summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjaseg <git@jaseg.de>2022-09-16 14:46:04 +0200
committerjaseg <git@jaseg.de>2022-09-16 14:46:04 +0200
commite3b1ff9222cd2eef3374bd27bcd25adaf9ebc507 (patch)
treead72b680661bc354eebccb2073ae2388de2b837e
parent95fae0a340ec4ce003ce2f1db3a3c251a859c33b (diff)
downloadmaster-thesis-e3b1ff9222cd2eef3374bd27bcd25adaf9ebc507.tar.gz
master-thesis-e3b1ff9222cd2eef3374bd27bcd25adaf9ebc507.tar.bz2
master-thesis-e3b1ff9222cd2eef3374bd27bcd25adaf9ebc507.zip
Update paper template, update abstract
Update abstract w/ reviewer comments
-rw-r--r--paper/safety-reset-paper.tex79
1 files changed, 57 insertions, 22 deletions
diff --git a/paper/safety-reset-paper.tex b/paper/safety-reset-paper.tex
index f2004c6..521194b 100644
--- a/paper/safety-reset-paper.tex
+++ b/paper/safety-reset-paper.tex
@@ -1,4 +1,4 @@
-\documentclass[sigconf,anonymous]{acmart}
+\documentclass[sigconf]{acmart}
\usepackage[binary-units]{siunitx}
\DeclareSIUnit{\baud}{Bd}
@@ -14,17 +14,60 @@
\newcolumntype{P}[1]{>{\centering\arraybackslash}p{#1}}
\newcommand{\partnum}[1]{\texttt{#1}}
+% https://eepublicdownloads.entsoe.eu/clean-documents/pre2015/publications/entsoe/Operation_Handbook/Policy_1_Appendix%20_final.pdf
+
+%\keywords{Security, privacy and resilience in critical infrastructures \and Security and privacy in ``internet of
+%things'' \and Cyber-physical systems \and Hardware security \and Network Security \and Energy systems \and Signal theory}
+
+\copyrightyear{2022}
+\acmYear{2022}
+\setcopyright{acmlicensed}
+\acmConference[ACSAC 2022]{Annual Computer Security Applications Conference}{December 5--9, 2022}{Austin, USA}
+\acmBooktitle{Annual Computer Security Applications Conference (ACSAC 2022), December 5--9, 2022, Austin, USA}
+\acmPrice{XX.XX}
+\acmDOI{10.1145/XXXXXXX.XXXXXXX}
+\acmISBN{978-X-XXXX-XXXX-X/XX/XX}
+
\begin{document}
-% https://eepublicdownloads.entsoe.eu/clean-documents/pre2015/publications/entsoe/Operation_Handbook/Policy_1_Appendix%20_final.pdf
+\acmConference[ACSAC '22]{Annual Computer Security Applications
+Conference}{December 5--9}{Austin, TX, USA}
+
+\title{
+ Ripples in the Pond: Transmitting Information through Grid Frequency Modulation
+}
+
+\author{Jan Götte}
+\affiliation{
+ \institution{Technische Universität Darmstadt}
+ \city{Darmstadt}
+ \country{Germany}
+}
+\email{research@jaseg.de}
+
+\author{Liran Katzir}
+\affiliation{
+ \institution{Tel Aviv University}
+ \city{Tel Aviv}
+ \country{Israel}
+}
+\email{lirankat@tau.ac.il}
+
+\author{Björn Scheuermann}
+\affiliation{
+ \institution{Technische Universität Darmstadt}
+ \city{Darmstadt}
+ \country{Germany}
+}
+\email{scheuermann@kom.tu-darmstadt.de}
\begin{abstract}
- The dependence of the electrical grid on networked control systems is steadily rising. While utilities are defending
+ The dependence of the electrical grid on networked control systems is steadily rising. While utilities can defend
their side of the grid effectively through rigorous IT security measures such as physically separated control
- networks, the increasing number of networked devices on the consumer side such as smart meters or large
- IoT-connected appliances such as air conditioners are much harder to secure due to their heterogeneity. We consider
- a crisis scenario in which an attacker compromises a large number of consumer-side devices and modulates their
- electrical to destabilize the grid and cause an electrical outage~\cite{ctap+11,wu01,zlmz+21,kgma21,smp18,hcb19}.
+ networks, the increasingly large heterogenous ecosystem of networked devices on the consumer side such as smart
+ meters or large IoT-connected appliances such as air conditioners is much harder to secure. We consider a crisis
+ scenario in which an attacker compromises a large number of consumer-side devices and modulates their electrical
+ power to destabilize the grid and cause an electrical outage~\cite{ctap+11,wu01,zlmz+21,kgma21,smp18,hcb19}.
In this paper propose a broadcast channel based on the modulation of grid frequency through which utility operators
can issue commands to devices at the consumer premises both during an attack for mitigation and in its wake to aid
@@ -40,15 +83,7 @@
equipped with a prototype safety reset system based on an inexpensive commodity microcontroller.
\end{abstract}
-\date{}
-\title{\large\bf Ripples in the Pond:\\Transmitting Information through Grid Frequency Modulation}
-\author{{\rm Jan Sebastian Götte}\\TU Darmstadt \and {\rm Liran Katzir}\\Tel Aviv University\and {\rm Björn Scheuermann}\\TU Darmstadt}
-%\institute{TU Darmstadt\\ Communication Networks Lab\\ \email{safetyreset@jaseg.de}
-%\and Tel Aviv University\\ Faculty of Engineering\\ \email{lirankat@tau.ac.il}
-%\and TU Darmstadt\\ Communication Networks Lab\\ \email{scheuermann@informatik.hu-berlin.de}}
\maketitle
-%\keywords{Security, privacy and resilience in critical infrastructures \and Security and privacy in ``internet of
-%things'' \and Cyber-physical systems \and Hardware security \and Network Security \and Energy systems \and Signal theory}
\section{Introduction}
@@ -123,9 +158,9 @@ restored after the attack. One powerful function this allows is ``flushing out``
meters after an attack, before restoring smart meter internet connectivity.
Using simulations we have determined that control of a $\SI{25}{\mega\watt}$ load such as a large aluminium smelter,
-load bank or photovoltaic farm would allow for the transmission of a crytographically secured safety reset signal within
-$15$ minutes. We have designed and constructed a proof-of-concept prototype receiver that demonstrates the feasibility
-of decoding such signals on a resource-constrained microcontroller.
+load bank or photovoltaic farm would allow for the transmission of a cryptographically secured safety reset signal
+within $15$ minutes. We have designed and constructed a proof-of-concept prototype receiver that demonstrates the
+feasibility of decoding such signals on a resource-constrained microcontroller.
\subsection{Motivation}
@@ -221,8 +256,8 @@ frequency during day-to-day operations. Fast-acting automatic primary control st
while slower automatic secondary control and manual tertiary control re-adjust device's operating points back to their
nominal values after they have shifted due to primary control action.
-In day-to-day operation, the frequency of the electrical grid is maintained at a
-fixed, stable level through several layers of control systems.
+In day-to-day operation, the frequency of the electrical grid is maintained at a fixed, stable level through several
+layers of control systems.
\subsection{Black-start recovery}
@@ -786,5 +821,5 @@ Source code and EDA designs are available at the public repository listed at the
\center{
\footnotesize
\center{This is version \texttt{\input{version.tex}\unskip} of this paper, generated on \today.}
- \center{Source files and associated data for this work can be found in the git repository at the following URL: (URL elided for blind peer review)} }
-\end{document}
+ \center{Source files and associated data for this work can be found in the git repository at the following URL:
+ \url{https://git.jaseg.de/safety-reset.git} }