2020
DOI: 10.1049/iet-cps.2019.0084
|View full text |Cite
|
Sign up to set email alerts
|

Assessing DER network cybersecurity defences in a power‐communication co‐simulation environment

Abstract: Increasing penetrations of interoperable distributed energy resources (DER) in the electric power system are expanding the power system attack surface. Maloperation or malicious control of DER equipment can now cause substantial disturbances to grid operations. Fortunately, many options exist to defend and limit adversary impact on these newly-created DER communication networks, which typically traverse the public internet. However, implementing these security features will increase communication latency, ther… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 21 publications
(20 reference statements)
0
15
0
Order By: Relevance
“…The attack model is generally divided into 9-12 steps [6,14,[50][51][52]. However, these steps can be briefly summarized as four steps according to certain goals: 1. collecting information and analyzing vulnerabilities; 2. selecting target, route, and means of attack; 3. attacking; and 4. eliminating traces.…”
Section: Predicting Possible Quantum Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The attack model is generally divided into 9-12 steps [6,14,[50][51][52]. However, these steps can be briefly summarized as four steps according to certain goals: 1. collecting information and analyzing vulnerabilities; 2. selecting target, route, and means of attack; 3. attacking; and 4. eliminating traces.…”
Section: Predicting Possible Quantum Attacksmentioning
confidence: 99%
“…The DER network also connects DERMS to utilities to keep the entire system stable [4][5][6][7][8]. As the amount and importance of information transmitted and received in the DER network also increase, the interest and importance of DER network security also increases [4][5][6][7][8][9][10][11][12][13][14][15]. Many standards have been established for the security of DER networks [10,[16][17][18][19][20][21][22][23][24][25][26][27].…”
Section: Introductionmentioning
confidence: 99%
“…Advanced methods of cybersecurity traditionally applied to enterprise can also be adapted to DER environments [49,50]. These methods have been found to only minimally increase latency [51]. General best practices for securing DER networks are discussed in [10].…”
Section: Related Workmentioning
confidence: 99%
“…Simulated PV inverters were created that interacted with the power system so that any changes to the controllers would be reflected in the power simulation and vice versa. An adversary-based (red team) assessment was performed for different cybersecurity defenses (segmentation, encryption, and moving target defense) in this environment and given a cybersecurity score [64,65].…”
Section: Sceptre: Suite Of Tools Providing An Ics Co-simulation Envirmentioning
confidence: 99%
“…This section contains SIRFN ALTM experiences including integration of RTSM to co-simulation platforms [59,60], network emulators, and cyber-physical systems in co-simulation and HIL [61][62][63], development of tools with enhanced cybersecurity features for co-simulation and HIL experiments [64,65], and integration via co-simulation of electrical vehicles charging station interfaces [66].…”
Section: Introductionmentioning
confidence: 99%