top of page

RESEARCH INTERESTS

In my current role as a power engineer and researcher for the Infrastructure Security group at Idaho National Laboratory, I have the opportunity to work on a variety of projects spanning distributed energy resources (DER), infrastructure modernization, cybersecurity for power systems, and resilience. 

  • I am the principal investigator (PI) for the new On Site Wind for Rural Load Centers project, which is intended to bring a distributed wind hybrid design toolkit to rural communities. 

  • I was the PI for the Microgrids, Infrastructure Resilience, and Advanced Controls Launchpad (MIRACL) project, a distributed wind project funded by the DOE Wind Energy Technologies Office (WETO), which ended in 2022. 

  • I am a power engineer and key organizer of the Transmission Optimization for Grid Enhancing Technologies (TOGETs) project, funded by the DOE Office of Electricity (OE) and DOE WETO. 

  • For the DOE Solar Energy Technologies Office (SETO)-funded CyberStrike effort, I combine my expertise with renewable resources and cybersecurity to develop training that benefits all levels of the industry. 

  • The Grid Modernization Lab Consortium (GMLC) project Validation, Restoration and Black Start Testing of Sensing, Controls and DER Technologies at Plum Island was an exciting project I worked on as a graduate fellow and during my transition to a full time employee that allowed me to stretch my research abilities. Now, I get to continue working on similar efforts through the Liberty Eclipse program

Lots of other exciting projects cross my desk. They each combine my interests in solar, wind, storage, cybersecurity, and power system modernization to present unique challenges for me and my teammates to solve. 

As a lifelong learner, I’m constantly exploring new areas of research that I believe will make the world a better, safer place. Below you will find my key interests and recent publications. Check out my blog for updates on my ongoing projects. 

Wind Turbines

DISTRIBUTED ENERGY RESOURCE INTEGRATION

Grid Modernization Efforts

The world's energy generation profile is changing rapidly, and will continue to evolve over the next 50 years. Predictions vary widely, but distributed energy resources including solar PV, battery storage, wind, and others will play a big role. The current bulk energy system is not designed to handle distributed generation sources, especially at the distribution level. I believe I can have a meaningful impact on the safe integration of DER by evaluating the resiliency, reliability, and security of integration plans, models, and policies.

Publications

Black Start with Inverter-Based Resources: Hardware Testing

July 2023

Traditionally, black start begins at large synchronous generators, and more loads are added as generation ramps up. Black start with grid-forming DERs is not a novel research concept, but this study showed how to put that into practice through demonstrations of coordinated black start.

Article coming soon. 

Digital Twin Verification for Advanced Reactor Remote Operations
July 2023

Micronuclear reactors are a developing addition to the clean energy mix. Microreactors will likely require remote operation to take advantage of economies of scale. In this paper, we discuss some of the constraints and design considerations for a digital twin verification system to enable remote operation. 

Article coming soon.  

Cybersecurity Resilience Demonstration for Wind Energy Sites in Co-Simulation Environment
February 2023

This report describes some of the key outcomes of the multi-year Wind Cyber Hardening project, specifically the platform developed to detect and mitigate cyberattacks on a representative wind farm architecture. 

Read more here

Case Study: Resilience Benefits of Distributed Wind Against Fuel and Weather Hazards in Alaska
June 2022

In this case study of St. Mary's Village, Alaska, we present a resilience evaluation exercise. A resilience framework is employed to identify system characteristics, relevant metrics, and resilience hazards, and to assess the performance against the hazards with and without a distributed wind turbine. The results show the resilience benefits provided by the distributed wind installation against fuel shortage hazards and cold weather hazards. The resilience benefits can be assigned monetary values, which provide insight into value streams of distributed wind that are not usually considered.

Read here: IEEE

Cyber-Risk Management Feasibility Study: Retrofitting Solar with Emerging Technologies
June 2022

This report specifically investigates the cyber-considerations related to energy resilience retrofits and summarizes the key questions that project proponents could ask when evaluating solar PV sites for resilience retrofit feasibility, preliminary design, and subsequent development processes.

Read more here

MIRACL Resilience Case Studies
May 2022

For the Microgrids, Infrastructure Resilience, and Advanced Controls Launchpad (MIRACL) project, our team evaluated the resilience provided by distributed wind in two case studies, St. Mary's, AK and Iowa Lakes, IA. Read the case studies to learn more about the unique resilience goals and hazards for each site. 

Cyberseucirty Guides for Distributed Wind Stakeholders
November 2021

These quick guides accompany the full Cybersecurity Guide for Distributed Wind. Rather than dig through the full report, manufacturersintegrators, and operators can find targeted best practices for their roles.

A Cyber-Resilience Risk Management Architecture for Distributed Wind
October 2021

Distributed wind is a strong candidate to help meet renewable energy and carbon-free energy goals. However, care must be taken as more systems are installed to ensure that the systems are reliable, resilient, and secure. The physical and communications requirements for distributed wind mean that there are unique cybersecurity considerations, but there is little to no existing guidance on best practices for cybersecurity risk management for distributed wind systems specifically. This research develops an architecture for managing cyber risks associated with distributed wind systems through resilience functions. 

Read here: IEEE

Cybersecurity Guide for Distributed Wind
August 2021

This report provides an introduction to cybersecurity for distributed wind by discussing the architectures, standards, and best practices that are most applicable. It explains why there needs to be special consideration for a resource as specific as distributed wind, and it provides guidance to relevant sets of stakeholders on their role in maintaining the security of the system.

Read here: Resilience at INL

Resilience Framework for Electric Energy Delivery Systems
July 2021

This report describes a framework for resilience planning, operation, and improvement. It focuses on the identifying system characteristics, resilience goals, and resilience hazards. It provides readers a process for evaluating system resilience and comparing the resilience of different configurations.

Read here: Resilience at INL

Cybersecurity Considerations for Grid-Connected Batteries with Hardware Demonstrations
May 2021

The distributed nature of DER devices combined with their network connectivity and complex controls interfaces present a larger potential attack surface for adversaries looking to create instability in power systems. In this work, we focus on grid-connected batteries. We explore the potential impacts of a cyberattack on a battery to power system stability, to the battery hardware, and on economics for various stakeholders. We then use real hardware to demonstrate end-to-end attack paths exist when security features are disabled or misconfigured. 

Read here: MDPI Energies Journal

Distributed Wind Resilience Metrics for Electric Energy Delivery Systems
May 2021

While most people have a general concept of what it means to be "resilient," and examination of definitions from different sources reveals that there are key commonalities, but key differences as well. This INL report explores the definition of resilience for electric energy delivery systems, metrics appropriate for evaluating resilience, and the application to distributed wind.

Read here: Resilience at INL

Securing Distributed Energy Resource Integration
May 2021

The penetration of distributed energy resources (DER) is growing at much higher rates than predicted 20 years ago. Far from being used only in residential settings, DER are now installed on distribution and transmission circuits. In this position, they do not have the same properties as traditional generators and are more flexible in many cases. The growing penetration and range of uses for DER motivate the need to reliably and safely integrate them into the grid. This Master's thesis explores cybersecurity for DER from conceptual and operational perspectives.

Read more here

Stability Impact of the IEEE 1547 Operational Mode Changes Under High DER Penetration in the Presence of Cyber Adversary
April 2021

The IEEE 1547 standard addresses the integration of Distributed Energy Resources (DER) into Area Electric Power Systems (AEPS). The updated standard, released in 2018 with revisions ongoing, specifies the need for more flexible settings, requiring the DER to remain connected during certain disturbances and provide voltage support via active and reactive power modes. With these increased capabilities comes increased risks, and our analysis of the standard has produced potential settings combinations, which, while allowable under the standard, may actually create instability.

Read here: IEEE

PAVED: Perturbation Analysis for Verification of Energy Systems
October 2019

Sensor integrity is arguably the most critical feature to protect in cyber-physical systems. Since power systems are cyber-physical systems with ubiquitous sensors that monitor and protect the grid, data must be trustworthy. Process safety and control decisions ultimately depend on data. The focus of this paper is how to design and apply perturbation based detection for sensor verification, under full AC unobservable false data injection (AU-FDI) attacks, by combining an active probing strategy with cyber-side data based on the cyber-physical situational awareness model CyPSA.

Read here: IEEE

Building an Invisible Wall: Real-Time Methods to Improve Power Grid Cybersecurity
November 2018

The 10th Edition of the Texas A&M undergraduate research journal, Explorations, includes this article describing how power grids are vulnerable to cyberattacks, but methods are being developed to detect attacks before the cause damage to power grids.

Read here: Explorations

Sensor Verification for Cyber-Physical Models of Power Systems
April 2018

This was an undergraduate thesis project for the URS program. This project explores the ways that data from sensors in power systems can be authenticated by enhancing the security of power systems from a cyber-physical point of view. This is a continuation of the work for the NSF project “CPS: Synergy: Collaborative Research: Distributed Just-Ahead-Of-Time Verification of Cyber-Physical Critical Infrastructure.” Adversaries who gain access to a cyber-physical system can cause significant physical damage and financial loss by injecting false data into a sensor node. Identifying adversarial action in a system can mitigate unsafe actions made based off of bad data. The technique presented in this work combines topology analysis with real-time probing to create a measure of trustworthiness of sensors in a system. 

Read more here. 

Towards a Sensor Trustworthiness Measure for Grid-Connected IoT-Enabled Smart Cities
April 2018

Traditional security measures for large-scale critical infrastructure systems have focused on keeping adversaries out of the system. As the internet of things (IoT) extends into millions of homes, with tens or hundreds of devices each, the threat landscape is complicated. IoT devices have unknown access capabilities with unknown reach into other systems. This paper presents ongoing work on how techniques in sensor verification and cyber-physical modeling and analysis on bulk power systems can be applied to identify malevolent IoT devices and secure smart and connected communities against the most impactful threats.

Read here: IEEE

bottom of page