Publications

8 Results
Skip to search filters

Module OT PNM Field Demonstration Test Procedure

Cordeiro, Patricia G.; Onunkwo, Ifeoma O.; Jose, Deepu J.; Hossain-McKenzie, Shamina S.

This document will detail a field demonstration test procedure for the Module OT device developed for the joint NREL-SNL DOE CEDS project titled "Modular Security Apparatus for Managing Distributed Cryptography for Command & Control Messages on Operational Technology (OT) Networks." The aim of this document is to create the testing and evaluation procedure for field demonstration of the device; this includes primarily functional testing and implementation testing at Public Service Company of New Mexico's (PNM's) Prosperity solar site environment. Specifically, the Module OT devices will be integrated into the Prosperity solar site system; traffic will be encrypted between several points of interest at the site (e.g., inverter micrologger and switch). The tests described in this document will be performed to assess the impact and effectiveness of the encryption capabilities provided by the Module OT device.

More Details

Cryptography Considerations for Distributed Energy Resource Systems

2019 IEEE Power and Energy Conference at Illinois, PECI 2019

Lai, Christine F.; Cordeiro, Patricia G.; Hasandka, Adarsh; Jacobs, Nicholas J.; Hossain-Mckenzie, Shamina; Jose, Deepu J.; Saleem, Danish; Martin, Maurice

Distributed energy resource (DER) systems are rapidly being adopted and integrated within the electric power grid. Developments in smart grid devices and communication protocols are advancing the power system domain but are also introducing new cyber attack vectors. In particular, the ability to maintain the confidentiality, integrity, and availability of data is of increasing concern. Cryptography is a powerful tool that can be leveraged to protect DER systems and their critical information. This paper discusses prominent methods of cryptographic authentication and encryption that can be used to secure DER communications. Specific considerations and recommendations for applying cryptography to DER systems are provided, including system design constraints and system impact. These will be demonstrated with two case studies that assess cryptography hardware requirements and communications latency in DERs.

More Details

Module OT Laboratory Test Procedure

Cordeiro, Patricia G.; Onunkwo, Ifeoma O.; Jacobs, Nicholas J.; Jose, Deepu J.; Wright, Brian J.; Hossain-McKenzie, Shamina S.

This document will detail a test procedure, involving bench and emulation testing, for the Module OT device developed for the joint NREL-SNL DOE CEDS project titled "Modular Security Apparatus for Managing Distributed Cryptography for Command & Control Messages on Operational Technology (OT) Networks." The aim of this document is to create the testing and evaluation protocol for the module for lab-level testing; this includes checklists and experiments for information gathering, functional testing, cryptographic implementation, public key infrastructure, key exchange/authentication, encryption, and implementation testing in the emulation environment.

More Details
8 Results
8 Results