2022
DOI: 10.1007/978-981-16-9033-4_51
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Cyber Security in Smart Microgrid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 32 publications
0
1
0
Order By: Relevance
“…It was created in the early 1900s as a low-data-rate remote power network component control service. Since then, numerous frequency ranges and signal modulation methods have been used to reach data speeds from a few bits per second to 200 Mbps with a broad frequency range (3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19)(20). PLC technology is susceptible to electromagnetic noise from electrical motors, radio signal interference, and power supply since power lines are not twisted and protected.…”
Section: Communication Infrastructuresmentioning
confidence: 99%
See 1 more Smart Citation
“…It was created in the early 1900s as a low-data-rate remote power network component control service. Since then, numerous frequency ranges and signal modulation methods have been used to reach data speeds from a few bits per second to 200 Mbps with a broad frequency range (3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19)(20). PLC technology is susceptible to electromagnetic noise from electrical motors, radio signal interference, and power supply since power lines are not twisted and protected.…”
Section: Communication Infrastructuresmentioning
confidence: 99%
“…This research aims to fill these research gaps by performing a thorough examination of the available literature and comparing it to the present condition of microgrid cybersecurity. We examine the intricacies of distributed energy resources (DER) in microgrids, investigating their setup and the crucial significance of communication technologies for instantaneous monitoring and control [18][19][20]. The incorporation of sustainable energy sources, such as wind and solar power, into microgrids poses distinct problems and possibilities in terms of upholding cybersecurity.…”
Section: Introductionmentioning
confidence: 99%
“…Assume that the attacker has successfully created a backdoor into the SCADA server control: in such a situation, they will be able to launch a series of attacks against the system, having a severe impact on the entire power system. On the IT network, the security requirements are established in order of importance: (1) confidentiality, (2) integrity, and (3) availability [98].…”
Section: Maintaining Accessmentioning
confidence: 99%