53 research outputs found

    Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

    Full text link
    The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system. This chapter provides a layered perspective of the smart grid security and discusses game and decision theory as a tool to model the interactions among system components and the interaction between attackers and the system. We discuss game-theoretic applications and challenges in the design of cross-layer robust and resilient controller, secure network routing protocol at the data communication and networking layers, and the challenges of the information security at the management layer of the grid. The chapter will discuss the future directions of using game-theoretic tools in addressing multi-layer security issues in the smart grid.Comment: 16 page

    Evaluation of Cybersecurity Threats on Smart Metering System

    Get PDF
    Smart metering has emerged as the next-generation of energy distribution, consumption, and monitoring systems via the convergence of power engineering and information and communication technology (ICT) integration otherwise known as smart grid systems. While the innovation is advancing the future power generation, distribution, consumption monitoring and information delivery, the success of the platform is positively correlated to the thriving integration of technologies upon which the system is built. Nonetheless, the rising trend of cybersecurity attacks on cyber infrastructure and its dependent systems coupled with the system’s inherent vulnerabilities present a source of concern not only to the vendors but also the consumers. These security concerns need to be addressed in order to increase consumer confidence so as to ensure greatest adoption and success of smart metering. In this paper, we present a functional communication architecture of the smart metering system. Following that, we demonstrate and discuss the taxonomy of smart metering common vulnerabilities exposure, upon which sophisticated threats can capitalize. We then introduce countermeasure techniques, whose integration is considered pivotal for achieving security protection against existing and future sophisticated attacks on smart metering systems

    Feasibility of neuromuscular training in patients with severe hip or knee OA: The individualized goal-based NEMEX-TJR training program

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Although improvements are achieved by general exercise, training to improve sensorimotor control may be needed for people with osteoarthritis (OA). The aim was to apply the principles of neuromuscular training, which have been successfully used in younger and middle-aged patients with knee injuries, to older patients with severe hip or knee OA. We hypothesized that the training program was feasible, determined as: 1) at most acceptable self-reported pain following training; 2) decreased or unchanged pain during the training period; 3) few joint specific adverse events related to training, and 4) achieved progression of training level during the training period.</p> <p>Methods</p> <p>Seventy-six patients, between 60 and 77 years, with severe hip (n = 38, 55% women) or knee OA (n = 38, 61% women) underwent an individualized, goal-based neuromuscular training program (NEMEX-TJR) in groups for a median of 11 weeks (quartiles 7 to 15) prior to total joint replacement (TJR). Pain was self-reported immediately after each training session on a 0 to 10 cm, no pain to pain as bad as it could be, scale, where 0-2 indicates safe, > 2 to 5 acceptable and > 5 high risk pain. Joint specific adverse events were: not attending or ceasing training because of increased pain/problems in the index joint related to training, and self-reported pain > 5 after training. The level of difficulty of training was registered.</p> <p>Results</p> <p>Patients with severe OA of the hip or knee reported safe pain (median 2 cm) after training. Self-reported pain was lower at training sessions 10 and 20 (p = 0.04) and unchanged at training sessions 5 and 15 (p = 0.170, p = 0.161) compared with training session 1. There were no joint specific adverse events in terms of not attending or ceasing training. Few patients (n = 17, 22%) reported adverse events in terms of self-reported pain > 5 after one or more training sessions. Progression of training level was achieved over time (p < 0.001).</p> <p>Conclusions</p> <p>The NEMEX-TJR training program is feasible in patients with severe hip or knee OA, in terms of safe self-reported pain following training, decreased or unchanged pain during the training period, few joint specific adverse events, and achieved progression of training level during the training period.</p

    Reactive Security for Smart Grids Using [email protected] Simulation and Reasoning

    Get PDF
    Smart grids leverage modern information and communication technology to offer new perspectives to electricity consumers, producers, and distributors. However, these new possibilities also increase the complexity of the grid and make it more prone to failures. Moreover, new advanced features like remotely disconnecting meters create new vulnerabilities and make smart grids an attractive target for cyber attackers. We claim that, due to the nature of smart grids, unforeseen attacks and failures cannot be effectively countered relying solely on proactive security techniques. We believe that a reactive and corrective approach can offer a long-term solution and is able to both minimize the impact of attacks and to deal with unforeseen failures. In this paper we present a novel approach combining a [email protected] simulation and reasoning engine with reactive security techniques to intelligently monitor and continuously adapt the smart grid to varying conditions in near real-time

    Comparative structural and functional analysis of Bunyavirus and Arenavirus cap-snatching Endonucleases

    Get PDF
    Segmented negative strand RNA viruses of the arena-, bunya- and orthomyxovirus families uniquely carry out viral mRNA transcription by the cap-snatching mechanism. This involves cleavage of host mRNAs close to their capped 5′ end by an endonuclease (EN) domain located in the N-terminal region of the viral polymerase. We present the structure of the cap-snatching EN of Hantaan virus, a bunyavirus belonging to hantavirus genus. Hantaan EN has an active site configuration, including a metal co-ordinating histidine, and nuclease activity similar to the previously reported La Crosse virus and Influenza virus ENs (orthobunyavirus and orthomyxovirus respectively), but is more active in cleaving a double stranded RNA substrate. In contrast, Lassa arenavirus EN has only acidic metal co-ordinating residues. We present three high resolution structures of Lassa virus EN with different bound ion configurations and show in comparative biophysical and biochemical experiments with Hantaan, La Crosse and influenza ENs that the isolated Lassa EN is essentially inactive. The results are discussed in the light of EN activation mechanisms revealed by recent structures of full-length influenza virus polymerase

    Pan-Pathway Based Interaction Profiling of FDA-Approved Nucleoside and Nucleobase Analogs with Enzymes of the Human Nucleotide Metabolism

    Get PDF
    To identify interactions a nucleoside analog library (NAL) consisting of 45 FDA-approved nucleoside analogs was screened against 23 enzymes of the human nucleotide metabolism using a thermal shift assay. The method was validated with deoxycytidine kinase; eight interactions known from the literature were detected and five additional interactions were revealed after the addition of ATP, the second substrate. The NAL screening gave relatively few significant hits, supporting a low rate of “off target effects.” However, unexpected ligands were identified for two catabolic enzymes guanine deaminase (GDA) and uridine phosphorylase 1 (UPP1). An acyclic guanosine prodrug analog, valaciclovir, was shown to stabilize GDA to the same degree as the natural substrate, guanine, with a ΔTagg around 7°C. Aciclovir, penciclovir, ganciclovir, thioguanine and mercaptopurine were also identified as ligands for GDA. The crystal structure of GDA with valaciclovir bound in the active site was determined, revealing the binding of the long unbranched chain of valaciclovir in the active site of the enzyme. Several ligands were identified for UPP1: vidarabine, an antiviral nucleoside analog, as well as trifluridine, idoxuridine, floxuridine, zidovudine, telbivudine, fluorouracil and thioguanine caused concentration-dependent stabilization of UPP1. A kinetic study of UPP1 with vidarabine revealed that vidarabine was a mixed-type competitive inhibitor with the natural substrate uridine. The unexpected ligands identified for UPP1 and GDA imply further metabolic consequences for these nucleoside analogs, which could also serve as a starting point for future drug design

    Bunyaviridae RNA Polymerases (L-Protein) Have an N-Terminal, Influenza-Like Endonuclease Domain, Essential for Viral Cap-Dependent Transcription

    Get PDF
    Bunyaviruses are a large family of segmented RNA viruses which, like influenza virus, use a cap-snatching mechanism for transcription whereby short capped primers derived by endonucleolytic cleavage of host mRNAs are used by the viral RNA-dependent RNA polymerase (L-protein) to transcribe viral mRNAs. It was recently shown that the cap-snatching endonuclease of influenza virus resides in a discrete N-terminal domain of the PA polymerase subunit. Here we structurally and functionally characterize a similar endonuclease in La Crosse orthobunyavirus (LACV) L-protein. We expressed N-terminal fragments of the LACV L-protein and found that residues 1-180 have metal binding and divalent cation dependent nuclease activity analogous to that of influenza virus endonuclease. The 2.2 Å resolution X-ray crystal structure of the domain confirms that LACV and influenza endonucleases have similar overall folds and identical two metal binding active sites. The in vitro activity of the LACV endonuclease could be abolished by point mutations in the active site or by binding 2,4-dioxo-4-phenylbutanoic acid (DPBA), a known influenza virus endonuclease inhibitor. A crystal structure with bound DPBA shows the inhibitor chelating two active site manganese ions. The essential role of this endonuclease in cap-dependent transcription was demonstrated by the loss of transcriptional activity in a RNP reconstitution system in cells upon making the same point mutations in the context of the full-length LACV L-protein. Using structure based sequence alignments we show that a similar endonuclease almost certainly exists at the N-terminus of L-proteins or PA polymerase subunits of essentially all known negative strand and cap-snatching segmented RNA viruses including arenaviruses (2 segments), bunyaviruses (3 segments), tenuiviruses (4–6 segments), and orthomyxoviruses (6–8 segments). This correspondence, together with the well-known mapping of the conserved polymerase motifs to the central regions of the L-protein and influenza PB1 subunit, suggests that L-proteins might be architecturally, and functionally equivalent to a concatemer of the three orthomyxovirus polymerase subunits in the order PA-PB1-PB2. Furthermore, our structure of a known influenza endonuclease inhibitor bound to LACV endonuclease suggests that compounds targeting a potentially broad spectrum of segmented RNA viruses, several of which are serious or emerging human, animal and plant pathogens, could be developed using structure-based optimisation
    corecore