2022
DOI: 10.1109/tii.2021.3132131
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Malicious Attacks in Autonomous Cyber-Physical Inverter-Based Microgrids

Abstract: The distributed generation capabilities of microgrids (MGs) arise as essential assets in enhancing grid resilience. The integration of distributed energy sources (DERs), controllable loads, and prosumers necessitates the deployment of potent control and communication synergies. While those synergies transform MGs into cyber-physical systems through information technologies able to sense, control, and actuate local resources and loads, they inadvertently expose MGs to cyber-attack threats. Increasing the securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 67 publications
0
17
0
Order By: Relevance
“…It is interfaced with the MG feeder similarly to the DG nodes, i.e., via a 12.5kV/208V step-down transformer. More details on the Canadian urban benchmark model can be found in [4].…”
Section: Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…It is interfaced with the MG feeder similarly to the DG nodes, i.e., via a 12.5kV/208V step-down transformer. More details on the Canadian urban benchmark model can be found in [4].…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The MSC monitors and supervises the nominal operation of the system by issuing control commands to the DG agents, enforcing the economic operation, managing the BESS resources (at the PCC), and providing remediation actions in case of adverse events. For instance, after the detection of a misbehaving agent [4], the leader will issue a disconnect command to the circuit breaker (CB) of that agent and at the same time instruct the remaining DG agents to remove the node from their consensus set. Recovery of the compromised agent will then be initiated with coordination between the affected node and the MSC.…”
Section: Microgrid Recovery Mechanism Using Energy Storagementioning
confidence: 99%
See 2 more Smart Citations
“…Rootkits can achieve persistence by masking their presence. Our future work will focus on developing detection and mitigation mechanisms, e.g., moving target defences, stable kernel represenations [22], etc. thwarting the adversarial learning behavior of rootkits.…”
Section: Discussionmentioning
confidence: 99%