Design of Secure Reconfigurable Power Converters

In recent years, attacks against the power grid and the connected smart grid infrastructure have increased and have become a national security issue. The communication-based attacks include attacks with physical access to a network, as well as remote-networked attacks. The resource constrained end devices such as smart meters, power converters as well as third party appliances open additional opportunities for malicious actors. In this paper, we present a low overhead secure communication framework for the critical power infrastructure, which incorporates secure processors, such as Trusted Platform Modules to introduce secure communication in the end nodes. As a use case scenario, we demonstrate security framework for power converters.

[1]  O. A. Mohammed,et al.  IEC 61850: Technology standards and cyber-threats , 2016, 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC).

[2]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.

[3]  Dipankar Dasgupta,et al.  Effects of Cyber-Attacks on the Energy Storage in a Hybrid Power System , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).

[4]  Jia YingYing,et al.  Application and Simulation of SVPWM in three phase inverter , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.

[5]  R.E. Mackiewicz,et al.  Overview of IEC 61850 and Benefits , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.

[6]  Taeshik Shon,et al.  Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture , 2016, Future Gener. Comput. Syst..

[7]  W.E. Reid,et al.  Power quality issues-standards and guidelines , 1994, Proceedings of IEEE Pulp and Paper Industry Conference.

[8]  Oscar Garcia,et al.  Concurrent and simple digital controller of an AC/DC converter with power factor correction based on an FPGA , 2003 .

[9]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[10]  Y. Khersonsky,et al.  PEBB - Power Electronics Building Blocks from Concept to Reality , 2006, 2006 Record of Conference Papers - IEEE Industry Applications Society 53rd Annual Petroleum and Chemical Industry Conference.

[11]  G. Manimaran,et al.  Detection of cyber intrusions using network-based multicast messages for substation automation , 2014, ISGT 2014.

[12]  Leon M. Tolbert,et al.  A Distributed Power System Control Architecture for Improved Distribution System Resiliency , 2019, IEEE Access.

[13]  Claudia Eckert,et al.  Novel weaknesses in IEC 62351 protected Smart Grid control systems , 2016, 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[14]  Peoples R China Benefits of an FPGA based SRM controller , 2014 .

[15]  Chen-Ching Liu,et al.  Integrated Anomaly Detection for cyber security of the substations , 2014 .

[16]  Steffen Fries,et al.  Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments , 2010, 2010 Fifth International Conference on Internet and Web Applications and Services.

[17]  Kheng Cher Yeo,et al.  Comparative analysis of different techniques of encryption for secured data transmission , 2017, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI).

[18]  Peng Wang,et al.  A review of communication protocols and topologies for power converters , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.

[19]  I. Slama-Belkhodja,et al.  FPGA implementation of Power Electronic Converter real-time model , 2012, International Symposium on Power Electronics Power Electronics, Electrical Drives, Automation and Motion.