• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Monday, November 3, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Protecting bulk power systems from hackers

Bioengineer by Bioengineer
February 10, 2017
in Science News
Reading Time: 2 mins read
0
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram
IMAGE

Credit: Michigan Tech, Sarah Bird

Reliability measures of electrical grid has risen to a new norm as it involves physical security and cybersecurity. Threats to either can trigger instability, leading to blackouts and economic losses.

New research led by scientists from Michigan Technological University delves into so-called "nightmare" scenarios where hackers exploit security weaknesses and execute a disruptive plan of cyberattacks. The journal IEEE Transactions on Smart Grid published their work recently. Lead author Chee-Wooi Ten, an associate professor of electrical and computer engineering at Michigan Tech, says the fundamental problem is a gap between physical equipment and intangible software.

Hacked

Advances in smart grid technology–such as smart meters in homes, management systems for distributed energy resources like wind and solar production along with instrumentation systems in power plants, substations or control centers–create both improvements in monitoring and entry points for hackers.

"Ten years ago, cybersecurity simply didn't exist–it wasn't talked about and it wasn't a problem," Ten says, joking that people thought he was crazy for suggesting power grid hacking was possible. "Now with events like in Ukraine last year and malware like Stuxnet, where hackers can plan for a cyberattack that can cause larger power outages, people are starting to grasp the severity of the problem."

Ten points out that hackers target specific parts of the control network of power infrastructure and they focus on the mechanisms that control it. Automated systems control much of the grid from generation to transmission to use. As Ten puts it, the convenience and cost reduction of automation streamlines the process, but without solid security measures, it also makes the systems vulnerable. The interconnectedness of the grid can also cause cascading impacts leading to blackouts, equipment failure and islanding where regions become cut off and isolated from the main power grid.

Emerging Cybersecurity Threats

Ten and his team draw connections and assess weaknesses using a framework that would constantly assess the bottleneck of a power grid and its interconnection with their neighboring grids. Using quantitative methods to prioritize cybersecurity protection will ensure power grids are operated in a more secure and safer manner. Ten says it's like measuring blood pressure.

"You know your health is at risk because we monitor systolic and diastolic numbers, so perhaps you work out more or eat healthier," Ten says. "The grid needs established metrics for health too, a number to gauge if we are ready for this security challenge."

With a better understanding of the system's weaknesses, it's easier to be strategic and shore up security risks. In the long run, Ten says improving regulations with specifics to match actual infrastructure needs and providing cybersecurity insurance will help.

"Simply because the remote substation networks are constantly commissioned with full compliance doesn't mean they are secure," Ten says. "There is going to be a tremendous impact if we're negligent and fail to keep up with changes in communication infrastructure and emerging security threats."

###

Media Contact

Allison Mills
[email protected]
906-487-2343
@michigantech

http://www.mtu.edu

############

Story Source: Materials provided by Scienmag

Share12Tweet8Share2ShareShareShare2

Related Posts

Kids First Unveils Groundbreaking Dataset on Rare Childhood Germ Cell Tumors

November 3, 2025

Opioid Impact on Home Care in Dementia Patients

November 3, 2025

Exposure Science 2024: Health Risks to Vulnerable Groups

November 3, 2025

Dr. Xin Jin Awarded 2026 Peter Gruss Young Investigator Prize

November 3, 2025
Please login to join discussion

POPULAR NEWS

  • Sperm MicroRNAs: Crucial Mediators of Paternal Exercise Capacity Transmission

    1296 shares
    Share 518 Tweet 324
  • Stinkbug Leg Organ Hosts Symbiotic Fungi That Protect Eggs from Parasitic Wasps

    313 shares
    Share 125 Tweet 78
  • ESMO 2025: mRNA COVID Vaccines Enhance Efficacy of Cancer Immunotherapy

    204 shares
    Share 82 Tweet 51
  • New Study Suggests ALS and MS May Stem from Common Environmental Factor

    137 shares
    Share 55 Tweet 34

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Kids First Unveils Groundbreaking Dataset on Rare Childhood Germ Cell Tumors

Opioid Impact on Home Care in Dementia Patients

Exposure Science 2024: Health Risks to Vulnerable Groups

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 67 other subscribers
  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.