2023
DOI: 10.1109/jsyst.2023.3305757
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations

Ioannis Zografopoulos,
Nikos D. Hatziargyriou,
Charalambos Konstantinou
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(6 citation statements)
references
References 92 publications
0
6
0
Order By: Relevance
“…Integrating Internet Protocol version 6 (IPv6) into microgrid cybersecurity is a crucial development that guarantees secure and efficient communication [52]. IPv6 provides substantial enhancements compared to its predecessor, primarily in terms of authentication and encryption capabilities, due to its vast address space and advanced security features.…”
Section: The Role Of Ipv6 In Microgrid Cybersecuritymentioning
confidence: 99%
See 1 more Smart Citation
“…Integrating Internet Protocol version 6 (IPv6) into microgrid cybersecurity is a crucial development that guarantees secure and efficient communication [52]. IPv6 provides substantial enhancements compared to its predecessor, primarily in terms of authentication and encryption capabilities, due to its vast address space and advanced security features.…”
Section: The Role Of Ipv6 In Microgrid Cybersecuritymentioning
confidence: 99%
“…By utilizing the functionalities of IPv6, distributed microgrids can attain enhanced levels of security in their control and communication protocols, which is imperative in the progressively networked environment of contemporary power systems. IPv6 is utilized within the framework of Distributed Microgrid Cybersecure Control Communication Protocols and Standards, emphasizing its significance in strengthening microgrid networks against cyber vulnerabilities [52].…”
Section: The Role Of Ipv6 In Microgrid Cybersecuritymentioning
confidence: 99%
“…In recent years, the literature has strongly stressed the crucial significance of data encryption as a fundamental element in ensuring the security of data transmission inside energy monitoring systems [22][23][24][25][26]. Research has emphasized the vulnerability of unencrypted data as they are being sent, highlighting their susceptibility to being intercepted and tampered with by unauthorized individuals.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, conventional security measures cannot be easily applied to the hardware of lightweight IoT devices, like wireless sensor nodes, due to their limited processing power, memory, and energy capacity [5]. The mass deployment and restricted conditions of IoT devices exacerbate the risk of malware propagation [6]. Malicious actors can capitalize on vulnerabilities in IoT devices to proliferate malware across heterogeneous IoT networks, comprised of diverse devices with varying communication technologies and capabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Its primary purpose is to generate revenue through unwanted advertising (e.g., Superfish [16]). (6) Ransomware is a type of malware that encrypts user files and demands a ransom for access. If not handled properly, this form of digital extortion can cause significant problems (e.g., WannaCry [17]).…”
Section: Introductionmentioning
confidence: 99%