
You have already added 0 works in your ORCID record related to the merged Research product.
You have already added 0 works in your ORCID record related to the merged Research product.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations

handle: 10754/678188
The digitization and decentralization of the electric power grid are key thrusts for an economically and environmentally sustainable future. Towards this goal, distributed energy resources (DER), including rooftop solar panels, battery storage, electric vehicles, etc., are becoming ubiquitous in power systems. Power utilities benefit from DERs as they minimize operational costs; at the same time, DERs grant users and aggregators control over the power they produce and consume. DERs are interconnected, interoperable, and support remotely controllable features, thus, their cybersecurity is of cardinal importance. DER communication dependencies and the diversity of DER architectures widen the threat surface and aggravate the cybersecurity posture of power systems. In this work, we focus on security oversights that reside in the cyber and physical layers of DERs and can jeopardize grid operations. Existing works have underlined the impact of cyberattacks targeting DER assets, however, they either focus on specific system components (e.g., communication protocols), do not consider the mission-critical objectives of DERs, or neglect the adversarial perspective (e.g., adversary/attack models) altogether. To address these omissions, we comprehensively analyze adversarial capabilities and objectives when manipulating DER assets, and then present how protocol and device-level vulnerabilities can materialize into cyberattacks impacting power system operations. Finally, we provide mitigation strategies to thwart adversaries and directions for future DER cybersecurity research.
IEEE Systems Journal (2023)
- National Technical University of Athens Greece
- King Abdullah University of Science and Technology Saudi Arabia
- University of Vassa Finland
- University of Vaasa Finland
- King Abdullah University of Science and Technology Saudi Arabia
FOS: Computer and information sciences, Cybersecurity, Computer Science - Cryptography and Security, cybersecurity, mitigations, cyber security, fi=Sähkötekniikka|en=Electrical Engineering|, Systems and Control (eess.SY), Attacks, Electrical Engineering and Systems Science - Systems and Control, distributed energy resources, attacks, FOS: Electrical engineering, electronic engineering, information engineering, distributed energy resources (DERs), Cryptography and Security (cs.CR)
FOS: Computer and information sciences, Cybersecurity, Computer Science - Cryptography and Security, cybersecurity, mitigations, cyber security, fi=Sähkötekniikka|en=Electrical Engineering|, Systems and Control (eess.SY), Attacks, Electrical Engineering and Systems Science - Systems and Control, distributed energy resources, attacks, FOS: Electrical engineering, electronic engineering, information engineering, distributed energy resources (DERs), Cryptography and Security (cs.CR)
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).26 popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.Top 10% influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).Top 10% impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.Top 10%
