BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20260309T223403Z
UID:FC2874FB-973A-4936-B67B-0478B1EC65A2
DTSTART;TZID=America/New_York:20250818T090000
DTEND;TZID=America/New_York:20250818T100000
DESCRIPTION:The development of innovative cybersecurity technologies\, tool
 s\, and methodologies that advance the energy system’s ability to surviv
 e cyber-attacks and incidents while sustaining critical functions is neede
 d for the secure operation of utility and industrial systems. It is essent
 ial to verify and validate the ability of the developed solutions and meth
 odologies so that they can be effectively used in practice. Developing sol
 utions to mitigate cyber vulnerabilities throughout the energy delivery sy
 stem is essential to protect hardware assets. It will also make systems le
 ss susceptible to cyber threats and provide reliable delivery of electrici
 ty if a cyber incident occurs.\n\nThis talk will describe how the develope
 d solution can protect the power grid and industrial infrastructure from c
 yber-attacks and build cybersecurity protection into emerging power grid c
 omponents and services. This includes microgrid and demand-side management
  components and protecting the network (substations and productivity lines
 ) and data infrastructure (SCADA) to increase the resilience of the energy
  delivery systems against cyber-attacks. These developments will also help
  utility security systems manage large amounts of cybersecurity risk data 
 and cybersecurity operations. For these developments to succeed\, cybersec
 urity testbeds and testing methodologies are necessary to evaluate the eff
 ectiveness of any proposed security technologies.\n\nThe focus on developi
 ng cybersecurity capabilities in energy systems should span over multiple 
 strategies: in the near term\, midterm\, and long term. Continuous securit
 y state monitoring across cyber-physical domains is the goal in the near t
 erm. The development of continually defending interoperable components tha
 t continue operating in degraded conditions is required in the midterm. De
 veloping methodologies to mitigate cyber incidents to return to normal ope
 rations quickly is necessary for all system components in the long term. W
 e will discuss R&amp;D efforts in these areas centered on developing operation
 al frameworks related to communication and interoperability\, control\, an
 d protection.\n\nThe importance of interoperability between smart grid app
 lications and multi-vendor devices must be considered. The current grid co
 mprises multi-vendor devices and multi-lingual applications that add to th
 e complexity of integrating and securing the smart grid components. Standa
 rds development entities have been working with utilities\, vendors\, and 
 regulatory bodies to develop standards that address smart grid interoperab
 ility. These include IEEE\, IEC\, NIST\, ANSI\, NERC\, and others. In this
  presentation\, we will conceptualize a comprehensive cyber-physical platf
 orm that involves the communication and power network sides integrating th
 e cyber information flow\, physical information flow\, and the interaction
  between them. A data-centric communication middleware provides a common-d
 ata bus to orchestrate the system’s components\, leading to an expandabl
 e multi-lingual system. We will present a hardware protocol gateway that w
 as developed as a protocol translator capable of mapping IEC 61850 generic
  object-oriented substation event (GOOSE) and sampled measured value (SMV)
  messages into the data-centric Data Distribution Service (DDS) global dat
 a bus. This is necessary for integrating the widely used IEC 61850-based d
 evices into an exhaustive microgrid control and security framework.\n\nWe 
 will also discuss a scalable cloud-based Multi-Agent System for controllin
 g large-scale penetration of Electric Vehicles (EVs) and their infrastruct
 ure into the power grid. This is a system that can survive cyber-attacks w
 hile sustaining critical functions. This framework’s network will be ass
 essed by applying contingencies and identifying the resulting signatures f
 or detection in real-time operation. As a result\, protective measures can
  be taken to address the dynamic threats in the foreseen grid-integrated E
 V parks where the developed system will have an automated response to a cy
 ber-attack.\n\nIn distributed energy management systems\, the protection s
 ystem must be adaptive. Communication networks assist in reacting to dynam
 ic changes in the microgrid configurations. This presentation will also de
 scribe a newly developed protection scheme with extensive communication pr
 ovided by the IEC 61850 standard for power networks to monitor the microgr
 id during these dynamic changes. The robustness and availability of the co
 mmunication infrastructure are required for the success of protection meas
 ures. This adaptive protection scheme for AC microgrids can survive commun
 ication failures through energy storage systems.\n\nCo-sponsored by: Power
  Electronics/Industrial Electronics\n\nSpeaker(s): Osama\, \n\nRoom: UA114
 0\, Bldg: UA\, 2000 Simcoe Street North\, Oshawa\, Ontario\, Canada\, L1G7
 K4
LOCATION:Room: UA1140\, Bldg: UA\, 2000 Simcoe Street North\, Oshawa\, Onta
 rio\, Canada\, L1G7K4
ORGANIZER:mohamed.youssef@ontariotechu.ca
SEQUENCE:10
SUMMARY:Energy Cyber-Physical Systems and their Communication and Control C
 hallenges for Operational Security in Industrial Systems
URL;VALUE=URI:https://events.vtools.ieee.org/m/466650
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0i
 n\; text-align: justify\; line-height: normal\;&quot;&gt;&lt;span style=&quot;mso-bidi-fon
 t-size: 12.0pt\; font-family: &#39;Times New Roman&#39;\,serif\;&quot;&gt;The development 
 of innovative cybersecurity technologies\, tools\, and methodologies that 
 advance the energy system&amp;rsquo\;s ability to survive cyber-attacks and in
 cidents while sustaining critical functions is needed for the secure opera
 tion of utility and industrial systems. It is essential to verify and vali
 date the ability of the developed solutions and methodologies so that they
  can be effectively used in practice. Developing solutions to mitigate cyb
 er vulnerabilities throughout the energy delivery system is essential to p
 rotect hardware assets. It will also make systems less susceptible to cybe
 r threats and provide reliable delivery of electricity if a cyber incident
  occurs. &lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0in\; tex
 t-align: justify\; line-height: normal\;&quot;&gt;&lt;span style=&quot;mso-bidi-font-size:
  12.0pt\; font-family: &#39;Times New Roman&#39;\,serif\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p 
 class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0in\; text-align: justify\; line-h
 eight: normal\;&quot;&gt;&lt;span style=&quot;mso-bidi-font-size: 12.0pt\; font-family: &#39;T
 imes New Roman&#39;\,serif\;&quot;&gt;This talk will describe how the developed soluti
 on can &lt;span style=&quot;mso-bidi-font-weight: bold\;&quot;&gt;protect the power grid a
 nd industrial infrastructure from cyber-attacks&lt;/span&gt; and &lt;span style=&quot;ms
 o-bidi-font-weight: bold\;&quot;&gt;build cybersecurity protection into emerging p
 ower grid components and services. This includes microgrid and demand-side
  management components and protecting the network (substations and product
 ivity lines) and data infrastructure (SCADA) to increase the resilience of
  the energy delivery systems against cyber-attacks. These developments wil
 l also&lt;/span&gt; &lt;span style=&quot;mso-bidi-font-weight: bold\;&quot;&gt;help utility secu
 rity systems manage large amounts of cybersecurity risk data and cybersecu
 rity operations. For these developments to succeed\, &lt;/span&gt;cybersecurity 
 testbeds and testing methodologies are necessary to &lt;span style=&quot;mso-bidi-
 font-weight: bold\;&quot;&gt;evaluate the effectiveness of any proposed security t
 echnologies&lt;/span&gt;.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:
  0in\; text-align: justify\; line-height: normal\;&quot;&gt;&lt;span style=&quot;mso-bidi-
 font-size: 12.0pt\; font-family: &#39;Times New Roman&#39;\,serif\;&quot;&gt;&amp;nbsp\;&lt;/span
 &gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0in\; text-align: justif
 y\; line-height: normal\;&quot;&gt;&lt;span style=&quot;mso-bidi-font-size: 12.0pt\; font-
 family: &#39;Times New Roman&#39;\,serif\;&quot;&gt;The focus on developing cybersecurity 
 capabilities in energy systems should span over multiple strategies: in th
 e near term\, midterm\, and long term. Continuous security state monitorin
 g across cyber-physical domains is the goal in the near term. The developm
 ent of continually defending interoperable components that continue operat
 ing in degraded conditions is required in the midterm. Developing methodol
 ogies to mitigate cyber incidents to return to normal operations quickly i
 s necessary for all system components in the long term. We will discuss R&amp;
 amp\;D efforts in these areas centered on developing operational framework
 s related to communication and interoperability\, control\, and protection
 .&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0in\; text-align:
  justify\; line-height: normal\;&quot;&gt;&lt;span style=&quot;mso-bidi-font-size: 12.0pt\
 ; font-family: &#39;Times New Roman&#39;\,serif\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;M
 soNormal&quot; style=&quot;margin-bottom: 0in\; text-align: justify\; line-height: n
 ormal\;&quot;&gt;&lt;span style=&quot;mso-bidi-font-size: 12.0pt\; font-family: &#39;Times New
  Roman&#39;\,serif\;&quot;&gt;The importance of interoperability between smart grid ap
 plications and multi-vendor devices must be considered. The current grid c
 omprises multi-vendor devices and multi-lingual applications that add to t
 he complexity of integrating and securing the smart grid components. Stand
 ards development entities have been working with utilities\, vendors\, and
  regulatory bodies to develop standards that address smart grid interopera
 bility. These include IEEE\, IEC\, NIST\, ANSI\, NERC\, and others. In thi
 s presentation\, we will conceptualize a comprehensive cyber-physical plat
 form that involves the communication and power network sides integrating t
 he cyber information flow\, physical information flow\, and the interactio
 n between them. A data-centric communication middleware provides a common-
 data bus to orchestrate the system&amp;rsquo\;s components\, leading to an exp
 andable multi-lingual system. We will present a hardware protocol gateway 
 that was developed as a protocol translator capable of mapping IEC 61850 g
 eneric object-oriented substation event (GOOSE) and sampled measured value
  (SMV) messages into the data-centric Data Distribution Service (DDS) glob
 al data bus. This is necessary for integrating the widely used IEC 61850-b
 ased devices into an exhaustive microgrid control and security framework.&lt;
 /span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0in\; text-align: j
 ustify\; line-height: normal\;&quot;&gt;&lt;span style=&quot;mso-bidi-font-size: 12.0pt\; 
 font-family: &#39;Times New Roman&#39;\,serif\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;Mso
 Normal&quot; style=&quot;margin-bottom: 0in\; text-align: justify\; line-height: nor
 mal\;&quot;&gt;&lt;span style=&quot;mso-bidi-font-size: 12.0pt\; font-family: &#39;Times New R
 oman&#39;\,serif\;&quot;&gt;We will also discuss a scalable cloud-based Multi-Agent Sy
 stem for controlling large-scale penetration of Electric Vehicles (EVs) an
 d their infrastructure into the power grid. This is a system that can surv
 ive cyber-attacks while sustaining critical functions. This framework&amp;rsqu
 o\;s network will be assessed by applying contingencies and identifying th
 e resulting signatures for detection in real-time operation. As a result\,
  protective measures can be taken to address the dynamic threats in the fo
 reseen grid-integrated EV parks where the developed system will have an au
 tomated response to a cyber-attack.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style
 =&quot;margin-bottom: 0in\; text-align: justify\; line-height: normal\;&quot;&gt;&lt;span 
 style=&quot;mso-bidi-font-size: 12.0pt\; font-family: &#39;Times New Roman&#39;\,serif\
 ; mso-ascii-theme-font: major-bidi\; mso-hansi-theme-font: major-bidi\; ms
 o-bidi-theme-font: major-bidi\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; 
 style=&quot;margin-bottom: 0in\; text-align: justify\; line-height: normal\;&quot;&gt;&lt;
 span style=&quot;mso-bidi-font-size: 12.0pt\; font-family: &#39;Times New Roman&#39;\,s
 erif\; mso-ascii-theme-font: major-bidi\; mso-hansi-theme-font: major-bidi
 \; mso-bidi-theme-font: major-bidi\;&quot;&gt;In distributed energy management sys
 tems\, the protection system must be adaptive. Communication networks assi
 st in reacting to dynamic changes in the microgrid configurations. This pr
 esentation will also describe a newly developed protection scheme with ext
 ensive communication provided by the IEC 61850 standard for power networks
  to monitor the microgrid during these dynamic changes. The robustness and
  availability of the communication infrastructure are required for the suc
 cess of protection measures. This adaptive protection scheme for AC microg
 rids can survive communication failures through energy storage systems. &lt;/
 span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

