2021 IEEE Energy Conversion Congress and Exposition (ECCE) 2021
DOI: 10.1109/ecce47101.2021.9595728
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Enabled Security Module for Transforming Conventional Inverters toward Firmware Security-Enhanced Smart Inverters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Malicious controller firmware can be delivered via an overthe-air (OTA) updating process to the network layer of the smart inverter first, then it will be patched into the MCU in controller layer [74]. This controller-firmware attack vector will bring Attacks #8, #9, and #10 in a stealthy way.…”
Section: B Controller Layer Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Malicious controller firmware can be delivered via an overthe-air (OTA) updating process to the network layer of the smart inverter first, then it will be patched into the MCU in controller layer [74]. This controller-firmware attack vector will bring Attacks #8, #9, and #10 in a stealthy way.…”
Section: B Controller Layer Attacksmentioning
confidence: 99%
“…As most smart inverters are resource-constrainted devices, smart inverter developers need to prioritize the IPs based on their security budget and severity. Besides, additional external security system, such as malware file screening server [74] and blockchain security server [103], can be used to support additional computational resources for M-IP1, HT-IP, CF-IP, CC-IP, and EM-IPs, while smart inverters install APIs accessing the external system.…”
Section: Cyber-resilient Smart Inverter Security By Designmentioning
confidence: 99%
“…Finally, a blockchain module (BM) must also be conceived to implement blockchain technology for energy data certification, assuring the traceability, security, and reliability of the commercial transactions [28][29][30]. Its main functions are the certification of the energy data since the blockchain records in an immutable and transparent manner the production feeding into the grid and the external energy demand; data traceability since blockchain transactions trace production data along the entire supply chain, allowing the point source of the energy to be identified; security, as blockchain guarantees data integrity and transaction security, preventing fraud and tampering; and finally, it may provide real-time feedback on the external world energy market status on the PV plant operation [31,32].…”
Section: The General Structure Of a Pv Iot-scadamentioning
confidence: 99%
“…sensitive layers of battery management systems, including network, software/firmware, data storage, on-board interface, and hardware layers [120]. Table VII illustrates a comparison of the state-of-the-art (SOA) defense strategies and adopting emerging blockchain-based technologies for a PV system based on [120]. Interested readers are referred to [120] for more details.…”
Section: Network and Firmware Security Detection And Mitigation Metho...mentioning
confidence: 99%
“…Table VII illustrates a comparison of the state-of-the-art (SOA) defense strategies and adopting emerging blockchain-based technologies for a PV system based on [120]. Interested readers are referred to [120] for more details.…”
Section: Network and Firmware Security Detection And Mitigation Metho...mentioning
confidence: 99%