2022
DOI: 10.48550/arxiv.2205.11171
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations

Abstract: The digitalization and decentralization of the electric power grid are key thrusts towards an economically and environmentally sustainable future. Towards this goal, distributed energy resources (DER), including rooftop solar panels, battery storage, electric vehicles, etc., are becoming ubiquitous in power systems, effectively replacing fossil-fuel based generation. Power utilities benefit from DERs as they minimize transmission costs, provide voltage support through ancillary services, and reduce operational… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 68 publications
0
3
0
Order By: Relevance
“…Analysis of communication protocol and device assaults shows significant differences in the functional level of attacks and targeted DER assets [38]. Cyberattacks target process sensors, actuators, and controllers at levels 0 and 1 of the Purdue model [18], whereas levels 3, 4, and 5 (communication, coordination, and control fabric) target DER systems.…”
Section: Sg Cyber-physical Vulnerabilities: Distributed Energy Resour...mentioning
confidence: 99%
“…Analysis of communication protocol and device assaults shows significant differences in the functional level of attacks and targeted DER assets [38]. Cyberattacks target process sensors, actuators, and controllers at levels 0 and 1 of the Purdue model [18], whereas levels 3, 4, and 5 (communication, coordination, and control fabric) target DER systems.…”
Section: Sg Cyber-physical Vulnerabilities: Distributed Energy Resour...mentioning
confidence: 99%
“…Analysis of communication protocol and device assaults shows significant differences in the functional level of attacks and targeted DER assets [37]. Cyberattacks target process sensors, actuators, and controllers at levels 0 and 1 of the Purdue model [18], whereas levels 3, 4, and 5 (communication, coordination, and control fabric) target DER systems.…”
Section: Sg Cyber-physical Vulnerabilities: Distributed Energy Resour...mentioning
confidence: 99%
“…Recent attack incidents such as BlackEnergy, CrashOverride, and Triton illustrate the growing threat of vulnerabilities in the IoT/ICT infrastructure of power systems [2], [3]. One prominent example of an attack incident affecting the power grid is the 2015 Ukraine cyber-attack [4].…”
mentioning
confidence: 99%