2022
DOI: 10.1109/access.2022.3163551
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Review of Cybersecurity in Inverter-Based Smart Power System Amid the Boom of Renewable Energy

Abstract: The blossom of renewable energy worldwide and its uncertain nature have driven the need for a more intelligent power system with the deep integration of smart power electronics. The smart inverter is one of the most critical components for the optimal operation of Smart Grid. However, due to the deep information and communication technology (ICT) infrastructure implementation that most inverter-based smart power systems tend to have, they are vulnerable to severe external threats such as cyberattacks by

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(6 citation statements)
references
References 178 publications
(181 reference statements)
0
5
0
Order By: Relevance
“…Additional work by other authors can be reviewed in [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48]. As can be seen from the review, the use of Kali Linux [49] in the process of studying the network security level of PEDs has not been proposed.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Additional work by other authors can be reviewed in [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48]. As can be seen from the review, the use of Kali Linux [49] in the process of studying the network security level of PEDs has not been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…The mobile workstation is connected to this port and, with the installed monitoring tools, it monitors the traffic exchanged between the PED and the monitoring center. Additional work by other authors can be reviewed in [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48]. As can be seen from the review, the use of Kali Linux [49] in the process of studying the network security level of PEDs has not been proposed.…”
Section: Experiemtnal Setupmentioning
confidence: 99%
“…On the other hand, a typical inverter-based power system within distributed energy resources (DERs) is more vulnerable to cyber attacks when it integrates with renewable energy. Specifically, false data injection attacks (FDIA) can cause cyber-physical switching attacks that can affect power converter components [41].…”
Section: Sg Cyber-physical Vulnerabilities: Distributed Energy Resour...mentioning
confidence: 99%
“…These advancements encompass various aspects, including IoT-driven smart energy meters that facilitate the cloud-based analysis of consumption patterns [1]. The SMACS system employs IoT elements to monitor power usage and leverage cloud platforms for comprehensive data analysis [2]. These initiatives collectively bolster energy management both at the grid level and in everyday living scenarios, addressing critical challenges while enabling real-time measurements for accurate load analysis [3].…”
Section: Literature Surveymentioning
confidence: 99%