research highlights
Compared with the traditional time-domain simulation that is conducted locally, the outsourcing approach could achieve an
order of magnitude speedup. The computational overhead incurred by the outsourcing approach was only about 2% which
was absorbed by the total runtime saving due to the faster processing of the cloud. The outsourcing approach can accurately
and reliably produce correct computation results, as if it were operating on the original data. Our implementation only
requires new software development.
In the future, we will enhance the security of the injective mapping-based solution with garbled circuits which guarantee
provable security but will increase the computational complexity. We also plan to extend the inter-area oscillation analysis by
developing a secure Prony analysis which considers damping and mode shape.
Detection, Recognition, and Localization of Multiple Cyber/Physical Attacks through Event Unmixing
Probably the best way to summarize the uniqueness of CURENT’s cybersecurity research is that it focuses on “Measurementbased Cyber Physical Security”. The goal of measurement-based cyber-physical security (CPS) is two-fold, to maintain the
fidelity (i.e., security and quality) of the measurement in order to facilitate the subsequent data analyses, and to use the
measurement data to identify the sources of security