2022
DOI: 10.1109/jestpe.2021.3111728
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Cyber–Physical Security for Photovoltaic Systems

Abstract: General rightsCopyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights.-Users may download and print one copy of any publication from the public portal for the purpose of private study or research.-You may not further distribute the material or use it for any profit-making activity or commercia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 77 publications
(23 citation statements)
references
References 134 publications
(172 reference statements)
0
23
0
Order By: Relevance
“…As a result, this can isolate PV inverters from the grid by tripping breakers or provoking low-voltage, high-voltage, or zero-voltage circumstances. A demonstration of a cyberattack model on PV converter, as well as the in-depth review of security assessment and countermeasures, can be viewed in [58].…”
Section: ) Cyberattack In Photovoltaic Systemmentioning
confidence: 99%
“…As a result, this can isolate PV inverters from the grid by tripping breakers or provoking low-voltage, high-voltage, or zero-voltage circumstances. A demonstration of a cyberattack model on PV converter, as well as the in-depth review of security assessment and countermeasures, can be viewed in [58].…”
Section: ) Cyberattack In Photovoltaic Systemmentioning
confidence: 99%
“…in order to maximize their impact and compromise power system operations. In the case of inverters, for example, after successfully gaining access to the DER assets, adversaries can launch cyberattacks including, i) DoS attacks compromising the inverter's availability, ii) data alteration attacks where the exchanged data between DERs and utilities are maliciously modified, and iii) command injection attacks where termination commands or malicious controls are forwarded to the inverters [30], [89]. During DoS attacks, the communication bandwidth of the inverter can be flooded leading to device disruptions, i.e., the process control flow of the device is halted [38].…”
Section: B Der Device Levelmentioning
confidence: 99%
“…Some of the recent threats can be seen in gridtied PV inverter systems [8]- [9] and electric vehicles [10], where the attackers seized control of vital safety functions such as braking and steering in Jeep Cherokee and Tesla's model X [11]- [12]. There are many kinds of malicious attacks and infiltration techniques, including false data injection (FDI) attacks, denial of service (DoS) [13], replay attacks [14], man-in-the-middle (MITM) attacks [15], etc. Usually, these attacks can also be well-curated by the adversary, which can be defined as generalized FDIAs, commonly known as stealth attacks [16].…”
Section: Introductionmentioning
confidence: 99%