Cybersecurity and Power Electronics: Addressing the Security Vulnerabilities of the Internet of Things

The Internet of Things (IoT) has led the way to smarter and ultimately more efficient cyberphysical systems (CPSs). An example of such a CPS includes motor drives connected to a computer network controlling industrial processes. Another example is a recent European Union regulation that may enable utility customers to become energy suppliers-i.e., the formation of transactive energy (TE) systems or energy local area networks (E-LANs) formed by integrated smart energy nodes cooperating to accomplish system goals.

[1]  Ron Ambrosio,et al.  Transactive Energy Systems [Viewpoint] , 2016 .

[2]  Rick S. Blum,et al.  Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.

[3]  Martin Ordonez,et al.  Voltage and Frequency Grid Support Strategies Beyond Standards , 2017, IEEE Transactions on Power Electronics.

[4]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[5]  Rick S. Blum,et al.  GPS spoofing attack characterization and detection in smart grids , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[6]  Shuang Zhao,et al.  Analysis and optimization of a high-efficiency residential energy harvesting system with dual half-bridge converter , 2017, 2017 IEEE Applied Power Electronics Conference and Exposition (APEC).

[7]  Steven E. Collier The Emerging Enernet: Convergence of the Smart Grid with the Internet of Things , 2017 .

[8]  H. Alan Mantooth,et al.  Optimizing efficiency and performance for single-phase photovoltaic inverter with dual-half bridge converter , 2015, 2015 IEEE Applied Power Electronics Conference and Exposition (APEC).

[9]  H Vincent Poor,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[10]  Rick S. Blum,et al.  Attack Detection in Sensor Network Target Localization Systems With Quantized Data , 2017, IEEE Transactions on Signal Processing.

[11]  Rick S. Blum,et al.  Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.

[12]  Huai Wang,et al.  Wide-Scale Adoption of Photovoltaic Energy: Grid Code Modifications Are Explored in the Distribution Grid , 2015, IEEE Industry Applications Magazine.

[13]  Rick S. Blum,et al.  Asymptotic analysis of a new low complexity encryption approach for the Internet of Things, smart cities and smart grid , 2017, 2017 IEEE International Conference on Smart Grid and Smart Cities (ICSGSC).

[14]  Rick S. Blum,et al.  Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks , 2016, IEEE Transactions on Signal Processing.

[15]  Reza Iravani,et al.  Microgrid Evolution Roadmap Engineering, Economics, and Experience , 2015 .

[16]  Rick S. Blum,et al.  Authenticated side channel via physical layer fingerprinting , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[17]  Roger Dougal,et al.  Optimized control of isolated residential power router for photovoltaic applications , 2014, 2014 IEEE Energy Conversion Congress and Exposition (ECCE).

[18]  Pierluigi Mancarella,et al.  Microgrid Evolution Roadmap , 2015, 2015 International Symposium on Smart Electric Distribution Systems and Technologies (EDST).

[19]  Rick S. Blum,et al.  A Fundamental Limitation on Maximum Parameter Dimension for Accurate Estimation With Quantized Data , 2016, IEEE Transactions on Information Theory.

[20]  Shuang Zhao,et al.  The hierarchical energy management control for residential energy harvesting system , 2016, 2016 IEEE Energy Conversion Congress and Exposition (ECCE).

[21]  H. Alan Mantooth,et al.  Realizing an integrated system for residential energy harvesting and management , 2015, 2015 IEEE Applied Power Electronics Conference and Exposition (APEC).