skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Lemnos Interoperable Security Program

Technical Report ·
DOI:https://doi.org/10.2172/1051509· OSTI ID:1051509
 [1];  [2];  [2];  [3];  [4]
  1. Tennessee Valley Authority, Knoxville, TN (United States)
  2. Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
  3. Schweitzer Engineering Laboratories, Chattanooga, TN (United States)
  4. Teumim Technical, Allentown, PA (United States)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.

Research Organization:
Enernex Corporation, Knoxville, TN (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
FC26-07NT43315
OSTI ID:
1051509
Country of Publication:
United States
Language:
English

Similar Records

Lemnos interoperable security project.
Conference · Mon Mar 01 00:00:00 EST 2010 · OSTI ID:1051509

GRIDCHAIN: AN AUDITABLE BLOCKCHAIN FOR SMART GRID DATA INTEGRITY AND IMMUTABILITY
Technical Report · Tue Mar 31 00:00:00 EDT 2020 · OSTI ID:1051509

Recommended Practice: Creating Cyber Forensics Plans for Control Systems
Technical Report · Fri Aug 01 00:00:00 EDT 2008 · OSTI ID:1051509