2019 Resilience Week (RWS) 2019
DOI: 10.1109/rws47064.2019.8972000
|View full text |Cite
|
Sign up to set email alerts
|

Recommended Functionalities for Improving Cybersecurity of Distributed Energy Resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
27
0
4

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(31 citation statements)
references
References 23 publications
0
27
0
4
Order By: Relevance
“…These existing solutions include basic security controls, such as role-based access controls and intrusion detection, and advanced security controls, such as transport layer security and session renegotiation. Particularly of interest, controls enabling ancillary services of DER, such as volt-var, watt-var, volt-watt, and frequency droop, have been mapped to potential physical impacts due to cyberattacks [132]. This work highlights the vulnerabilities within specific IEEE communication protocols commonly used in DER communications and pinpoints opportunities for cyber hardening.…”
Section: Cyber-physical Analysis Of Solar Wind and Dersmentioning
confidence: 99%
“…These existing solutions include basic security controls, such as role-based access controls and intrusion detection, and advanced security controls, such as transport layer security and session renegotiation. Particularly of interest, controls enabling ancillary services of DER, such as volt-var, watt-var, volt-watt, and frequency droop, have been mapped to potential physical impacts due to cyberattacks [132]. This work highlights the vulnerabilities within specific IEEE communication protocols commonly used in DER communications and pinpoints opportunities for cyber hardening.…”
Section: Cyber-physical Analysis Of Solar Wind and Dersmentioning
confidence: 99%
“…They propose metrics to evaluate the impact of attacks. Other research presents network attacks on DER in more detail and provides recommendations that align with standard best practices for cybersecurity are discussed with application to DER [50]. Additional threat assessment work proposes a framework to evaluate the current security position and help stakeholders ensure that they have covered all basic cybersecurity best practices via standards, certifications, and testing against an individual system [51].…”
Section: Related Workmentioning
confidence: 99%
“…In [13] the authors identify key issues with DER deployments and provide a series of product improvements that must be integrated into new systems in order to prevent cyber-attacks. In [14] a Cybersecurity Framework (CSF) compatible with the National Institute of Standards and Technology (NIST) guidelines is presented, the guide has been integrated into a web tool to be used by federal, private and utility scale organizations.…”
Section: Related Workmentioning
confidence: 99%