2019 IEEE International Symposium on Technologies for Homeland Security (HST) 2019
DOI: 10.1109/hst47167.2019.9032978
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Analytics using Smart Inverters in Power Distribution System: Proactive Intrusion Detection and Corrective Control Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…This is an obvious resultant form multiplication of the local PCC phasor voltage by its complex conjugate. Thereby, ( 9) can be rewritten as (10).…”
Section: B Safe Operation Region "Ie Morphism 2"mentioning
confidence: 99%
See 1 more Smart Citation
“…This is an obvious resultant form multiplication of the local PCC phasor voltage by its complex conjugate. Thereby, ( 9) can be rewritten as (10).…”
Section: B Safe Operation Region "Ie Morphism 2"mentioning
confidence: 99%
“…The futuristic 100% nonsynchronous generation-based power grid targeted in 2050 by the U.S. Department of Energy is anticipated to be vulnerable to malicious cyberattacks. This is because of the more dispersed generation that will operate outside the realm of old-fashioned power-plant administrative domain through employing more DEGs at the grid edge [10][11][12][13][14]. The attack might be introduced into the PEDG infrastructure through the communication medium that enables its harmonious operation.…”
Section: Introductionmentioning
confidence: 99%
“…Most existing work focuses on potential attack vectors and best practices for proactive cybersecurity, but there are a few papers that discuss attack detection and mitigation. A tool to flag anomalous smart inverter behavior has been developed [63]. This tool also proposed a cyberattack detection mechanism based on anomaly detection using data from geographically separated DER.…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…Detailed protocol and communications security for DER applications is discussed in [10]. DER and smart inverter functions can even be used to help detect broader attacks on the power system [48]. Advanced methods of cybersecurity traditionally applied to enterprise can also be adapted to DER environments [49,50].…”
Section: Related Workmentioning
confidence: 99%