Architecture for Demand Response Communications and Control (awarded best paper)
Michael LeMay, Rajesh Nelli, George Gross and Carl A. Gunter
IEEE Hawaii International Conference on System Sciences (HICSS ’08), Waikoloa, HI, January 2008. [PPT][BIB][Related]
Supporting Emergency-Response by Retasking Network Infrastructures
Michael LeMay and Carl A. Gunter
ACM Workshop on Hot Topics in Networking (HotNets-VI), Atlanta, GA, November 2007. [PPT][BIB][Related]
Unified Architecture for Large-Scale Attested Metering
Michael LeMay, George Gross, Carl A. Gunter and Sanjam Garg
IEEE Hawaii International Conference On System Sciences (HICSS ’07), Waikoloa, HI, January 2007. [PPT][BIB][Related]
Trustworthy Cyber-Infrastructure for Power (TCIP)
TCIP Team
Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems, San Jose CA, April 2006.
Last updated on Monday, August 22, 2011, 4:40 pm