GLOBAL RESEARCH SYNDICATE
No Result
View All Result
  • Login
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

Keeping water and energy secure

globalresearchsyndicate by globalresearchsyndicate
June 4, 2020
in Data Collection
0
Keeping water and energy secure
0
SHARES
16
VIEWS
Share on FacebookShare on Twitter

UNIVERSITY PARK, Pa. — Water and energy systems do not typically come to mind as cyber hacker targets, but those systems are often most vulnerable to such attacks, according to Javad Khazaei, assistant professor of electrical engineering at Penn State Harrisburg.

Khazaei, an affiliate professor of architectural engineering in the College of Engineering at Penn State University Park, is leading a 15-month seed-grant-funded project investigating the vulnerability of water and energy infrastructure systems and developing detection methodologies to counteract such criminal acts.

Technologically advanced, or “smart,” cities often integrate water and energy systems, which are controlled automatically by sensors and remote monitoring systems, according to Khazaei. If hackers gain access to these advanced metering infrastructures and inject false data readings, they can cause failures without detection.

A head and shoulders shot of a man smiling.

Javad Khazaei, affiliate professor of architectural engineering, is leading a 15-month seed grant-funded project that will investigate the vulnerability of water and energy infrastructure systems and develop detection methodologies to counteract cyberattacks.

IMAGE: Penn State College of Engineering

“Cyberattacks like this do happen and to immense consequences,” Khazaei said. “In December 2015, Russian hackers shut down 30 substations in Ukraine, causing a large-scale blackout for 230,000 people for several hours. Hackers also can permanently put infrastructure at risk by stealing information and then using it to plan future attacks.” 

Khazaei, along with co-principal investigators Prasenjit Mitra, associate dean for research in Penn State’s College of Information Sciences and Technology, and Faegheh Moazeni, adjunct lecturer in Penn State Harrisburg’s School of Science, Engineering and Technology, received $95,000 in seed grants for the project from Penn State’s College of Information Sciences and Technology and Department of Architectural Engineering.  

To examine the feasibility of such attacks and understand cyber attackers’ strategies, the researchers will use multi-objective mathematical formulations to create an attack model like one a hacker would use to carry out an attack. The models will be critical in identifying the vulnerability of interlinked water and energy systems and understand what would cause blackouts or water cutoffs. 

“In the simulations, we will inject false data into the load and energy generation units, which will then be sent to the centralized controller for decision making. The injections will be designed so that they will bypass the existing detection algorithms,” Khazaei said. “For example, a few measurements in an energy network can be tampered with false data to cause an overflow in multiple transmission lines, which could result in a blackout. Or, if a water tank is empty, we can change the reading to appear like a full tank, which changes the waterflow and pumps — causing damage downstream in the water distribution network.”

From prior research, Khazaei knows that a hacker can adjust numbers just a few points to cause a transmission line overflow. This time, Khazaei will use an even more sophisticated hacking system to develop a mathematical attack model that could incorporate bad data detection frameworks in control centers to protect water and energy infrastructures.

In tandem with the attack models, the researchers will develop two big data analytics-based detection methodologies — a recursive least-square estimation method and a machine learning-based bad data detection strategy that can detect stealthy attacks.  

The algorithms in the detection technology, otherwise known as neural networks, will be able to use historical data and a set of attack data as a training set to detect tampered measurement data and to notify human operators in real time — before a large-scale blackout or water cutoff occurs.

Sez Atamturktur, Harry and Arlene Schell Professor and head of the Department of Architectural Engineering, emphasized how research on utility infrastructure is greatly needed. 

“Cybersecurity for water treatment and supply networks is only loosely monitored at the federal and state levels, where the primary focus is often on water quality,” she said. “There is an urgent nationwide need for cybersecurity expertise. Javad’s research will provide needed background information for officials at both the federal and state level to make reforms and protect the nation’s critical infrastructure.”

Related Posts

How Machine Learning has impacted Consumer Behaviour and Analysis
Consumer Research

How Machine Learning has impacted Consumer Behaviour and Analysis

January 4, 2024
Market Research The Ultimate Weapon for Business Success
Consumer Research

Market Research: The Ultimate Weapon for Business Success

June 22, 2023
Unveiling the Hidden Power of Market Research A Game Changer
Consumer Research

Unveiling the Hidden Power of Market Research: A Game Changer

June 2, 2023
7 Secrets of Market Research Gurus That Will Blow Your Mind
Consumer Research

7 Secrets of Market Research Gurus That Will Blow Your Mind

May 8, 2023
The Shocking Truth About Market Research Revealed!
Consumer Research

The Shocking Truth About Market Research: Revealed!

April 25, 2023
market research, primary research, secondary research, market research trends, market research news,
Consumer Research

Quantitative vs. Qualitative Research. How to choose the Right Research Method for Your Business Needs

March 14, 2023
Next Post
Key Players- Interpage,Visiplex,Telcom & Data,Total Communicatons,Pager Genius,Long Range Systems,Cornell,Quest Retail Systems – Bulletin Line

Two Way Radio Equipment Market 2020 Primary Research, Secondary Research, Product Research, Trends and Forecast 2026

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Ipsos Revolutionizes the Global Market Research Landscape
  • How Machine Learning has impacted Consumer Behaviour and Analysis
  • Market Research: The Ultimate Weapon for Business Success
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA

Copyright © 2024 Globalresearchsyndicate.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2024 Globalresearchsyndicate.com