. Military Space News .
CYBER WARS
Signals from distant lightning could help secure electric substations
by Staff Writers
Atlanta GA (SPX) Feb 28, 2019

file image

Side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations and other critical infrastructure, a new study suggests.

By analyzing electromagnetic signals emitted by substation components using an independent monitoring system, security personnel could tell if switches and transformers were being tampered with in remote equipment. Background lightning signals from thousands of miles away would authenticate those signals, preventing malicious actors from injecting fake monitoring information into the system.

The research, done by engineers at the Georgia Institute of Technology, has been tested at substations with two different electric utilities, and by extensive modeling and simulation. Known as radio frequency-based distributed intrusion detection system (RFDIDS), the technique will be described February 26 at the 2019 Network and Distributed System Security Symposium (NDSS) in San Diego.

"We should be able to remotely detect any attack that is modifying the magnetic field around substation components," said Raheem Beyah, Motorola Foundation Professor in Georgia Tech's School of Electrical and Computer Engineering. "We are using a physical phenomenon to determine whether a certain action at a substation has occurred or not."

Opening substation breakers to cause a blackout is one potential power grid attack, and in December 2015, that technique was used to shut off power to 230,000 persons in the Ukraine. Attackers opened breakers in 30 substations and hacked into monitoring systems to convince power grid operators that the grid was operating normally. Topping that off, they also attacked call centers to prevent customers from telling operators what was happening.

"The electric power grid is difficult to secure because it is so massive," Beyah said. "It provides an electrical connection from a generating station to the appliances in your home. Because of this electrical connection, there are many places where a hacker could potentially insert an attack. That's why we need an independent way to know what's happening on grid systems."

That independent approach would use an antenna located in or near a substation to detect the unique radio-frequency "side channel" signatures produced by the equipment. The monitoring would be independent of systems now used to monitor and control the grid.

"Without trusting anything at all on the grid, we can use an RF receiver to determine if an impulse occurred in the shape of an 'open' operation," Beyah said. "The system operates at 60 Hertz, and there are few other systems that operate there, so we can be sure of what we're monitoring."

However, hackers might be able to figure out how to insert fake signals to hide their attacks. That's where the lightning emissions known as "sferics" come in.

"When a lightning flash hits the ground, it forms an electrical path miles tall, potentially carrying hundreds of thousands of amps of current, so that makes for a really powerful antenna radiating energy," said Morris Cohen, an associate professor in the Georgia Tech School of Electrical and Computer Engineering. Each flash creates signals in the very low frequency (VLF) band, which can reflect from the upper atmosphere to travel long distances.

"Signals from lightning can zigzag back and forth and make it all the way around the world," Cohen noted. "Lightning from South America, for example, is easily detectable in Atlanta. We've even seen lightning echo multiple times around the world."

Security staff remotely monitoring substations would be able compare the lightning behind the 60 Hz substation signals to lightning data from other sources, such as one of the 70,000 or so other substations in the United States or a global lightning database. That would authenticate the information. Since lightning occurs more than three million times every day on average, there is plenty of opportunity to authenticate, he noted.

"Even if you could synthesize the RF receiver's data feed digitally, generating something realistic would be difficult because the shape of the pulse from lightning detected by our receivers varies as a function of the distance from the lightning, the time of day, latitude and more," Cohen said. "It would take a lot of real-time computation and knowledge of sophisticated physics to synthesize the lightning signals."

Working with two different electric utilities, the researchers - including graduate research assistant Tohid Shekari - analyzed the RF signals produced when breakers were turned off for substation maintenance. They also used computer simulations to study a potential attack against the systems.

"The signal from a lightning stroke is very distinct - it is short, around a millisecond, and covers a huge frequency range," Cohen added. "The only other process on Earth that is known to generate something similar is a nuclear explosion. The emissions from the power grid are very different and none of it looks like a pulse from lightning, so it is easy enough to separate the signals."

The researchers have filed a provisional patent on RFDIDS, and hope to further refine the security strategy, which independent of equipment manufacturer. Beyah believes there could be applications beyond the power industry for remote monitoring of other RF-emitting devices. The system could tell transit operators if a train were present, for example.

"The power grid is our most critical piece of infrastructure," Beyah notes. "Nothing else matters if you don't have electrical power."

In addition to those already mentioned, the research team also included recent master's degree graduate Christian Bayens and assistant professor Lukas Graber, both from Georgia Tech.

Research Report: "RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid"


Related Links
Georgia Institute of Technology
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Warning issued over attacks on internet infrastructur
San Francisco (AFP) Feb 23, 2019
Key parts of the internet infrastructure face large-scale attacks that threaten the global system of web traffic, the internet's address keeper warned Friday. The Internet Corporation for Assigned Names and Numbers (ICANN) declared after an emergency meeting "an ongoing and significant risk" to key parts of the infrastructure that affects the domains on which websites reside. "They are going after the internet infrastructure itself," ICANN chief technology officer David Conrad told AFP. "The ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Poland to buy US rocket system for $414 million

U.S. Army to purchase Israel's Iron Dome anti-missile system

US Army to buy two Israeli Iron Dome air defense systems

Raytheon, Lockheed contracted for Patriot systems for foreign customers

CYBER WARS
Lockheed awarded $33.4M for cost reduction work on LRASM

Saab contracted to upgrade Australian Army's rocket warning system

Israel Aerospace Industries shows off 'loitering' missile at India air show

UAE signs major missile deals with US giant Raytheon

CYBER WARS
Exyn launches autonomous aerial robot for underground mine mapping and inspection

NASA tests urban drone traffic management in Nevada, Texas

Illegally drones pose an outsized risk for US aviation and the public

Hughes satellite modems power beyond-line-of-sight comms for UAVs

CYBER WARS
Raytheon awarded $406M for Army aircraft radio system

Lockheed Martin to develop cyber electronic warfare pod for UAVs

Britain to spend $1.3M for satellite antennas in light of Brexit

Reflectarray Antenna offers high performance in small package: DARPA

CYBER WARS
Army to test lighter body armor vest as part of total protection system

BAE awarded $575M for Armored Multi-Purpose Vehicle production

Saab to supply U.S. Army with M4 weapon system

State Dept. approves possible engine sale for Israeli armored vehicles

CYBER WARS
Germany under fire for Saudi arms export ban

British investigators drop probes on Rolls-Royce, GSK

How Shanahan may end up as permanent Pentagon chief

UAE announces more than $3B in defense deals at IDEX conference

CYBER WARS
Japan's Okinawa votes on controversial US base move

Okinawa 'no' vote won't delay US base move: Japan PM

US, Britain conduct security drills, training in South China Sea

Pompeo to visit Philippines amid China flirtation

CYBER WARS
Nanoparticle computing takes a giant step forward

A new spin in nano-electronics

Breakthrough nanoscience discovery made on flight from New York to Jerusalem

Customized mix of materials for three-dimensional micro- and nanostructures









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.