Side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations

Georgia Tech researchers Tohid Shekari, Raheem Beyah, Morris Cohen, and Lukas Graber hold an antenna and home-built recording equipment for the VLF radio receiver, known as AWESOME, which is capable of detecting lightning radio bursts from around the world.
CREDIT
Christopher Moore, Georgia Tech

Signals from distant lightning could help secure electric substations

Side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations and other critical infrastructure, a new study suggests.

By analyzing electromagnetic signals emitted by substation components using an independent monitoring system, security personnel could tell if switches and transformers were being tampered with in remote equipment. Background lightning signals from thousands of miles away would authenticate those signals, preventing malicious actors from injecting fake monitoring information into the system.

The research, done by engineers at the Georgia Institute of Technology, has been tested at substations with two different electric utilities, and by extensive modeling and simulation. Known as radio frequency-based distributed intrusion detection system (RFDIDS), the technique will be described February 26 at the 2019 Network and Distributed System Security Symposium (NDSS) in San Diego.

“We should be able to remotely detect any attack that is modifying the magnetic field around substation components,” said Raheem Beyah, Motorola Foundation Professor in Georgia Tech’s School of Electrical and Computer Engineering. “We are using a physical phenomenon to determine whether a certain action at a substation has occurred or not.”

Opening substation breakers to cause a blackout is one potential power grid attack, and in December 2015, that technique was used to shut off power to 230,000 persons in the Ukraine. Attackers opened breakers in 30 substations and hacked into monitoring systems to convince power grid operators that the grid was operating normally. Topping that off, they also attacked call centers to prevent customers from telling operators what was happening.

“The electric power grid is difficult to secure because it is so massive,” Beyah said. “It provides an electrical connection from a generating station to the appliances in your home. Because of this electrical connection, there are many places where a hacker could potentially insert an attack. That’s why we need an independent way to know what’s happening on grid systems.”

That independent approach would use an antenna located in or near a substation to detect the unique radio-frequency “side channel” signatures produced by the equipment. The monitoring would be independent of systems now used to monitor and control the grid.

“Without trusting anything at all on the grid, we can use an RF receiver to determine if an impulse occurred in the shape of an ‘open’ operation,” Beyah said. “The system operates at 60 Hertz, and there are few other systems that operate there, so we can be sure of what we’re monitoring.”

However, hackers might be able to figure out how to insert fake signals to hide their attacks. That’s where the lightning emissions known as “sferics” come in.

“When a lightning flash hits the ground, it forms an electrical path miles tall, potentially carrying hundreds of thousands of amps of current, so that makes for a really powerful antenna radiating energy,” said Morris Cohen, an associate professor in the Georgia Tech School of Electrical and Computer Engineering. Each flash creates signals in the very low frequency (VLF) band, which can reflect from the upper atmosphere to travel long distances.

“Signals from lightning can zigzag back and forth and make it all the way around the world,” Cohen noted. “Lightning from South America, for example, is easily detectable in Atlanta. We’ve even seen lightning echo multiple times around the world.”

Security staff remotely monitoring substations would be able compare the lightning behind the 60 Hz substation signals to lightning data from other sources, such as one of the 70,000 or so other substations in the United States or a global lightning database. That would authenticate the information. Since lightning occurs more than three million times every day on average, there is plenty of opportunity to authenticate, he noted.

“Even if you could synthesize the RF receiver’s data feed digitally, generating something realistic would be difficult because the shape of the pulse from lightning detected by our receivers varies as a function of the distance from the lightning, the time of day, latitude and more,” Cohen said. “It would take a lot of real-time computation and knowledge of sophisticated physics to synthesize the lightning signals.”

Working with two different electric utilities, the researchers – including graduate research assistant Tohid Shekari – analyzed the RF signals produced when breakers were turned off for substation maintenance. They also used computer simulations to study a potential attack against the systems.

“The signal from a lightning stroke is very distinct – it is short, around a millisecond, and covers a huge frequency range,” Cohen added. “The only other process on Earth that is known to generate something similar is a nuclear explosion. The emissions from the power grid are very different and none of it looks like a pulse from lightning, so it is easy enough to separate the signals.”

The researchers have filed a provisional patent on RFDIDS, and hope to further refine the security strategy, which independent of equipment manufacturer. Beyah believes there could be applications beyond the power industry for remote monitoring of other RF-emitting devices. The system could tell transit operators if a train were present, for example.

See Also
Washington University in St. Louis seniors (from left) Kranti Peddada, Kendall Gretsch and Henry Lather designed and built a robotic prosthetic arm for 13-year-old Sydney Kendall (center left). Sydney requested that her new arm be pink.

“The power grid is our most critical piece of infrastructure,” Beyah notes. “Nothing else matters if you don’t have electrical power.”

Learn more: Signals from distant lightning could help secure electric substations

 

 

The Latest on: Radio frequency-based distributed intrusion detection system

[google_news title=”” keyword=”radio frequency-based distributed intrusion detection system” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]

via Google News

 

The Latest on: Radio frequency-based distributed intrusion detection system
  • Fortifying Cyber Defense With the Power of Linux Intrusion Detection and Prevention Systems
    on April 24, 2024 at 5:00 pm

    Intrusion Detection and Prevention Systems (IDPS) are security tools designed to detect and respond to unauthorized access attempts or malicious activities within a network or on individual systems.

  • Radio Frequency Identification (RFID): What It Is, How It Works
    on April 23, 2024 at 12:29 pm

    Radio Frequency Identification (RFID) is a type of passive wireless technology that allows for tracking or matching of an item or individual. The system has two basic parts: tags and readers.

  • Better security for residents with intrusion detection system
    on April 13, 2024 at 5:00 pm

    Residents of Setia Eco Glades can sleep easy as they will be protected by the first-of-its kind perimeter intrusion detection and security system, An agreement was recently signed with Sin-gapore ...

  • The Best Smart Home Security Systems for 2024
    on April 9, 2024 at 5:00 pm

    The Vivint Smart Home security system is a full-blown home security system that gives you 24/7 monitoring and full control over door locks, cameras, thermostats, and lights. You can even monitor ...

  • The Best Smart Home Security Systems for 2024
    on April 9, 2024 at 5:00 pm

    The Vivint Smart Home security system is a full-blown home security system that gives you 24/7 monitoring and full control over door locks, cameras, thermostats, and lights. You can even monitor ...

  • MSIT.5430 Intrusion Detection Systems (Formerly 94.543)
    on February 28, 2024 at 8:21 pm

    Intrusion Detection Systems is a survey of the hardware and software techniques that are applied to the detection, identification, classification and remediation of compromised information systems.

  • Energous Corp.
    on December 20, 2023 at 10:29 pm

    that enables radio frequency based charging for electronic devices. The company was founded by Michael Aaron Leabman on October 30, 2012 and is headquartered in San Jose, CA.

  • Review: Wireless Intrusion-Detection/Prevention Systems
    on December 15, 2023 at 1:51 pm

    in "Watching the Waves", we called them distributed wireless security monitors. Last year, in "Time To Tighten the Wireless Net", we went with wireless intrusion-detection systems. This year ...

  • Intrusion detection
    on July 30, 2018 at 2:06 am

    Now, admins can set up an integration between Jamf Pro and Slack or Microsoft Teams with automated alerts based on specific criteria such ... audit endpoint activities while aiding with intrusion ...

  • Intrusion detection
    on October 9, 2016 at 10:10 am

    This simplifies the use of the camera for AI-based image analyses with classification, object recognition, and anomaly detection methods ... Access control, CCTV, and intrusion Having worked with many ...

via  Bing News

 

What's Your Reaction?
Don't Like it!
0
I Like it!
0
Scroll To Top