Professional Documents
Culture Documents
(MANU) Initial Review - Houlin Chen (320384)
(MANU) Initial Review - Houlin Chen (320384)
Review Form
Form to be completed by the supervisor in liaison with the student, and returned to the School Assistant
Registrar within 4 months of the date of initial registration.
Student Name: Houlin Chen Student ID Number: 320384
Yes ☐ No ☒
Yes ☒ No ☐
Do you believe that the student understands what is currently expected of them?
(As referenced in Appendices B and C of Managing Research Students)
Yes ☒ No ☐
Yes ☒ No ☐
If no, provide a brief description of the programme of supervised research (100 words max)
Is the final thesis and/or other outputs likely to require commercial/security restrictions?
Yes ☐ No ☒
Frequency of meetings with student (for part-time students, frequency of discussion by correspondence)
every 2 weeks
Has an outline plan for the whole of the agreed period of registration been produced taking into account availability
of resources, location and mode of study? Please attach
Yes ☒ No ☐
Has access to suitable resources been agreed for the foreseeable future and contingency plans been put in place
where appropriate?
Yes ☒ No ☐
Has the requirement for a data management plan been discussed, and training highlighted? Please attach if a data
plan is already in progress (it should be written before data collection)
Yes ☐ No ☒
Has a risk assessment been undertaken for both the research activity and outcomes and the likelihood of these being
delivered? Please attach.
Yes ☐ No ☒
Has Ethics and Integrity training and assessment been completed satisfactorily? Please attach Certificate of
Completion.
Yes ☐ No ☒
If yes, has an ethical review of the research been undertaken (through a CURES application)? Please attach letter
confirming CURES.
Yes ☐ No ☒
Has a statement of current training and development needs been completed? Please also attach researcher’s
record from DRCD programme of courses attended and future bookings
Yes ☐ No ☒
Yes ☒ No ☐
If you have answered no to any of the questions, please summarise below and indicate what action will be taken,
giving timescales.
Are there any personal circumstances that may affect or impede future studies?
Additional comments/considerations
R = Reservations ☒
MR = Major Reservations ☐
U = Unsatisfactory ☐
SIGNATORIES:
Name: Signature: Date:
Student: Houlin Chen 11 Feb 2021
School Assistant
Registrar:
b) Problem description
Electric grids are critical design, a misconfigured grid under the right circumstances can experience a
cascade failure, which one isolated incident triggers a large-scale black-out, like the one happened in
2013, in US and Canada.
Modern grid employs sophisticated control systems, which gathers data from sensors deployed in
various point of the grid. When a breaker trips, the system will attempt to restore power to the most
area possible by supplying electricity via alternate route. This system’s normal operation depends on
correct sensor data, correct breaker action and correct algorithm.
The rise of IoT technology has created the risk of this system’s vulnerabilities being exploited by
planned IoT based attacks.
In 2018, group of researchers demonstrated that using IoT enabled electrical consumer devices,
they call it Manipulation of Demand attack using IoT devices, can trigger a cascade failure. This
attack is novel and they believe grids are not equipped to handle it.
In 2019, another group of researchers argued that cascade failures are unlikely to be cause by the
MadIoT attack. Protective mechanism employed in modern grids are capable of dealing with the
attack scenarios proposed in the 2018 paper.
Furthering from the 2019 paper, we propose that even cascade failures are hard to cause, MadIoT
attack researches are not worthless. In fact, it is often better not to cause a cascade failure or other
similar catastrophic incident. A slow, meticulous attack that bleed the opponent is actually a better
choice. Notable examples includes computer worm called Stuxnet, this worm significantly delayed
the process of enemy state’s Uranium enrichment by causing non-catastrophic, slow-acting damage
to the centrifuges, while presenting fake data to the operator.
We can learn from Stuxnet, and design an improved version of MadIoT attack.
1.Design a Wi-Fi enabled smart plug that are capable of collecting data and being remote controlled;
2.Simulate a MadIoT attack on a grid under brownout condition;
3.Analyse successful attack simulations and program the plugs for the attack;
[2]S. Pahwa, C. Scoglio and A. Scala, "Abruptness of Cascade Failures in Power Grids", Scientific
Reports, vol. 4, no. 1, 2014. Available: 10.1038/srep03694 [Accessed 21 January 2021].
[3]C. Owens, "The Northeastern Blackout 2003 | the Blackout report", the Blackout report, 2019.
[Online]. Available: https://www.theblackoutreport.co.uk/2019/10/10/northeastern-blackout-usa-
canada-2003/. [Accessed: 21- Jan- 2021].
[5]U.S. Dept. of Energy, Washington, DC (United States), "Final Report on the August 14, 2003
Blackout in the United States and Canada: Causes and Recommendations", U.S.-Canada Power
System Outage Task Force, Ottawa, ON (Canada), Washington, DC, 2004.
[6]J. Varghese, "IoT: The Electric Grid’s Final Frontier", T&D World, 2020. [Online]. Available:
https://www.tdworld.com/smart-utility/article/21119747/iot-the-electric-grids-final-frontier. [Accessed:
26- Jan- 2021].
[7]R. Morello, C. De Capua, G. Fulco and S. Mukhopadhyay, "A Smart Power Meter to Monitor
Energy Flow in Smart Grids: The Role of Advanced Sensing and IoT in the Electric Grid of the
Future", IEEE Sensors Journal, vol. 17, no. 23, pp. 7828-7837, 2017. Available:
10.1109/jsen.2017.2760014 [Accessed 26 January 2021].
[8]Q. Jones, "What Is the Smart Grid and How Is It Enabled by IoT?", Digi.com, 2020. [Online].
Available: https://www.digi.com/blog/post/what-is-the-smart-grid-and-how-enabled-by-iot. [Accessed:
27- Jan- 2021].
[9]S. Soltan, P. Mittal and H. Poor, "BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the
Power Grid", Usenix.org, 2018. [Online]. Available:
https://www.usenix.org/conference/usenixsecurity18/presentation/soltan. [Accessed: 27- Jan- 2021].
[11]A. Robb, "Grid inertia: why it matters in a renewable world - Renewable Energy World",
Renewable Energy World, 2019. [Online]. Available:
https://www.renewableenergyworld.com/baseload/grid-inertia-why-it-matters-in-a-renewable-world/.
[Accessed: 28- Jan- 2021].
[12]B. Huang, A. Cardenas and R. Baldick, "Not Everything is Dark and Gloomy: Power Grid
Protections Against IoT Demand Attacks", Usenix.org, 2019. [Online]. Available:
https://www.usenix.org/conference/usenixsecurity19/presentation/huang. [Accessed: 28- Jan- 2021].
[13]D. Kushner, "The Real Story of Stuxnet", IEEE Spectrum: Technology, Engineering, and Science
News, 2013. [Online]. Available: https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet.
[Accessed: 08- Feb- 2021].
[14]K. Zetter, "An Unprecedented Look at Stuxnet, the World's First Digital Weapon", Wired, 2014.
[Online]. Available: https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/. [Accessed: 09-
Feb- 2021].
[15]M. Holloway, "Stuxnet Worm Attack on Iranian Nuclear Facilities", Large.stanford.edu, 2015.
[Online]. Available: http://large.stanford.edu/courses/2015/ph241/holloway1/. [Accessed: 09- Feb-
2021].
[16]Langner Group, Can you HEAR Stuxnet damaging centrifuges at Natanz?. 2017.
[17]The Langner Group, "To Kill a Centrifuge", The Langner Group, Arlington | Hamburg | Munich,
2013.
[18]D. Basina, S. Kumar, S. Padhi, A. Sarkar, A. Mondal and R. krithi, "Brownout Based Blackout
Avoidance Strategies in Smart Grids", IEEE Transactions on Sustainable Computing, pp. 1-1, 2021.
Available: 10.1109/tsusc.2020.3014077.
[19]"How to Protect Your Appliances During Brownouts | Quick Electricity", Quick Electricity. [Online].
Available: https://quickelectricity.com/protect-appliances-during-brownouts/. [Accessed: 09- Feb-
2021].
Time Schedule
Research Student Induction Checklist
This checklist is designed as a summary for discussions in the very early meetings between
the student and the supervisor. The supervisor is responsible for arranging a suitable
induction programme for the research student. The student should take responsibility for the
completion of this form. The form should be completed, agreed and signed by both student
and the supervisor, and returned to the SATM Research team at SASSATM-
research@cranfield.ac.uk as part of the Initial Review process.
Please tick each box to indicate that it has been discussed during initial meetings:
Please sign below to confirm you have covered the above in your early meetings:
Please also note the following with regards to meeting minutes following thesis submission;
If you are between Thesis submission and Viva no you do not need to provide
minutes
If you are completing Minor Corrections after your VIVA you do not need to provide
minutes
If you are completing Significant Corrections or Review & Represent after your VIVA
then you DO need to provide meeting minutes
Minutes should be agreed with your supervisor(s) and sent once a month to;
TO: SATMattendance@cranfield.ac.uk
CC: Supervisor(s)
Subject: Month Year e.g. August 2020
Research Supervision Meeting Notes
Actions for next meeting (include Risk Assessment, Health and Safety, Ethics, Data
Management Plans, Training. To be completed by the Student):
Who Action to be taken Date Agreed Linked Link to
Issued completion to objective
date chapter
Houlin Present my PhD plan and partially 16/11/202011/12/2020
Chen written literature review
Houlin Attend online training courses in N/A N/A
Chen ‘DATES’
Please also note the following with regards to meeting minutes following thesis submission;
If you are between Thesis submission and Viva no you do not need to provide
minutes
If you are completing Minor Corrections after your VIVA you do not need to provide
minutes
If you are completing Significant Corrections or Review & Represent after your VIVA
then you DO need to provide meeting minutes
Minutes should be agreed with your supervisor(s) and sent once a month to;
TO: SATMattendance@cranfield.ac.uk
CC: Supervisor(s)
Subject: Month Year e.g. August 2020
Research Supervision Meeting Notes
Actions for next meeting (include Risk Assessment, Health and Safety, Ethics, Data
Management Plans, Training. To be completed by the Student):
Who Action to be taken Date Agreed Linked Link to
Issued completion to objective
date chapter
Houlin Finalise PhD plan and write literature 16/11/202010/01/2021
Chen review with clear objectives
Houlin Attend online training courses in N/A N/A
Chen ‘DATES’
Please also note the following with regards to meeting minutes following thesis submission;
If you are between Thesis submission and Viva no you do not need to provide
minutes
If you are completing Minor Corrections after your VIVA you do not need to provide
minutes
If you are completing Significant Corrections or Review & Represent after your VIVA
then you DO need to provide meeting minutes
Minutes should be agreed with your supervisor(s) and sent once a month to;
TO: SATMattendance@cranfield.ac.uk
CC: Supervisor(s)
Subject: Month Year e.g. August 2020
Research Supervision Meeting Notes
Please also note the following with regards to meeting minutes following thesis submission;
If you are between Thesis submission and Viva no you do not need to provide
minutes
If you are completing Minor Corrections after your VIVA you do not need to provide
minutes
If you are completing Significant Corrections or Review & Represent after your VIVA
then you DO need to provide meeting minutes
Minutes should be agreed with your supervisor(s) and sent once a month to;
TO: SATMattendance@cranfield.ac.uk
CC: Supervisor(s)
Subject: Month Year e.g. August 2020