2023
DOI: 10.1109/tsg.2023.3253431
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Validation of a Remedial Action via Hardware-in-the-Loop System Against Cyberattacks Targeting a Lab-Scale PV/Wind Microgrid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 48 publications
0
5
0
Order By: Relevance
“…The attacker may use various methods to gain access, such as social engineering, phishing attacks, or exploiting vulnerabilities in the network infrastructure. Once the attacker gains access, they can intercept communication between the various components of the microgrid and manipulate data to their advantage [218,219]. For instance, the attacker can intercept communication between the microgrid's control system and the energy storage system and modify the power flow to create an overload, which can damage the equipment or cause a power outage.…”
Section: Denial Of Service (Dos)mentioning
confidence: 99%
“…The attacker may use various methods to gain access, such as social engineering, phishing attacks, or exploiting vulnerabilities in the network infrastructure. Once the attacker gains access, they can intercept communication between the various components of the microgrid and manipulate data to their advantage [218,219]. For instance, the attacker can intercept communication between the microgrid's control system and the energy storage system and modify the power flow to create an overload, which can damage the equipment or cause a power outage.…”
Section: Denial Of Service (Dos)mentioning
confidence: 99%
“…The collaborative nature of such distributed cooperative control-based microgrids can easily spread out a simple cyber-attack on a single DER or a communication link to the entire system, resulting in control failure or even making the overall power system unstable [95][96][97][98]. One solution to mitigate such cyber-attacks and maintain the stable operation of microgrids is to develop a resilient controller [8,27,95,[99][100][101][102][103][104]. AI-based techniques are being utilized to design resilient control schemes in microgrids to mitigate the malicious effects of such attacks [42][43][44][45][46]105].…”
Section: Ai-based Cyber-attack Mitigationmentioning
confidence: 99%
“…In addition to the challenge of improving security for low-capacity processing devices such as Arduinos, the main objective at this stage is to validate the functionality of the framework. However, it is possible to incorporate security measures when transmitting data to the server, which may involve data encryption or some methodologies to counter cyberattacks, as studied by [36,37]. However, the selection of the most appropriate security method will require experimentation and validation, considering power and processing requirements, which are critical constraints on data sensing.…”
Section: Non-functional Requirements (Nfr)mentioning
confidence: 99%