2,136 research outputs found

    Comparison of Routable Control System Security Approaches

    Get PDF
    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard

    Home Area Networks and the Smart Grid

    Full text link
    With the wide array of home area network (HAN) options being presented as solutions to smart grid challenges for the home, it is time to compare and contrast their strengths and weaknesses. This white paper examines leading and emerging HAN technologies. The emergence of the smart grid is bringing more networking players into the field. The need for low consistent bandwidth usage differs enough from the traditional information technology world to open the door to new technologies. The predominant players currently consist of a blend of the old and new. Within the wired world Ethernet and HomePlug Green PHY are leading the way with an advantage to HomePlug because it doesn't require installing new wires. In the wireless the realm there are many more competitors but WiFi and ZigBee seem to have the most momentum

    AMI Communication Requirements to Implement Demand-Response: Applicability of Hybrid Spread Spectrum Wireless

    Get PDF
    While holistically defining the smart grid is a challenge, one area of interest is demand-response. In 2009, the Department of Energy announced over $4 billion in grant and project funding for the Smart Grid. A significant amount of this funding was allotted to utilities for cost sharing projects to deploy Smart Grid technologies, many of whom have deployed and are deploying advanced metering infrastructure (AMI). AMI is an enabler to increase the efficiency of utilities and the bulk power grid. The bulk electrical system is unique in that it produces electricity as it is consumed. Most other industries have a delay between generation and consumption. This aspect of the power grid means that there must be enough generation capacity to meet the highest demand whereas other industries could over produce during off-peak times. This requires significant investment in generation capacity to cover the few days a year of peak consumption. Since bulk electrical storage doesn't yet exist at scale another way to curb the need for new peak period generation is through demand-response; that is to incentivize consumers (demand) to curtail (respond) electrical usage during peak periods. Of the various methods proposed for enabling demand-response, this paper will focus on the communication requirements for creating an energy market using transactional controls. More specifically, the paper will focus on the communication requirements needed to send the peak period notices and receive the response back from the consumers

    Secure and Efficient Routable Control Systems

    Get PDF
    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision

    Baseline Needs Assessment for a Hospital-Based Violence Intervention Program 1-Year Pilot

    Get PDF
    The objectives of the present study were to measure and describe the baseline participant needs of a hospital-based violence intervention 1-year pilot program, assess differences in expected hospital revenue based on changes in health insurance coverage resulting from program implementation and discuss the program’s limitations. Methods: Between September 2020 and September 2021 Encompass Omaha enrolled 36 participants. A content analysis of 1199 progress notes detailing points of contact with participants was performed to determine goal status. Goals were categorized and goal status was defined as met, in process, dropped, or participant refusal. Results: The most frequently identified needs were help obtaining short-term disability assistance or completing FMLA paperwork (86.11%), immediate financial aid (86.11%), legal aid (83.33%), access to food (83.3%), and navigating medical issues other than the primary reason for hospitalization (83.33%). Conclusions: Meeting the participants’ short-term needs is critical for maintaining their engagement in the long-term. Further, differences in expected hospital revenue for pilot participants compared with a control group were examined, and this analysis found a reduction in medical and facility costs for program participants. The pilot stage highlighted how complex the needs and treatment of victims of violence are. As the program grows and its staff become more knowledgeable about social work, treatment, and resource access processes, the program will continue to improve

    Defense, Disrespect, and #Deadly: A Qualitative Exploration of Precursors to Youth Violence Informed Through Hospital-Based Violence Prevention Program Follow Up

    Get PDF
    Success of youth violence intervention and prevention effects, particularly for gun violence, will be enhanced when efforts are appropriately informed by the antecedents and context of violence. Youth violence is guided by social and cultural norms that are shifting with the rise of technology. Bullying, gang violence, and self-directed violence is increasingly found to occur in the online space influencing peer groups across contexts. Through focus groups with youth at risk for violence and victimization, this study finds three themes emerge as common precursors to violence: defense of self or others, disrespect of self or family occurring in traditional community-based interactions, and threats or disrespect occurring through social media platforms. Youth violence prevention programs should consider how using social cognitive intervention framework could build knowledge, attitudes, and skills needed for violence intervention and prevention informed by precursors to violence found in this analysis

    An Evaluation of the Tolerability and Feasibility of Combining 5-Amino-Levulinic Acid (5-ALA) with BCNU Wafers in the Surgical Management of Primary Glioblastoma.

    Get PDF
    Background Glioblastoma (GBM) is the commonest primary malignant brain tumour in adults and effective treatment options are limited. Combining local chemotherapy with enhanced surgical resection using 5-aminolevulinic acid (5-ALA) could improve outcomes. Here we assess the safety and feasibility of combining BCNU wafers with 5-ALA-guided surgery. Methods We conducted a multicentre feasibility study of 5-ALA with BCNU wafers followed by standard-of-care chemoradiotherapy (chemoRT) in patients with suspected GBM. Patients judged suitable for radical resection were administered 5-ALA pre-operatively and BCNU wafers at the end resection. Post-operative treatment continued as per routine clinical practice. The primary objective was to establish if combining 5-ALA and BCNU wafers is safe without compromising patients from receiving standard chemoRT. Results Seventy-two patients were recruited, sixty-four (88.9%) received BCNU wafer implants, and fifty-nine (81.9%) patients remained eligible following formal histological diagnosis. Seven (11.9%) eligible patients suffered surgical complications but only two (3.4%) were not able to begin chemoRT, four (6.8%) additional patients did not begin chemoRT within 6 weeks of surgery due to surgical complications. Eleven (18.6%) patients did not begin chemoRT for other reasons (other toxicity (n = 3), death (n = 3), lost to follow-up/withdrew (n = 3), clinical decision (n = 1), poor performance status (n = 1)). Median progression-free survival was 8.7 months (95% CI: 6.4-9.8) and median overall survival was 14.7 months (95% CI: 11.7-16.8). Conclusions Combining BCNU wafers with 5-ALA-guided surgery in newly diagnosed GBM patients is both feasible and tolerable in terms of surgical morbidity and overall toxicity. Any potential therapeutic benefit for the sequential use of 5-ALA and BCNU with chemoRT requires further investigation with improved local delivery technologies

    Can Fish and Cell Phones Teach Us about Our Health?

    Get PDF
    Biologging is a scientific endeavor that studies the environment and animals within it by outfitting the latter with sensors of their dynamics as they roam freely in their natural habitats. As wearable technologies advance for the monitoring of human health, it may be instructive to reflect on the successes and failures of biologging in field biology over the past few decades. Several lessons may be of value. Physiological sensors can >encode> for a wider number of states than the one explicitly targeted, although the limits of this are debatable. The combination of orthogonal sensors turns out to be critical to delivering a high value data set. Sensor fusion and engineering for longevity are also important for success. This Perspective highlights successful strategies for biologging that hold promise for human health monitoring
    • …
    corecore