{"id":1408,"date":"2025-07-30T13:32:11","date_gmt":"2025-07-30T17:32:11","guid":{"rendered":"https:\/\/web.uri.edu\/decps\/?page_id=1408"},"modified":"2025-07-31T15:05:00","modified_gmt":"2025-07-31T19:05:00","slug":"cps","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/decps\/research\/cps\/","title":{"rendered":"CPS &amp; IOT &#8211; Power Grids"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Grid-Smart Cybersecurity: Where Watts Meet Bits<\/h2>\n\n\n\n<p style=\"font-size:18px;margin-bottom:12px;line-height:1.8\">\nModern grids depend on tightly coordinated cyber-physical interactions, yet most off-the-shelf security tools were built for traditional IT networks, not for the unique timing, protocols, and dynamic behaviors of smart power grids. Consequently, subtle manipulations of control commands can induce dangerous oscillations without ever tripping a system- or network-level alarm, and compromised measurement devices can blind operators without raising suspicion.\n<\/p>\n\n\n\n<p style=\"font-size:18px;margin-bottom:12px;line-height:1.8\">\nTo close these gaps, we infuse every security layer with deep power-grid expertise, enabling true real-time attack detection and disruption mitigation:\n<ul style=\"font-size: 18px;margin-bottom:6px\">\n   <li style=\"line-height:1.6\"><b>Runtime Semantic Analysis<\/b>: We extend the Zeek network-analyzer interface with custom detection logic that transforms raw control packets into real-time power-flow simulations. This lets us spot attackers\u2019 malicious intentions the moment they emerge.<\/li>\n   <li style=\"line-height:1.6\"><b>Self-Healing PMU Networks<\/b>: Leveraging SDN-enabled programmability, we dynamically rewire phasor-measurement streams to isolate any hijacked sensor and reroute trusted data\u2014ensuring full situational awareness even under attack.<\/li>\n<\/ul> \n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Grid-Smart Cybersecurity: Where Watts Meet Bits Modern grids depend on tightly coordinated cyber-physical interactions, yet most off-the-shelf security tools were built for traditional IT networks, not for the unique timing, protocols, and dynamic behaviors of smart power grids. Consequently, subtle manipulations of control commands can induce dangerous oscillations without ever tripping a system- or network-level [&hellip;]<\/p>\n","protected":false},"author":3827,"featured_media":0,"parent":710,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-1408","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/1408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/users\/3827"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/comments?post=1408"}],"version-history":[{"count":4,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/1408\/revisions"}],"predecessor-version":[{"id":1527,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/1408\/revisions\/1527"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/710"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/media?parent=1408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}