2017
DOI: 10.1109/tsg.2016.2523515
|View full text |Cite
|
Sign up to set email alerts
|

Power System Reliability Assessment Incorporating Cyber Attacks Against Wind Farm Energy Management Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 101 publications
(33 citation statements)
references
References 25 publications
0
33
0
Order By: Relevance
“…With higher penetration of wind generation, as well as the advanced cyber components and networks, cyber attacks against the wind farms will become a non-negligible factor which might be a potential threat for power system operation [27]. In the conventional centralized control schemes, the central wind farm controller directly acquires the measured power outputs of WTs from each WT, solves the optimization problem and then sends the reactive power set-points to each WT.…”
Section: B Cyber Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…With higher penetration of wind generation, as well as the advanced cyber components and networks, cyber attacks against the wind farms will become a non-negligible factor which might be a potential threat for power system operation [27]. In the conventional centralized control schemes, the central wind farm controller directly acquires the measured power outputs of WTs from each WT, solves the optimization problem and then sends the reactive power set-points to each WT.…”
Section: B Cyber Securitymentioning
confidence: 99%
“…For the decentralized control, the central agent and local agent exchange the updating variables in the ADMM, x, z, γ and ρ, instead of explicit reactive power measurements and setpoints. From the perspective of cyber and information security, the decentralized manner can better prevent the operating information of the wind farms from being directly stolen by the hackers, which is one of the common attack scenarios for wind farms [27].…”
Section: B Cyber Securitymentioning
confidence: 99%
“…(3) the control center LAN of wind farms; and (4) the remote control LAN in the substation [16]. The WTCP is a vulnerable node in the control network of a wind farm.…”
Section: Wind Farm Cyber Architecture and Security Risksmentioning
confidence: 99%
“…The dynamic simulation of a WT was tested in [15], and the impact caused by malicious modifications on the WT control parameters was discussed. In [16], power system reliability, considering the sudden tripping of WTs, was evaluated via a reliability analysis. With the specific attack paths, the MTTC was applied to estimate the frequency of cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The undesired tripping of the wind farm and deficiency of the secondary reserve as well as the supported reactive power could deteriorate voltage and frequency. An intelligent cyberattack to this control system, upon successful intrusion to the network, would be a new threat to overcome [5], [6].…”
Section: A Digital Modernization and Emerging Threatsmentioning
confidence: 99%