Skip to main content

Showing 1–3 of 3 results for author: Dayaratne, T

Searching in archive eess. Search in all archives.
.
  1. arXiv:2406.12299  [pdf, other

    cs.CR cs.NI eess.SY

    Exploiting and Securing ML Solutions in Near-RT RIC: A Perspective of an xApp

    Authors: Thusitha Dayaratne, Viet Vo, Shangqi Lai, Sharif Abuadbba, Blake Haydon, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph

    Abstract: Open Radio Access Networks (O-RAN) are emerging as a disruptive technology, revolutionising traditional mobile network architecture and deployments in the current 5G and the upcoming 6G era. Disaggregation of network architecture, inherent support for AI/ML workflows, cloud-native principles, scalability, and interoperability make O-RAN attractive to network providers for beyond-5G and 6G deployme… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  2. Fostering Trust in Smart Inverters: A Framework for Firmware Update Management and Tracking in VPP Context

    Authors: Thusitha Dayaratne, Carsten Rudolph, Tom Shirley, Sol Levi, David Shirley

    Abstract: Ensuring the reliability and security of smart inverters that provide the interface between distributed energy resources (DERs) and the power grid becomes paramount with the surge in integrating DERs into the (smart) power grid. Despite the importance of having updated firmware / software versions within a reasonable time frame, existing methods for establishing trust through firmware updates lack… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  3. arXiv:2312.08646  [pdf, other

    eess.SY cs.CR

    Guarding the Grid: Enhancing Resilience in Automated Residential Demand Response Against False Data Injection Attacks

    Authors: Thusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi

    Abstract: Utility companies are increasingly leveraging residential demand flexibility and the proliferation of smart/IoT devices to enhance the effectiveness of residential demand response (DR) programs through automated device scheduling. However, the adoption of distributed architectures in these systems exposes them to the risk of false data injection attacks (FDIAs), where adversaries can manipulate de… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.