skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Using simulators to assess knowledge and behavior of “novice” operators of critical infrastructure under cyberattack events

Abstract

—The transition from the traditional power grid to the smart grid improves reliability, performance, and management, while simultaneously increasing its susceptibility to cyberattacks. One of the biggest weaknesses in grid security is the human agent responsible for its maintenance and operations. As such, it is crucial to embed hands-on understanding of grid operations and security, especially for students in the Electrical and Computer Engineering (ECE) fields. This paper presents a case study where ECE students from Temple University used an interactive microgrid simulator, "Grid Game", a program developed by Idaho National Laboratory. This case study offers insights into the ECE students’ understanding of key engineering principles (microgrid stability, generation control system, generator inertia, energy storage, and grid security) gained by using the simulator program. Furthermore, the human behavior (strategies to prepare for and respond to cyberattacks, and cooperation and conflict in decision-making) of defenders/ECE students as they experience cyberattacks are also discussed. The paper then offers some limitations and possible suggestions for future research.

Authors:
; ; ; ;
Publication Date:
Research Org.:
Idaho National Lab. (INL), Idaho Falls, ID (United States)
Sponsoring Org.:
USDOE Office of Nuclear Energy (NE)
OSTI Identifier:
1414447
Report Number(s):
INL/CON-17-42143
DOE Contract Number:  
DE-AC07-05ID14517
Resource Type:
Conference
Resource Relation:
Conference: Resilience Week, Newark, DE, USA, September 18–22, 2017
Country of Publication:
United States
Language:
English
Subject:
24 POWER TRANSMISSION AND DISTRIBUTION; Critical Infrastructure; Cybersecurity; Gamification

Citation Formats

Rege, A., Biswas, S., Bai, L., Parker, E., and McJunkin, T. R. Using simulators to assess knowledge and behavior of “novice” operators of critical infrastructure under cyberattack events. United States: N. p., 2017. Web. doi:10.1109/RWEEK.2017.8088647.
Rege, A., Biswas, S., Bai, L., Parker, E., & McJunkin, T. R. Using simulators to assess knowledge and behavior of “novice” operators of critical infrastructure under cyberattack events. United States. doi:10.1109/RWEEK.2017.8088647.
Rege, A., Biswas, S., Bai, L., Parker, E., and McJunkin, T. R. Mon . "Using simulators to assess knowledge and behavior of “novice” operators of critical infrastructure under cyberattack events". United States. doi:10.1109/RWEEK.2017.8088647. https://www.osti.gov/servlets/purl/1414447.
@article{osti_1414447,
title = {Using simulators to assess knowledge and behavior of “novice” operators of critical infrastructure under cyberattack events},
author = {Rege, A. and Biswas, S. and Bai, L. and Parker, E. and McJunkin, T. R.},
abstractNote = {—The transition from the traditional power grid to the smart grid improves reliability, performance, and management, while simultaneously increasing its susceptibility to cyberattacks. One of the biggest weaknesses in grid security is the human agent responsible for its maintenance and operations. As such, it is crucial to embed hands-on understanding of grid operations and security, especially for students in the Electrical and Computer Engineering (ECE) fields. This paper presents a case study where ECE students from Temple University used an interactive microgrid simulator, "Grid Game", a program developed by Idaho National Laboratory. This case study offers insights into the ECE students’ understanding of key engineering principles (microgrid stability, generation control system, generator inertia, energy storage, and grid security) gained by using the simulator program. Furthermore, the human behavior (strategies to prepare for and respond to cyberattacks, and cooperation and conflict in decision-making) of defenders/ECE students as they experience cyberattacks are also discussed. The paper then offers some limitations and possible suggestions for future research.},
doi = {10.1109/RWEEK.2017.8088647},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2017},
month = {5}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: