{"id":351,"date":"2023-07-20T12:05:32","date_gmt":"2023-07-20T16:05:32","guid":{"rendered":"https:\/\/mooney.gatech.edu\/security\/?page_id=351"},"modified":"2024-10-23T11:33:50","modified_gmt":"2024-10-23T15:33:50","slug":"gridtrust","status":"publish","type":"page","link":"https:\/\/mooney.gatech.edu\/security\/gridtrust\/","title":{"rendered":"GridTrust: Electricity Grid Root-of-Trust Decentralized Supply Chain Cyber-Security"},"content":{"rendered":"\r\n<h1><strong><span style=\"font-size: 24pt;\">GridTrust: Electricity Grid Root-of-Trust Decentralized Supply Chain Cyber-Security<\/span><\/strong><\/h1>\r\n<div class=\"wp-block-image is-style-default\">\r\n<figure class=\"aligncenter size-large is-resized\"><a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_overview.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-353\" src=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_overview-1024x280.png\" alt=\"\" width=\"861\" height=\"235\" srcset=\"https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_overview-1024x280.png 1024w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_overview-300x82.png 300w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_overview-768x210.png 768w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_overview-1536x420.png 1536w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_overview-2048x559.png 2048w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a>\r\n<figcaption class=\"wp-element-caption\">Figure 1: Standard software update process for a device in a substation<\/figcaption>\r\n<\/figure>\r\n<\/div>\r\n\r\n\r\n<p>Hardware\/software co-designed systems are increasingly prevalent due to trends such as the adoption of hardware accelerators and the availability of heterogeneous system-on-chip (SoC) architectures. A potential security concern arising from hardware\/software interaction in heterogeneous computing architectures is the possibility of software-based attacks on reconfigurable hardware, and vice versa. This is especially important when considering remote updates of the software, hardware, or both combined. In this work, we have created a remote update scheme that relies on a physical unclonable function (PUF) and multiple updating parties to deliver hardware\/software updates in a secure fashion. The scheme, GridTrust, provides a high level of assurance that the system only accepts updates from approved entities while also preventing common remote attacks from compromising the security of the update process.\u00a0 As shown above, an attacker has multiple opportunities to attack. GridTrust&#8217;s protection features help to prevent any single attack from the locations shown in Figure 1 from succeeding.<\/p>\r\n<p>The GridTrust scheme follows a few key tenets; (1) the usage of auditable open-source software, (2) software update authorization via two distinct entities, (3) and device authentication via a hardware fingerprinting technique known as a PUF. Used together, these techniques harden cybersecurity defenses in the electric grid supply chain against both a third-party actor and a malicious lone-wolf insider.<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><strong><a href=\"https:\/\/mooney.gatech.edu\/security\/gridtrust\/implementation\"><span style=\"font-size: 18pt;\">Implementing GridTrust<\/span><\/a><\/strong><\/p>\r\n<h2>Collaborators<\/h2>\r\n<ul>\r\n<li><a href=\"https:\/\/ece.gatech.edu\/directory\/santiago-carlos-grijalva\">Dr. Santiago Grijalva<\/a><\/li>\r\n<li><a href=\"https:\/\/mooney.gatech.edu\/\">Dr. Vincent Mooney<\/a><\/li>\r\n<li><a href=\"https:\/\/gtri.gatech.edu\/professional-education\/dr-trevor-lewis-discovering-unknown-problems-designing-future-cyber\">Dr. Trevor Lewis<\/a><\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<h2><strong>Publications<\/strong><\/h2>\r\n<ul>\r\n<li>J. Keller, S. Paul, K. Hutto, S. Grijalva, V. Mooney, \u201cDeveloping Simulation Capabilities for Supply Chain Cybersecurity of the Electricity Grid,\u201d <u>2023 IEEE PES Innovative Smart Grid Technologies Latin America<\/u>, November 2023.<\/li>\r\n<\/ul>\r\n<p>J. Keller, S. Paul, S. Grijalva, V. Mooney, \u201c<a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2022\/11\/Experimental-Setup-for-Grid-Control-Device-Software-Updates-in-Supply-Chain-Cyber-Security.pdf\">Experimental Setup for Grid Control Device Software Updates in Supply Chain Cyber-Security<\/a>,\u201d 2022 54<sup>th<\/sup> North American Power Symposium (NAPS\u201922), October 2022. <a href=\"https:\/\/mooney.gatech.edu\/security\/projects\/secure_computation\/\"><span style=\"font-size: 10pt;\">Presentation (pdf)<\/span><\/a><\/p>\r\n<p>K. Hutto, S. Paul, B. Newberg, V. Boyapati, Y. Vunnam, S. Grijalva, V. Mooney, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9814751\">PUF-Based Two-Factor Authentication Protocol for Securing the Power Grid Against Insider Threat<\/a>,&#8221; Kansas Power and Energy Conference (KPEC&#8217;22), April 2022. <a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/KPEC-Presentation.pdf\"><span style=\"font-size: 10pt;\">Presentation (pdf)<\/span><\/a><\/p>\r\n<p>B. Newberg, S. Grijalva, V. Mooney, &#8220;<a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2022\/02\/2022006176_revised.pdf\">Open-Source Architecture for Multi-Party Update Verification for Data Acquistion Devices<\/a>,&#8221; Power and Energy Conference at Illinois, March 2022. <a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/PECI_GT_2022.pdf\"><span style=\"font-size: 10pt;\">Presentation (pdf)<\/span><\/a><\/p>\r\n<p>K. Hutto, S. Grijalva, V. Mooney, &#8220;<a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2022\/02\/2022017610.pdf\">Hardware-Based Randomized Encoding for Sensor Authentication in Power Grid SCADA Systems<\/a>,&#8221; 2022 Texas Power and Energy Conference, February 2022. <span style=\"font-size: 10pt;\"><a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/RanCode-TPEC-Presentation.pdf\">Presentation (pdf)<\/a><\/span><\/p>\r\n<h2><strong>Contact Info<\/strong><\/h2>\r\n<ul>\r\n<li>For questions, please contact Arman Allahverdi at aallahverdi3@gatech.edu<\/li>\r\n<\/ul>\r\n<h2><strong>Support<\/strong><\/h2>\r\n<p><span dir=\"ltr\" role=\"presentation\">This work was supported in part by The US Department of Energy<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Office of Cyber-Security, Energy Security and Emergency Response (CESER),<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Cybersecurity for Energy Delivery Systems (CEDS) Award to the Georgia<\/span><br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\">Institute of Technology, # DE-CR0000004.<\/span><\/p>\r\n<p><a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_partners2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-538\" src=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_partners2.png\" alt=\"\" width=\"512\" height=\"367\" srcset=\"https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_partners2.png 1376w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_partners2-300x215.png 300w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_partners2-1024x735.png 1024w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2023\/07\/gridtrust_partners2-768x551.png 768w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>GridTrust: Electricity Grid Root-of-Trust Decentralized Supply Chain Cyber-Security Hardware\/software co-designed systems are increasingly prevalent due to trends such as the adoption of hardware accelerators and the availability of heterogeneous system-on-chip (SoC) architectures. A potential security concern arising from hardware\/software interaction in heterogeneous computing architectures is the possibility of software-based attacks on reconfigurable hardware, and vice &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/mooney.gatech.edu\/security\/gridtrust\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;GridTrust: Electricity Grid Root-of-Trust Decentralized Supply Chain Cyber-Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"folder":[12],"class_list":["post-351","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/comments?post=351"}],"version-history":[{"count":34,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/351\/revisions"}],"predecessor-version":[{"id":649,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/351\/revisions\/649"}],"wp:attachment":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/media?parent=351"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/folder?post=351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}