Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Samuel L. Clements is active.

Publication


Featured researches published by Samuel L. Clements.


Archive | 2010

A Survey of Wireless Communications for the Electric Power System

Bora A. Akyol; Harold Kirkham; Samuel L. Clements; Mark D. Hadley

A key mission of the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability (OE) is to enhance the security and reliability of the nation’s energy infrastructure. Improving the security of control systems, which enable the automated control of our energy production and distribution, is critical for protecting the energy infrastructure and the integral function that it serves in our lives. The DOE-OE Control Systems Security Program provides research and development to help the energy industry actively pursue advanced security solutions for control systems. The focus of this report is analyzing how, where, and what type of wireless communications are suitable for deployment in the electric power system and to inform implementers of their options in wireless technologies. The discussions in this report are applicable to enhancing both the communications infrastructure of the current electric power system and new smart system deployments. The work described in this report includes a survey of the following wireless technologies: • IEEE 802.16 d and e (WiMAX) • IEEE 802.11 (Wi-Fi) family of a, b, g, n, and s • Wireless sensor protocols that use parts of the IEEE 802.15.4 specification: WirelessHART, International Society of Automation (ISA) 100.11a, and Zigbee • The 2, 3, and 4 generation (G )cellular technologies of GPRS/EDGE/1xRTT, HSPA/EVDO, and Long-Term Evolution (LTE)/HSPA+UMTS.


power and energy society general meeting | 2010

Cyber-security considerations for the smart grid

Samuel L. Clements; Harold Kirkham

The electrical power grid is evolving into the “smart grid.” The goal of the smart grid is to improve efficiency and availability of power by adding more monitoring and control capabilities. These new technologies and mechanisms are certain to introduce vulnerabilities into the power grid. In this paper we provide an overview of the cyber security state of the electrical power grid. We highlight some of the vulnerabilities that already exist in the power grid including limited capacity systems, implicit trust and the lack of authentication. We also address challenges of complexity, scale, added capabilities and the move to multipurpose hardware and software as the power grid is upgraded. These changes create vulnerabilities that did not exist before and bring increased risks. We conclude the paper by showing that there are a number mitigation strategies that can help keep the risk at an acceptable level.


United States. Department of Energy; Pacific Northwest National Laboratory (U.S.) | 2011

Secure Data Transfer Guidance for Industrial Control and SCADA Systems

Robert E. Mahan; Jerry D. Fluckiger; Samuel L. Clements; Cody W. Tews; John R. Burnette; Craig A. Goranson; Harold Kirkham

This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a systems hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.


ieee pes innovative smart grid technologies conference | 2013

Cyber/physical security vulnerability assessment integration

Douglas G. MacDonald; Samuel L. Clements; Scott W. Patrick; Casey J. Perkins; George Muller; Mary J. Lancaster; William J. Hutton

Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: 1 physical only attack, 2 cyber only attack, 3 physical-enabled cyber attack, 4 cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilities which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.


power and energy society general meeting | 2011

Protecting the smart grid: A risk based approach

Samuel L. Clements; Harold Kirkham; Marcelo A. Elizondo; Shuai Lu

This paper describes a risk-based approach to security that has been used for years in protecting physical assets, and shows how it could be modified to help secure the digital aspects of the smart grid and control systems in general. One way the smart grid has been said to be vulnerable is that mass load fluctuations could be created by quickly turning off and on large quantities of smart meters. We investigate the plausibility.


Archive | 2014

Smart Grid Status and Metrics Report Appendices

Patrick J. Balducci; Chrissi A. Antonopoulos; Samuel L. Clements; Harold Kirkham; Kathleen A. Ruiz; David L. Smith; Mark Weimar; Chris Gardner; Jeff Varney

A smart grid uses digital power control and communication technology to improve the reliability, security, flexibility, and efficiency of the electric system, from large generation through the delivery systems to electricity consumers and a growing number of distributed generation and storage resources. To convey progress made in achieving the vision of a smart grid, this report uses a set of six characteristics derived from the National Energy Technology Laboratory Modern Grid Strategy. The Smart Grid Status and Metrics Report defines and examines 21 metrics that collectively provide insight into the grid’s capacity to embody these characteristics. This appendix presents papers covering each of the 21 metrics identified in Section 2.1 of the Smart Grid Status and Metrics Report. These metric papers were prepared in advance of the main body of the report and collectively form its informational backbone.


Archive | 2012

IEC 61850 and IEC 62351 Cyber Security Acceleration Workshop

Samuel L. Clements; Thomas W. Edgar; David O. Manz

The purpose of this workshop was to identify and discuss concerns with the use and adoption of IEC 62351 security standard for IEC 61850 compliant control system products. The industry participants discussed performance, interoperability, adoption, challenges, business cases, and future issues.


Archive | 2010

Cryptographic Trust Management System Design Document

Thomas W. Edgar; Samuel L. Clements; Mark D. Hadley; Wendy M. Maiden; David O. Manz; Sean J. Zabriskie

Deliverable for DOE NSTB Cryptographic Trust Management project. Design document to follow the Requirements document submitted in Sept 2009.


Archive | 2011

Home Area Networks and the Smart Grid

Samuel L. Clements; Thomas E. Carroll; Mark D. Hadley


Archive | 2010

Tensions in collaborative cyber security and how they affect incident detection and response

Glenn A. Fink; David McKinnon; Samuel L. Clements; Deborah A. Frincke

Collaboration


Dive into the Samuel L. Clements's collaboration.

Top Co-Authors

Avatar

Harold Kirkham

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Mark D. Hadley

Battelle Memorial Institute

View shared research outputs
Top Co-Authors

Avatar

David O. Manz

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Thomas E. Carroll

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Thomas W. Edgar

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Casey J. Perkins

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Craig A. Goranson

Battelle Memorial Institute

View shared research outputs
Top Co-Authors

Avatar

David McKinnon

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Deborah A. Frincke

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Douglas G. MacDonald

Pacific Northwest National Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge